<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>of Fractal-like Traffic with Prediction of Router Load for Reduce the Probability of Network Packet Loss</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yelyzaveta</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Meleshko</string-name>
          <email>elismeleshko@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Drieieva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Drieiev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykola</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yakymenko</string-name>
          <email>m.yakymenko@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Mikhav</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Shymko</string-name>
          <email>shymko.sv@meta.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Central Ukrainian National Technical University</institution>
          ,
          <addr-line>8, Universytetskyi prosp., Kropyvnytskyi, 25006</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2002</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>In this paper, a method for routing fractal-like traffic in computer networks was proposed. This method uses the prediction of router load by analyzing the fractal dimension of network traffic to reduce the probability of packet loss. It takes into account the predicted router load as one of the metrics for determining the shortest packet transmission routes in a computer network. Additionally, a computer simulation model of a computer network based on complex network theory, Markov processes, and fractal time series was created. This computer simulation model allows the generation of a computer network structure and simulates traffic movement between network devices for testing routing algorithms. A series of experiments on the developed computer network model to determine the quality of the proposed routing method and compare it with other methods were conducted. During the analytical research and experiments, the impact of different fractal dimensions of traffic on the probability of packet loss and, consequently, on the quality of service at high traffic intensity was investigated. And it also investigated whether the proposed routing method allows for the reduction of the number of lost network packets. Analyzing the results of the experiments, the following conclusions can be drawn. The fewest lost packets were when the process was random or had weakly expressed trends, which was modeled in the experiment by traffic with the fractal dimension equal to 1.5. Persistent and anti-persistent processes (those with memory) cause more packet loss for the same traffic intensity and the same maximum number of packets generated per device per unit of time. Moreover, the anti-persistent processes modeled in the experiment by traffic with the fractal dimension equal to 1.25 cause significantly greater losses than persistent processes modeled with the fractal dimension of 1.75. Also, the results of the experiments showed that the proposed traffic routing method allows for a significantly reduced number of lost packets compared to the existing method without prediction based on fractal traffic analysis.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>simulation
Computer networks, traffic routing, network traffic, fractal-like traffic, fractal dimension,
packet loss probability, router load prediction, time series forecasting, data analysis, computer</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        The relevance of the research is due to the importance of ensuring the quality of service in computer
networks, in particular, reducing the number of lost IP-packages at high values of traffic intensity, which
will significantly improve the quality of service at peak loads on the network [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Determining the
route of transmission of traffic packets is a complex process and is based on various metrics or
combinations of metrics. If the process of routing takes place in a dynamic mode, the complexity of
EMAIL:
(Ye. Meleshko);
(H. Drieieva);
(O. Drieiev);
ORCID:
0000-0001-8791-0063
(Ye. Meleshko);
0000-0002-8557-3443
(H. Drieieva);
(O. Drieiev);
      </p>
      <p>
        2023 Copyright for this paper by its authors.
route determining increases, in this case, one of the tools for researching and comparing various routing
algorithms can be a computer simulation model of a computer network [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3-5</xref>
        ].
      </p>
      <p>
        The paper research the basic principles of traffic routing in computer networks. It was revealed that
existing methods of traffic routing can be improved based on the use of predicting the load of routers
[
        <xref ref-type="bibr" rid="ref6 ref7 ref8 ref9">6-9</xref>
        ]. Also, the research showed that computer traffic has fractal properties [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10-12</xref>
        ], which can be used
in the development of methods for predicting the load of network devices.
      </p>
      <p>A computer model of a computer network for testing traffic marching algorithms has been
developed. To generate the structure of a computer network, a method based on the theory of complex
networks has been developed. Markov processes and fractal time series were used to generate traffic.
An improved traffic routing method was also proposed, using router load prediction based on fractal
analysis to reduce the likelihood of losing network packets. On the developed computer simulation
model of a computer network, a series of experiments were conducted to determine the quality of work
of a developed method of routing fractal-like traffic.
1.1.</p>
    </sec>
    <sec id="sec-3">
      <title>Related works and problem statement</title>
      <p>
        Network traffic has fractal properties and can be modeled using fractal time series [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The
generation of traffic to reproduce its fractal properties [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ] can be based on the theory of Markov
processes [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ], which is often used to model the traffic of various mass service systems [
        <xref ref-type="bibr" rid="ref18 ref19 ref20">18-20</xref>
        ] and
will be useful for creating high-quality models of computer networks and testing their work methods.
Another possible application of the analysis and synthesis of fractal traffic can be the detection of
information attacks in computer [
        <xref ref-type="bibr" rid="ref21 ref22">21-23</xref>
        ] and social networks [24] because mathematical and computer
models of networks and network traffic are also widely used for development and testing of methods
of attack detection [25-27].
      </p>
      <p>
        A structure of computer networks is often modeled using complex networks – stochastic networks
with non-trivial topology, differing from classical stochastic networks by their properties [
        <xref ref-type="bibr" rid="ref5">5, 28</xref>
        ]. Most
real networks – complex ones, for example, computer, transport, and social networks are complex.
Complex networks have the following basic properties [
        <xref ref-type="bibr" rid="ref5">5, 29, 30</xref>
        ]: scalelessness, the small diameter of
a network, in high clustering coefficient and high transitivity coefficient, giant connected component.
(i.e, more than 80% of nodes are interconnected, in our model of a computer network, complete
connectivity is necessary), there are hierarchical connections, there are complex cluster formations
(cliques, clans, etc.), assortativity (an emergence of connections between vertices that are somehow
similar to each other, in the narrow sense – a emergence of connections between vertices with a large
number of connections).
      </p>
      <p>Routing is the process of determining the optimal route for information to pass through computer
networks [31, 32]. Each router makes a decision on the direction of packet forwarding based on a
routing table. The routing table contains a set of rules, with each rule describing the gateway or interface
used by the router to access a particular network. Routes can be configured administratively (static
routes) or computed using routing algorithms based on information about network topology and state
obtained through routing protocols (dynamic routes). A routing protocol is a network protocol used by
routers to determine possible routes for data transmission in a complex large computer network [31,
32]. Routing protocols are divided into two types depending on the types of algorithms they are based
on [31, 32]: distance vector protocols and link state protocols. Examples of distance vector protocols
include Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), Border
Gateway Protocol (BGP), and Ad hoc On-Demand Distance Vector (AODV). Examples of link state
protocols include (Intermediate System to Intermediate System (IS-IS), Open Shortest Path First
(OSPF), NetWare Link-Services Protocol (NLSP), Hot Standby Router Protocol (HSRP), Optimized
Link-State Routing (OLSR), Topology broadcast based on reverse-path forwarding (TBRPF). Distance
vector protocol algorithms (also known as Belman-Ford algorithms) require each router to forward all
or part of its routing table, but only to its neighbors. Distance vector algorithms work well only in small
networks. In large networks, they clog communication lines with intensive service periodic traffic. In
large networks, channel state algorithms are used. They send only small adjustments to all network
nodes and do not clog communication channels with service messages. Metrics used in routing
algorithms to find the shortest path to forward an IP-packet: route length, reliability, delay, bandwidth,
load, and communication cost.</p>
      <p>The larger and more complex a computer network, the greater the demands placed on routing
algorithms to ensure the required quality of service. Testing is important in researching, improving, and
developing routing algorithms. To test routing algorithms, a computer network of a given complexity
or a computer simulation model must be available. Both options have their pros and cons, but it can be
confidently stated that a quality computer simulation model will significantly speed up the development
process in the initial stages, and final experiments before practical implementation should be conducted
on real computer networks.</p>
      <p>The goal of this work is to develop a method of routing fractal-like traffic with prediction of router
load to reduce the probability of network packet loss and investigate the quality of proposed method in
proposed computer simulation model of a computer network with a complex structure and fractal traffic.</p>
    </sec>
    <sec id="sec-4">
      <title>2. Development of a method of routing fractal-like traffic with the prediction of router load to reduce the probability of network packet loss 2.1.</title>
    </sec>
    <sec id="sec-5">
      <title>Theoretical justification and essence of proposed method</title>
      <p>Research was conducted based on mathematical modeling of how the fractal dimension of traffic
affects the probability of queue overflow in a router and network packet loss.</p>
      <p>A Markov chain, depicted in Fig. 1, was used to model binary fractal traffic.</p>
      <p>λ
0
p
0
0
λ</p>
      <p>2
λ
1
p
1
1
λ
3</p>
      <p>+ (1 −  1 (1 −  )⁄ )</p>
      <p>To simulate a real binary sequence of network packets, it is sufficient to estimate the probabilities
λ1 and λ2. To simulate traffic through the flow value τ and fractal dimension d, it is necessary to find the
probabilities λ1 and λ2, which are unknown. Therefore, the following problem is formulated:</p>
      <p>Given the fractal dimension d and the average flow of unit values τ. The input values are limited as
follows:  ∈ (1. .2),  ∈ (0. .1).</p>
      <p>Let's solve the formulated problem.</p>
      <p>The probabilities λ1 and λ2 are sought, where  1,  2 ∈ (0. .1).</p>
      <p>From formula (2), we determine the probability of transition from "1" state to "0" state λ2 through
another probability λ1:</p>
      <p>Thanks to this, equation (1) can be reduced by substitution (3) to an equation with one variable:
 = 2 + (1 −  1)
 (1 −  1)
 (1 −  1 (1 −  )⁄ )
2 1 (1 −  )⁄
To simplify further notation, we assume that λ=λ1:
 (1 −  )
 (1 −  (1 −  )⁄ )</p>
      <p>,
(5)
(6)
 ( ) = 2 −  + (1 −  )</p>
      <p>+ (1 −  (1 −  )⁄ )
 ′( ) = −</p>
      <p>−
2 2 (1 −  )⁄</p>
      <p>Equation (5) is nonlinear with respect to λ and has no analytical solutions. Therefore, to solve for λ,
it is necessary to transform it to search for zeros:
 (1 −  )  (1 −  (1 −  )⁄ )
(7)
2 2 (1 −  )⁄
and use one of the numerical methods for iterative approximation. The method of tangent lines is
proposed to be used. The following algorithm is shown, where the superscript denotes the result of the
current iteration:</p>
      <p>Stage 1. λ0 = 0.00001.</p>
      <p>Stage 2. λi+1 := λi – k f(λi)/f’(λi), where k ∈ (0..1] is a coefficient for improving the convergence of
the method (the smaller the coefficient, the more stable the method, but it requires 1/k more iterations).
Repeat step (2) until the desired accuracy is achieved, after which the sought-after values are calculated:
Stage 3. λ1 = λ, λ2 = λ(1-τ)/τ.</p>
      <p>It is also possible to use other numerical methods.</p>
      <p>The small initial probability value corresponds to the region of stable solutions, where the method
of tangent lines more often leads to a solution of the equation.</p>
      <p>The derivative for the expression from step (2) is calculated using the following expression:
 +  (1 −  )  ⋅ (1 −  )⁄ +  (1 −  (1 −  )⁄ )</p>
      <p>2 2 2 2 (1 −  )⁄</p>
      <p>The obtained iterative process allows you to obtain parameters for traffic generation λ1 and λ2 from
the fractal dimension d and the flow intensity of generation of ones τ. As a result of numerical simulation
modeling, at different values of fractal dimension and input traffic intensity, the average queue length
in the node device and the probability of queue overflow for 10 packets were obtained.</p>
      <p>The empty areas correspond to inadmissible solutions when searching for the probabilities of state
change of the generator λ1 and λ2. Accordingly, for the given d and τ, the generator is unable to produce
a sequence with the specified characteristics, which is visualized by the region of admissible arguments
(domain of definition), Fig. 4:
using the obtained tabular data (Fig. 3). We look for an approximation in the form of:
where a, b are the sought coefficients, n is given.
take the logarithm of both sides of the equation:
or:</p>
      <p>The approximation error will be considered as the difference:
 (  ) ≈ − (2 −   )</p>
      <p>−  (1 −   ) ,
 2 = ( (  ) +  (2 −   ) +  (1 −   ) )2,</p>
      <p>∑  2 = ∑  (  )2 + 2 ∑  (  )(2 −   )</p>
      <p>+ 2 ∑  (  )(1 −   ) +
+ 2 ∑(2 −   )2 + 2</p>
      <p>∑(2 −   ) (1 −   ) +  2 ∑(1 −   )2 .</p>
      <p>To obtain an approximation, it is necessary to solve the problem of finding a and b such that:
The approximation error function with respect to the variables a and b has derivatives equal to zero.
With respect to n, the system will be nonlinear and will not have an analytical or unique solution. This
makes it possible to construct the following system:</p>
      <p>However, in this form, the method of least squares cannot be applied. Therefore, it is necessary to
 2 =  (  )2 + 2
(  )(2 −   )
 + 2
(  )(1 −   )</p>
      <p>+  2(2 −   )2
+ 2
(2 −   ) (1 −   )
 +  2(1 −   )2 ,
where used the power of 2 to enhance sensitivity to large deviations and to exclude situations of mutual
compensation of positive and negative deviations. Then, the quality of the approximation can be
determined as the sum of all square deviations, where a smaller value corresponds to a better
approximation:</p>
      <p>Let's find the partial derivatives:
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)</p>
      <p>+ 2 ∑(2 −   )2 + 2 ∑(2 −   ) (1 −   ) = 0,
2 ∑  (  )(1 −   )
 + 2 ∑(2 −   ) (1 −   )
 + 2 ∑(1 −   )2 = 0.</p>
      <p>Solution of the system yields the following result:
 =
 =</p>
      <p>− ∑  (  )(2 −   )
∑ (2 −   )2 ∑ (1 −   )2 − (∑ (2 −   ) (1 −   ) )2
∑ (1 −   )2 + ∑ (  )(1 −   ) ∑ (2 −   ) (1 −   ) ,</p>
      <p>− ∑  (  )(1 −   )
∑ (2 −   )2 ∑ (1 −   )2 − (∑ (2 −   ) (1 −   ) )2
∑ (2 −   )2 + ∑  (  )(2 −   ) ∑ (2 −   ) (1 −   ) .</p>
      <p />
      <p>{ 


∑  2 →,  .
( ∑  2) ′ = 0,
( ∑  2) ′ = 0.</p>
      <p>( ∑  2) ′ = 2 ∑  (  )(2 −   )</p>
      <p>+ 2 ∑(2 −   )2 + 2 ∑(2 −   ) (1 −   ) ,
( ∑  2) ′ = 2 ∑  (  )(1 −   )
 + 2 ∑(2 −   ) (1 −   )
 + 2 ∑(1 −   )2 .</p>
      <p>Then the system of equations will have the following form:</p>
      <p>On Fig. 5 shows the dependence of the sum of deviations  = ∑  2 on the exponent n.</p>
      <p>Due to the nonlinearity of the equations obtained with respect to n, a series of experiments were
conducted with different values of the power exponent n. Based on the results, the following parameters
were selected:
n = 0,99, a = 6,6297, b = 11,1654, ∑  2 = 1615,4651
(20)</p>
      <p>Finally, one can use the following approximation to determine the probability of losing network
packets for a given known fractal dimension of traffic:
 ( ,  ) ≈  −6,6297(2− )0,99−11,1654(1− )0,99,
(21)
where p is the probability of packet loss when transmitted over a separate channel, which depends on
the traffic intensity τ and its fractal dimension d.</p>
      <p>Link State Protocol algorithms, also known as "first-priority shortest path" algorithms, are
commonly based on Dijkstra's algorithm and use different metrics to determine the shortest path for
forwarding network packets [31, 32, 34]. Their implementation involves the ability to collect statistics
on traffic passing through a router, which enables traffic analysis and prediction. The ability to use
different distance metrics and combine multiple metrics allows adding packet loss probability as a
metric.</p>
      <p>OSPF (Open Shortest Path First) protocol is a modern implementation of the link-state algorithm
and has many features designed for use in large heterogeneous networks [35-39].</p>
      <p>In OSPF, the process of building a routing table is divided into two main stages. In the first stage,
each router builds a network topology graph, where a nodes of a graph are routers and IP networks, and
a edges are a router interfaces. All routers exchange information about a network graph with their
neighbors, which they have at that time. This process is similar to the process of spreading distance
vectors to networks in RIP protocol, but information itself is qualitatively different – it is information
about a network topology. Such messages are called router link advertisements. Moreover, during the
transmission of topological information, routers do not modify it, as RIP routers do, but transmit it in
an unchanged form. As a result of spreading topological information, all routers in a network have
identical information about a network graph, which is stored in a topological database of each router.</p>
      <p>The second stage involves finding a optimal routes using the obtained graph. Each router considers
itself the center of a network and seeks the optimal route to each network it knows. In each found route,
only one step is remembered – to a next router according to the principle of single-step routing. This
data about this step is entered into a routing table. Finding a optimal path on a graph is quite complex
and time-consuming. OSPF protocol uses an iterative Dijkstra algorithm to solve it. If several routes
have a same metric to a destination network, then the first steps of all these routes are recorded in the
routing tables.</p>
      <p>After the initial routing table is built, it is necessary to track changes in a network and make
adjustments to a routing table. To monitor a state of links and neighboring routers, OSPF routers send
special short HELLO messages. If the network state does not change, OSPF routers do not make any
adjustments to their routing tables and do not send link state advertisements to their neighbors.
However, if a link state changes, a router sends a new advertisement that pertains only to that link,
saving network bandwidth. Upon receiving a new advertisement about a link state change, a router
reconstructs a network graph, searches for optimal routes (not necessarily all, but only those affected
by the change), and adjusts its routing table accordingly. Simultaneously, a router retransmits the
advertisement to all its nearest neighbors (except for the one from which it received the advertisement).</p>
      <p>With the appearance of a new link or neighbor, a router learns about it from new HELLO messages.
HELLO messages contain fairly detailed information about a router that sent the message, as well as its
nearest neighbors, to uniquely identify this router. HELLO messages are sent every 10 seconds to
increase the speed of router adaptation to changes in a network. The small size of these messages
enables frequent testing of the state of neighbors and their connections.</p>
      <p>Since routers are one of the vertices of a graph, they must have identifiers.</p>
      <p>OSPF protocol typically uses a metric that takes into account the network's bandwidth. In addition,
it is possible to use two other metrics that take into account the quality of service requirements for
IPpacket – packet transmission delay and packet transmission reliability in the network. OSPF protocol
builds a separate routing table for each metric. The choice of the required table depends on the quality
of service requirements for an input packet.</p>
      <p>Taking into account the features of OSPF algorithm, an improved method of routing fractal-like
traffic was developed.</p>
      <p>The stages of the proposed method of routing fractal-like traffic with predicting the load on the
routers to reduce the probability of loss of network packets are:</p>
      <p>Stage 1. OSPF routing protocol is launched. At first, it operates in normal mode, but on each router,
traffic statistics are accumulated for a certain time interval Tn.</p>
      <p>Stage 2. Based on the obtained traffic statistics for time Tn, the fractal dimension of traffic is
calculated, and based on it, the probability of packet loss p(d, τ) is predicted in the future on each router.
Routers exchange their packet loss probability p(d, τ) with others via HELLO messages.</p>
      <p>Stage 3. The predicted packet loss probability is used as an additional metric in SPF routing
algorithm of OSPF protocol (SPF algorithm uses Dijkstra algorithm to find a shortest path for packet
transmission). We add the predicted probability of packet loss to the standard path length metric:
m = k1∙m1+k2∙m2,
(22)
where m1 is the standard metric, m2 is the predicted packet loss probability, and k1 and k2 are weighting
coefficients, which were set to 1 in this work. The metric m2 = p(d, τ) is determined by formula (21).</p>
    </sec>
    <sec id="sec-6">
      <title>2.2. Computer simulation model of a computer network for testing traffic routing methods</title>
      <p>Developed simulation model of a computer network is represented by a fully connected undirected
weighted graph, in which nodes are routers and edges are network connections between them. The
weight of edges is the value inversely proportional to the bandwidth of the communication channel.
Nodes contain queues in which received packets are placed before determining the route for their
transmission and sending them to next node. Time in the model is represented by discrete iterations.
Routing is carried out based on an algorithm that needs to be tested on the model.</p>
      <p>Developed model includes two operation modes:</p>
      <p>On each iteration, a random amount of traffic packets with random sender and receiver devices is
generated and routed.</p>
      <p>On the first iteration, a certain amount of traffic packets with random sender and receiver devices is
generated once, and only their routing is performed on all subsequent iterations.</p>
      <p>The stages of the developed computer simulation model of a computer network are:
Stage 1. A computer network structure, where nodes are routers, and edges are traffic transmission
channels, is generated (Fig. 6) based on Barabási-Albert model [33].</p>
      <p>Stage 2. Checking whether a generated network graph is fully connected. If a generated graph is not
fully connected, add edges between disconnected components of graph.</p>
      <p>Stage 3. Assigning weights to edges that depend on nodes they connect – the more connections a
node has, the lower the weight of edge connecting it (and accordingly, the higher the bandwidth of the
corresponding communication channel).</p>
      <p>
        Stage 4. Generating traffic packets for transmission. A random number of packets with random
destinations is sent to each node with a certain probability. A device that received packets puts them in
its internal queue. A traffic is generated with fractal properties [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Traffic generation is based on the
theory of Markov processes, which is often used to model traffic in various queuing systems [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20">16-20</xref>
        ].
      </p>
      <p>Stage 5. Testing routing algorithms. An algorithm for routing testing is selected. Traffic packets
queued in network nodes are serviced using selected routing algorithm. The movement of packets
through a network is modeled. If a packet does not fit in the queue of a node, it is lost. The model
calculates all received and lost packets.</p>
      <p>Stage 6. Completion of the model's work. The model stops when it reaches a certain number of
iterations (for example, 1000 iterations), or if the model is working in the second mode, the stopping
condition can also be when all queues are empty and all packets are either sent or lost.</p>
      <p>To generate fractal binary traffic, a Markov chain was used, shown in Fig. 1.</p>
      <p>In this work, to simulate network traffic, a binary time series was created, the persistent of which is
regulated by the probabilities of changing the state to the opposite λ1, λ2 (Fig. 1).</p>
      <p>
        This generator is characterized by states 0 or 1, and probabilities of being in these states are
p0=λ2/(λ1+λ2) and p1=λ2/(λ1+λ2), where λi are the probabilities of the corresponding transitions [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The
traffic intensity of such a generator will be in the range of [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] and will be equal to the probability of
obtaining "1" at the output of the generator: p1.
      </p>
      <p>The algorithm of such a generator is shown in Fig. 7.</p>
      <p>Yes
series[0...N]
s = random
(1 or 0)
i=0..N-1</p>
      <p>On developed model, OSPF routing algorithm was tested, which is based on link-state technology
technology and uses Dijkstra's algorithm to find a shortest path. The obtained results showed the
performance of developed model. In the future, on developed model, the authors will test the
improvements of this algorithm.</p>
    </sec>
    <sec id="sec-7">
      <title>2.3. Experimental research of the quality of proposed method of routing fractal-like traffic</title>
    </sec>
    <sec id="sec-8">
      <title>2.3.1. Experiment</title>
      <p>A series of experiments were conducted on developed model to determine how the different fractal
dimensions of traffic affect the probability of packet lost and therefore the quality of service at high
traffic intensities. Three computer networks were generated, as shown in Fig. 3(a-c), each containing
30 routers with a queue length of 128 packets. The traffic intensity was set to 0,8, and the fractal
dimension values used were 1,25, 1,50, and 1,75. The first mode of the model was used, where a random
number of traffic packets with random sender and receiver devices were generated and routed on each
iteration. The number of lost traffic packets was calculated over 1000 iterations of model time.</p>
      <p>The results of experiments are presented in Table 1, which shows the average values based on the
experiments conducted on the networks shown in Fig.8(a-c).</p>
      <p>The results of the experiments are presented in Table 1. Computer networks with 30 routers were
simulated during the transmission of packets between routers over a period of 1000 units of model time.</p>
      <p>The following abbreviations were used in the table:
• WM1 – well-known OSPF routing method without predicting router load.</p>
      <p>• WM2 – well-known OSPF routing method using traffic load prediction based on the moving
average method.</p>
      <p>• PM – proposed method for improving OSPF routing method, using the prediction of the
probability of network packet loss due to router load based on fractal traffic analysis.</p>
      <p>The fractal dimension varies in the range of (1, 2), and its values can be interpreted as follows:
• values greater than 1,5 indicate an antipersistent process – any tendency tends to change in
the opposite direction. The larger the fractal dimension, the stronger the antipersistent. As it
approaches 1,5, the process becomes more random.</p>
      <p>• value of 1,5 indicates a completely random process.</p>
      <p>• values less than 1,5 indicate a persistent process, which means that it maintains its trend. The
smaller the fractal dimension, the stronger the trend is maintained. As it approaches 1,5, the process
becomes more random.</p>
      <p>Analyzing the results of the experiment, the following conclusions can be made:
• at high network loads, the least packet loss occurs when the traffic is antipersistent, and the
most occurs when the traffic is random or persistent.</p>
      <p>• at high network loads, the proposed routing method significantly reduces packet loss, with
significant improvements occurring for random and persistent traffic, and some improvement also
occurring for antipersistent traffic, although it is not significant.
2.3.2. Results</p>
      <p>Analyzing Table 1, the following conclusions can be made. Developed routing method in the
conducted experiment with the given network parameters reduces the loss of network packets compared
to the usual OSPF routing method without predicting the router's load:
• for antipersistent traffic, on average, by 1,03%, and a maximum of 1,17%;
• for random traffic, on average, by 7,85%, and a maximum of 55,41%;
• for persistent traffic, on average, by 8,00%, and a maximum of 36,42%.</p>
      <p>And in comparison, with the method that also used load forecasting but by means of a moving
average, proposed method also shows better results, namely fewer lost packets:
• for antipersistent traffic, on average by 1,01% and a maximum of 1,17%;
• for random traffic, on average by 7,58% and a maximum of 53,34%;
• for persistent traffic, on average by 7,45% and a maximum of 32,61%.</p>
      <p>Also, analyzing Table 1, it can be seen that depending on the network parameters and traffic
characteristics, the use of the proposed method can reduce network packet loss from 1,01 to 2,57 times.</p>
    </sec>
    <sec id="sec-9">
      <title>2.3.3. Discussions</title>
      <p>The poor results of the known method of load forecasting based on a moving average may be due to
the fact that it does not take into account the fractal properties of traffic and its fractal dimension.</p>
      <p>Thus, in routing traffic and finding optimal paths for sending IP-packets, it is useful to determine
and take into account the fractal dimension of traffic at the input of each router and use it to predict the
probability of packet loss and when calculating metrics to determine the best routes. Therefore, the
proposed routing method significantly improves the quality of service in a computer network by
reducing the probability of network packet loss.</p>
    </sec>
    <sec id="sec-10">
      <title>3. Conclusions</title>
      <p>The paper investigates the main principles of traffic routing in computer networks and how the
fractal dimension of traffic affects the probability of queuing overflow in routers and loss of network
packets. A computer model of a computer network was developed to test traffic routing algorithms. A
method based on the theory of complex networks was developed to generate the structure of the
computer network, while Markov processes and fractal time series were used to generate traffic. A
method for routing fractal-like traffic with prediction of router congestion was also developed to reduce
the probability of packet loss. The quality of proposed routing method was studied in a complex
computer network with fractal traffic using a computer simulation model.</p>
      <p>The results of experiments with proposed method on proposed computer model showed that:
• under heavy network load, the least lost packets occurred with antipersistent traffic, while the
most lost packets occurred with random or persistent traffic.</p>
      <p>• proposed routing method significantly reduces packet loss under heavy network load,
particularly with a decrease of 1,03% on average for antipersistent traffic, 7,85% on average for random
traffic, and 8,00% on average for persistent traffic compared to the standard OSPF routing algorithm.
Moreover, depending on the network parameters and traffic characteristics, proposed method can
reduce network packet losses from 1,01 to 2,57 times.</p>
      <p>Therefore, proposed method of fractal traffic routing with prediction of router congestion can reduce
the probability of network packet loss and improve the quality of service in a computer network.
4. References
[23] S. Gavrylenko, V. Chelak, and O. Hornostal, "Research of intelligent data analysis methods for
identification of computer system state," in Proceedings of the 30th International Scientific
Symposium Metrology and Metrology Assurance, Sozopol, Bulgaria, 2020. doi:
https://doi.org/10.1109/MMA49863.2020.9254252.
[24] A. M. Al-Oraiqat, O. S. Ulichev, Ye. V. Meleshko, H. S. AlRawashdeh, O. O. Smirnov, L. I.</p>
      <p>Polishchuk, "Modeling strategies for information influence dissemination in social networks,"
Journal of Ambient Intelligence and Humanized Computing, vol. 13, no. 5, pp. 2463-2477, 2022.
doi: https://doi.org/10.1007/s12652-021-03364-w
[25] M. Syfert, J. M. Kościelny, J. Możaryn, A. Ordys and P. Wnuk, "Simulation Model and Scenarios
for Testing Detectability of Cyberattacks in Industrial Control Systems," in In Intelligent and Safe
Computer Systems in Control and Diagnostics, 2022, pp. 73-84. doi:
10.1007/978-3-031-161599_7. Available: https://link.springer.com/chapter/10.1007/978-3-031-16159-9_7.
[26] S. Semenov, L. Zhang, W. Cao, S. Bulba, V. Babenko, and V. Davydov, "Development of a fuzzy
GERT-model for investigating common software vulnerabilities," Eastern-European Journal of
Enterprise Technologies, vol. 6, no. 2(114), pp. 6-18, 2021. doi:
https://doi.org/10.15587/17294061.2021.243715.
[27] S. Semenov, O. Sira, S. Gavrylenko, and N. Kuchuk, "Identification of the state of an object under
conditions of fuzzy input data," Eastern-European Journal of Enterprise Technologies, vol. 1, no.
4(97), pp. 22-30, 2019. doi: https://doi.org/10.15587/1729-4061.2019.157085. Available:
https://core.ac.uk/download/pdf/288839756.pdf.
[28] S. N. Dorogovtsev, J. F. F. Mendes, "The Nature of Complex Networks," Oxford University Press,
2022.
[29] G. Cimini, T. Squartini, F. Saracco, D. Garlaschelli, A. Gabrielli and G. Caldarelli, "The statistical
physics of real-world networks," Nature Reviews Physics, vol. 1, pp. 58-71, 2019. doi:
https://doi.org/10.1038/s42254-018-0002-6.
[30] A. S. D. Mata, "Complex networks: a mini-review," Brazilian Journal of Physics, vol. 50, pp.
658672, 2020. doi: https://doi.org/10.1007/s13538-020-00772-9.
[31] J. Aweya, "IP Routing Protocols: Link-State and Path-Vector Routing Protocols," 1st ed., CRC</p>
      <p>Press, 2021, 438 p.
[32] Cisco, "IP Routed Protocols," Technology Support, 2022. Available:
https://www.cisco.com/c/en/us/tech/ip/ip-routed-protocols/index.html
[33] A.-L. Barabási and R. Albert, "Emergence of scaling in random networks," Science, vol. 286,
no. 5439, pp. 509-512, 1999. doi: https://doi.org/10.1126/science.286.5439.509.
[34] Cisco, "Dynamic Routing Protocols," Cisco Press, 2001. Available:
https://www.ciscopress.com/articles/article.asp?p=24090&amp;seqNum=4.
[35] Cisco, "Understand Open Shortest Path First (OSPF) – Design Guide," Technology Support, 2022.</p>
      <p>Available:
https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/70391.html.
[36] P. R. Tadimety, "OSPF Messages," in OSPF: A Network Routing Protocol, Berkeley, CA, Apress,
2015. doi: https://doi.org/10.1007/978-1-4842-1410-7_18.
[37] B. Yu, "OSPF-Based Network Engineering Design and Implementation," in Informatics and
Management Science VI, W. Du, Ed. London, Springer, 2013, vol. 209, pp. 131-138. doi:
https://doi.org/10.1007/978-1-4471-4805-0_16.
[38] J. T. Moy, "OSPF: Anatomy of an Internet Routing Protocol," Addison-Wesley Professional, 1998.</p>
      <p>A. Verma and N. Bhardwaj, "A Review on Routing Information Protocol (RIP) and Open Shortest
Path First (OSPF) Routing Protocol," International Journal of Future Generation Communication
and Networking, vol. 9, no. 4, pp. 161-170, 2016.
[39] N. Jain and A. Payal, "Comparison Between IPv4 and IPv6 using OSPF and OSPFv3 on Riverbed
Modeler," in 2019 IEEE International Conference on Advanced Networks and
Telecommunications Systems (ANTS), Goa, India, 2019, pp. 1-7. doi:
https://doi.org/10.1109/ANTS47819.2019.9118101.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Dalal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Seth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Jaglan</surname>
          </string-name>
          , et al.,
          <article-title>"An adaptive traffic routing approach toward load balancing and congestion control in Cloud-MANET ad hoc networks,"</article-title>
          <source>Soft Comput</source>
          , vol.
          <volume>26</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>5377</fpage>
          -
          <lpage>5388</lpage>
          ,
          <year>2022</year>
          . doi: https://doi.org/10.1007/s00500-022-07099-4.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ye</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xue</surname>
          </string-name>
          , and et al.,
          <article-title>"Intelligent routing method based on Dueling DQN reinforcement learning and network traffic state prediction in SDN," Wireless Netw</article-title>
          .,
          <year>2022</year>
          . doi: https://doi.org/10.1007/s11276-022-03066-x.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.J.</given-names>
            <surname>Suárez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nuño</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.C.</given-names>
            <surname>Granda</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.F.</given-names>
            <surname>García</surname>
          </string-name>
          ,
          <article-title>"Computer networks performance modeling and simulation," in M.S</article-title>
          . Obaidat,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nicopolitidis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Zarai</surname>
          </string-name>
          (Eds.),
          <source>Modeling and Simulation of Computer Networks and Systems</source>
          , Morgan Kaufmann,
          <year>2015</year>
          , pp.
          <fpage>187</fpage>
          -
          <lpage>223</lpage>
          . ISBN:
          <volume>9780128008874</volume>
          . doi: https://doi.org/10.1016/B978-0
          <source>-12-800887-4</source>
          .
          <fpage>00007</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. W. A.</given-names>
            <surname>Talib</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Srivastava</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Iqbal</surname>
          </string-name>
          ,
          <article-title>"Network modelling and computation of quickest path for service-level agreements using bi-objective optimization," International journal of distributed sensor networks</article-title>
          , vol.
          <volume>15</volume>
          , no.
          <issue>10</issue>
          ,
          <year>2019</year>
          . doi: http://dx.doi.org/10.1177/1550147719881116.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.-L.</given-names>
            <surname>Barabási</surname>
          </string-name>
          ,
          <string-name>
            <surname>"Network</surname>
            <given-names>Science,</given-names>
          </string-name>
          " Cambridge University Press,
          <year>2018</year>
          , 475 p. Available: http://networksciencebook.com/.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Svyrydov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kovalenko</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Kuchuk</surname>
          </string-name>
          ,
          <article-title>"The pass-through capacity redevelopment method of net critical section based on improvement ON/OFF models of traffic,"</article-title>
          <source>Advanced Information Systems</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>139</fpage>
          -
          <lpage>144</lpage>
          ,
          <year>2018</year>
          . doi: https://doi.org/10.20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2018</year>
          .
          <volume>2</volume>
          .24.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. M.</given-names>
            <surname>Fadlullah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Mao</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Kato</surname>
          </string-name>
          ,
          <article-title>"An Intelligent Traffic Load Prediction-Based Adaptive Channel Assignment Algorithm in SDN-IoT: A Deep Learning Approach,"</article-title>
          <source>in IEEE Internet of Things Journal</source>
          , vol.
          <volume>5</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>5141</fpage>
          -
          <lpage>5154</lpage>
          , Dec.
          <year>2018</year>
          . doi: https://doi.org/10.1109/JIOT.
          <year>2018</year>
          .
          <volume>2838574</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Turky</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Mitschele-Thiel</surname>
          </string-name>
          ,
          <article-title>"Use of load prediction mechanism for dynamic routing optimization,"</article-title>
          <source>2009 IEEE Symposium on Computers and Communications</source>
          , Sousse, Tunisia,
          <year>2009</year>
          , pp.
          <fpage>782</fpage>
          -
          <lpage>786</lpage>
          . doi: https://doi.org/10.1109/ISCC.
          <year>2009</year>
          .
          <volume>5202245</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Choi</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.-Y.</given-names>
            <surname>Yeung</surname>
          </string-name>
          ,
          <article-title>"Predictive Q-Routing: A Memory-based Reinforcement Learning Approach to Adaptive Traffic Control,"</article-title>
          <source>in Advances in Neural Information Processing Systems</source>
          , vol. 8, D. Touretzky, M.C. Mozer, and M. Hasselmo, Eds. MIT Press,
          <year>1995</year>
          , pp.
          <fpage>945</fpage>
          -
          <lpage>951</lpage>
          . Available: https://proceedings.neurips.cc/paper/1995/file/4e2545f819e67f0615003dd7e04a6087- Paper.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Molnar</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Terdik</surname>
          </string-name>
          ,
          <article-title>"A general fractal model of Internet traffic,"</article-title>
          <source>Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks</source>
          , Tampa, FL, USA,
          <year>2001</year>
          , pp.
          <fpage>492</fpage>
          -
          <lpage>499</lpage>
          . doi: https://doi.org/10.1109/LCN.
          <year>2001</year>
          .
          <volume>990828</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Chakraborty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ashir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Suganuma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. Mansfield</given-names>
            <surname>Keeni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. K.</given-names>
            <surname>Roy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shiratori</surname>
          </string-name>
          ,
          <article-title>"Self-similar and fractal nature of Internet traffic,"</article-title>
          <source>Network Management</source>
          , vol.
          <volume>14</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>119</fpage>
          -
          <lpage>129</lpage>
          ,
          <year>2004</year>
          . doi: https://doi.org/10.1002/nem.512.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>W. E.</given-names>
            <surname>Leland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Willinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Taqqu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Wilson</surname>
          </string-name>
          ,
          <article-title>"On the self-similar nature of Ethernet traffic,"</article-title>
          <source>SIGCOMM Comput. Commun. Rev.</source>
          , vol.
          <volume>25</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>202</fpage>
          -
          <lpage>213</lpage>
          , Jan.
          <year>1995</year>
          . doi: https://doi.org/10.1145/205447.205464.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>H.</given-names>
            <surname>Drieieva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Drieiev</surname>
          </string-name>
          , Ye. Meleshko,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yakymenko</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Mikhav</surname>
          </string-name>
          ,
          <article-title>"A method of determining the fractal dimension of network traffic by its probabilistic properties and experimental research of the quality of this method," CEUR-WS</article-title>
          , vol.
          <volume>3171</volume>
          ,
          <string-name>
            <surname>Gliwice</surname>
          </string-name>
          , Poland,
          <year>2022</year>
          , pp.
          <fpage>1694</fpage>
          -
          <lpage>1707</lpage>
          . Available: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3171</volume>
          /paper120.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Alshehri</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <article-title>" Fractal Characteristics of Network Traffic and Its Correlation with Network Security,"</article-title>
          <source>Fractals</source>
          , vol.
          <volume>30</volume>
          , no.
          <issue>02</issue>
          ,
          <year>2021</year>
          . doi: http://dx.doi.org/10.1142/S0218348X22400679.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Millán Naveas</surname>
          </string-name>
          , E. San Juan Urrutia, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Vargas Guzmán</surname>
          </string-name>
          ,
          <article-title>"A simple multifractal model for self-similar traffic flows in high-speed computer networks,"</article-title>
          <source>Computación y Sistemas</source>
          , vol.
          <volume>23</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>1517</fpage>
          -
          <lpage>1521</lpage>
          ,
          <year>2019</year>
          . doi: https://doi.org/10.13053/cys-23-4-2831.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>P.-C.G. Vassiliou</surname>
            and
            <given-names>A. C.</given-names>
          </string-name>
          <string-name>
            <surname>Georgiou</surname>
          </string-name>
          ,
          <article-title>"Markov and Semi-markov Chains, Processes, Systems and Emerging Related Fields,"</article-title>
          <source>Mdpi AG</source>
          ,
          <volume>294</volume>
          p.,
          <year>2021</year>
          . doi: https://doi.org/10.3390/math9192490.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Farahani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A</given-names>
            <surname>Shoja</surname>
          </string-name>
          . and
          <string-name>
            <given-names>H.</given-names>
            <surname>Tohidi</surname>
          </string-name>
          ,
          <article-title>"Markov and semi-Markov models in system reliability," In Engineering Reliability and Risk Assessment</article-title>
          , Elsevier, pp.
          <fpage>91</fpage>
          -
          <lpage>130</lpage>
          ,
          <year>2023</year>
          . doi: https://doi.org/10.1016/B978-0
          <source>-323-91943-2</source>
          .
          <fpage>00010</fpage>
          -
          <lpage>1</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Yue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Sun</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Zuo</surname>
          </string-name>
          ,
          <article-title>" Analysis of the Queueing-Inventory System with Impatient Customers and Mixed Sales," Discrete Dynamics in Nature and Society</article-title>
          , vol.
          <year>2022</year>
          ,
          <year>2022</year>
          . doi: https://doi.org/10.1155/
          <year>2022</year>
          /2333965.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Ye. Meleshko</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Raskin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Semenov</surname>
            , and
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Sira</surname>
          </string-name>
          ,
          <article-title>"Methodology of probabilistic analysis of state dynamics of multi-dimensional semi-Markov dynamic systems,"</article-title>
          <source>Eastern-European Journal of Enterprise Technologies</source>
          , vol.
          <volume>6</volume>
          , no.
          <volume>4</volume>
          (
          <issue>102</issue>
          ), pp.
          <fpage>6</fpage>
          -
          <lpage>13</lpage>
          ,
          <year>2019</year>
          . Available: https://www.scopus.com/record/display.uri?eid=
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85078054250</lpage>
          &amp;origin=resultslist.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Ye. Meleshko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Drieiev</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Yakymenko</surname>
            and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Lysytsia</surname>
          </string-name>
          ,
          <article-title>"Developing a model of the dynamics of states of a recommendation system under conditions of profile injection attacks,"</article-title>
          <source>EasternEuropean Journal of Enterprise Technologies</source>
          , vol.
          <volume>4</volume>
          , no.
          <volume>2</volume>
          (
          <issue>106</issue>
          ), pp.
          <fpage>14</fpage>
          -
          <lpage>24</lpage>
          ,
          <year>2020</year>
          . Available: https://www.scopus.com/record/display.uri?eid=
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85096707995</lpage>
          &amp;origin=resultslist.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>M.</given-names>
            <surname>Albahar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Thanoon</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Albahr</surname>
          </string-name>
          ,
          <article-title>"The use of fractal dimension (FD) analysis in detection of anomalies, sabotages, and malicious acts in a cyber-physical system using Higuchi's algorithm,"</article-title>
          <source>International Journal on Information Technologies &amp; Security</source>
          , vol.
          <volume>14</volume>
          , no.
          <issue>2</issue>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gavrylenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Chelak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Нornostal</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Gornostal</surname>
          </string-name>
          ,
          <article-title>"Identification of the computer system state based on multidimensional discriminant analysis,"</article-title>
          <source>in Proceedings of the 29th International Scientific Symposium Metrology and Metrology Assurance</source>
          , Sozopol, Bulgaria,
          <year>2019</year>
          . doi: https://doi.org/10.1109/MMA.
          <year>2019</year>
          .
          <volume>8936011</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>