20 research outputs found

    Numerical Methods of Multifractal Analysis in Information Communication Systems and Networks

    Get PDF
    In this chapter, the main principles of the theory of fractals and multifractals are stated. A singularity spectrum is introduced for the random telecommunication traffic, concepts of fractal dimensions and scaling functions, and methods used in their determination by means of Wavelet Transform Modulus Maxima (WTMM) are proposed. Algorithm development methods for estimating multifractal spectrum are presented. A method based on multifractal data analysis at network layer level by means of WTMM is proposed for the detection of traffic anomalies in computer and telecommunication networks. The chapter also introduces WTMM as the informative indicator to exploit the distinction of fractal dimen- sions on various parts of a given dataset. A novel approach based on the use of multifractal spectrum parameters is proposed for estimating queuing performance for the generalized multifractal traffic on the input of a buffering device. It is shown that the multifractal character of traffic has significant impact on queuing performance characteristics

    Principles of Modeling in Information Communication Systems and Networks

    Get PDF
    The authors present in this entry chapter the basic rubrics of models, modeling, and simulation, an un- derstanding of which is indispensible for the comprehension of subsequent chapters of this text on the all-important topic of modeling and simulation in Information Communication Systems and Networks (ICSN). A good example is the case of analyzing simulation results of traffic models as a tool for investigat- ing network behavioral pattarns as it affects the transmitted content (Atayero, et al., 2013). The various classifications of models are discussed, for example classification based on the degree of semblance to the original object (i.e. isomorphism). Various fundamental terminologies without the knowledge of which the concepts and models and modeling cannot be properly understood are explained. Model stuctures are highlighted and discussed. The methodological basis of formalizing complex system structures is presented. The concept of componential approach to modeling is presented and the necessary stages of mathematical model formation are examined and explained. The chapter concludes with a presentation of the concept of simulation vis-Ă -vis information communication systems and networks

    Modeling, Simulation and Analysis of Video Streaming Errors in Wireless Wideband Access Networks

    Get PDF
    Analysis of simulated models has become a veritable tool for investigating network behavioral patterns vis-Ă -vis transmitted content. The streaming video research domain employs modeling extensively due to availability of relevant tools. A vast majority of which are presented on the FOSS platform. The transmission of audio and video streaming services over different media is becoming ever more popular. This widespread increase is accompanied by the difficult task of maintaining the QoS of streaming video. The use of very accurate coding techniques for transmissions over wireless networks alone cannot guarantee a complete eradication of distortions characteristic of the video signal. A software- hardware composite system has been developed for investigating the effect of single bit error and bit packet errors in wideband wireless access systems on the quality of H.264/AVC standard video streams. Numerical results of the modeling and analysis of the effect of interference robustness on quality of video streaming are presented and discussed. Analytic results also suggest that the Markov model of packetization of error obtained from a real network for streaming video can be used in the simulations of transmission of video across networks in the hardware- software complex developed by the authors in a previous work

    Effect of Video Streaming Space–Time Characteristics on Quality of Transmission over Wireless Telecommunication Networks

    Get PDF
    The spate in popularity of multimedia applications has led to the need for optimization of bandwidth allocation and usage in telecommunication networks. Modern telecommunication networks should by their definition be able to maintain the quality of different applications with different Quality of Service (QoS) levels. QoS requirements are generally dependent on the parameters of network and application layers of the OSI model. At the application layer QoS depends on factors such as resolution, bit rate, frame rate, video type, audio codecs, etc. At the network layer, distortions such as delay, jitter, packet loss, etc. are introduced. This paper presents simulation results of modeling video streaming over wireless communications networks. The differences in spatial and time characteristics of the different subject groups were taken into account. Analysis of the influence of bit error rate (BER) and bit rate for video quality is also presented. Simulation showed that different video subject groups affect the perceived quality differently when transmitted over networks. We show conclusively that in a transmission network with a small error probabilities (BER = 10-6, BER = 10-5), the minimum bit rate (128 kbps) guarantees an acceptable video quality, corresponding to MOS > 3 for all types of frames

    Using Algebraic Fractals in Steganography

    Get PDF
    Steganography is a technology for hiding watermarks inside media files, which is relevant in the field of copyright protection, secret communication, etc. The effectiveness of modern methods of digital image processing allows determining the presence of embedded watermarks in a stegoimage using the original image and its statistical characteristics, as well as a priori information about the method and algorithm of embedding. In contrast to the known approaches, it is proposed to use algebraic fractals for steganographic embedding of watermarks in color images. It is proposed to use algebraic fractals in the form of medium cover image acting as a secret key, which allows the embedding to be more resistant to computer attacks, including JPEG compression. The main advantage of such use of fractals is an increase in the level of secrecy in which the attacker must know the parameters of the fractal image. Without knowledge of these parameters, it will not be enough to have the original stegoimage and a priori information about the embedding method to extract secret data. This chapter analyzes the methods and provides examples of generating algebraic fractals in the form of the Julia set using the escape time algorithm

    Markov Models of Telephone Speech Dialogues

    Get PDF
    Analogue speech signals are the most natural form of communication among humans. The contemporary methods adopted for the analysis of voice transmission by packet switching were designed mainly with respect to a Poisson stream of input packets, for which the probability of an active packet on each input port of the router is a constant value in time. An assumption that is not always valid, since the formation of speech packets during a dialogue is a non-stationary process, in which case mathematical modeling becomes an effective method of analysis, through which necessary estimates of a network node being designed for packet transmission of speech may be obtained. This paper presents the result of analysis of mathematical models of Markov chain based speech packet sources vis-Ă -vis the peculiarities of telephone dialogue models. The derived models can be employed in the design and development of methods of statistical multiplexing of packet switching network nodes

    Effect of Wideband Wireless Access Systems Interference Robustness on the Quality of Video Streaming

    Get PDF
    The transmission of audio and video streaming services over different conduits (wireless access systems, Internet, etc.) is becoming ever more popular. This widespread increase is accompanied by the attendant new and difficult task of maintaining the quality of service of streaming video. The use of very accurate coding techniques for transmissions over wireless networks alone cannot guarantee a complete eradication of distortions characteristic of the video signal. A software-hardware composite system has been developed for investigating the effect of single bit error and bit packet errors in wideband wireless access systems on the quality of H.264/AVC standard bursty video streams. Numerical results of the modeling and analysis of the effect of interference robustness on quality of video streaming are presented and discussed

    Markov Models of Statistical Multiplexing of Telephone Dialogue with Packet Switching

    Get PDF
    Existing methods of analysis of voice transmission by packet switching were designed mainly with respect to a Poisson stream of input packets, for which the probability of an active packet on each input port of the router is a constant value in time. This assumption is not always valid, since the formation of speech packets during a dialogue is a nonstationary process, in which case mathematical modeling becomes an effective method of analysis, through which necessary estimates of a network node being designed for packet transmission of speech may be obtained. This paper presents the result of analysis of mathematical models of Markov chain based speech packet sources vis-Ă -vis the peculiarities of telephone dialogue models. The derived models can be employed in the design and development of methods of statistical multiplexing of packet switching network nodes

    Estimating Markov Model Parameters from Statistical Analysis of Speech Packets Transmitted over BWA Networks

    Get PDF
    The main problem encountered in the design of Markov models is in choosing the adequate mathematical model for their representation. Analysis of the mathematical models of speech packet sources was conducted on the basis of Markov chains. The specific characteristics of telephony dialogue and monologue were taken into consideration. These in their turn can be used in the design of methods of statistical companding of packet communication nodes. In this paper we show that the choice of the number of states of the Markov chain as well as their probabilistic characteristics can be estimated from the results of the statistical processing of speech packets transmitted over Broadband Wireless Access Networks (BWAN). Keywords: Markov models, Wireless network, Speech processing, Packet switching, Mathematical model

    Modeling and simulation with operator scaling

    Get PDF
    Self-similar processes are useful in modeling diverse phenomena that exhibit scaling properties. Operator scaling allows a different scale factor in each coordinate. This paper develops practical methods for modeling and simulating stochastic processes with operator scaling. A simulation method for operator stable Levy processes is developed, based on a series representation, along with a Gaussian approximation of the small jumps. Several examples are given to illustrate practical applications. A classification of operator stable Levy processes in two dimensions is provided according to their exponents and symmetry groups. We conclude with some remarks and extensions to general operator self-similar processes.Comment: 29 pages, 13 figure
    corecore