Proceedings of International Conference on Applied Innovation in IT
2023/11/30, Volume 11, Issue 2, pp.11-18

Methods of Spline Functions in Solving Problems of Telecommunication and Information Technologies


Irina Strelkovskaya, Irina Solovskaya and Juliya Strelkovska


Abstract: The solution to problems of telecommunications and information technologies using spline approximation and spline extrapolation based on real and complex spline functions is considered. The use of spline approximation for solving problems of signal recovery and self-similar traffic, processes of functioning of telecommunication nodes and networks is shown. It is proposed to use spline extrapolation based on various types of real spline functions to solve the problems of predicting the characteristics of self-similar traffic and maintaining QoS characteristics during its maintenance. It has been established that to predict the real-time telemetry traffic of IoT devices, it is advisable to use spline extrapolation based on the cubic Hermite spike, which ensures the required forecasting accuracy and prevents network overloads, especially under conditions of network load limit. To solve the problem of user positioning in the radio access area, the use of complex plane spline functions is considered. The use of the methods of real and complex spline functions allows for obtaining the results of improving the quality of service in a telecommunications network and ensuring the scalability of the obtained solutions. To identify and predict DDoS cyber-attacks, a spline extrapolation method is used. The use of parametric splines in the problems of information technology, namely, the construction of curves and surfaces in 3D modelling, is proposed.

Keywords: Spline Approximation, Spline Extrapolation, Real Spline Functions, Complex Spline Functions, Cubic Spline Function, Quadratic Spline Function, Hermite Cubic Spline, Signal Recovery, Forecasting, Self-Similar Traffic, IoT Device Telemetry Traffic, QoS Characteristics, Local User Location, DDoS Cyber-Attacks, Parametric Splines, 3D Modelling.

DOI: 10.25673/112989

Download: PDF

References:

  1. M. Ilchenko, L. Uryvsky, and A. Moshynska, "Developing of telecommunication strategies based on the scenarios of the information community," Cybern. Syst. Anal. 53, pp. 905-913, 2017. [Online]. Available: https://doi.org/10.1007/s10559-017-9992-9.
  2. M. Ilchenko, L. Uryvsky, and S. Osypchuk, "World trends of modern information and telecommunication technologies development," In: International Conference on Radio Electronics & Info Communications: Odesa, Ukraine, 2019.
  3. L. Globa, S. Dovgiy, O. Kopiika, and O. Kozlov, "Approach to uniform platform development for the ecology digital environment of Ukraine," In: Ilchenko, M., Uryvsky, L., Globa, L. (eds.) Progress in Advanced Information and Communication Technology and Systems. MciT 2021. Lecture Notes in Networks and Systems, vol. 548, pp. 83-100, 2023. [Online]. Available: https://doi.org/10.1007/978-3-031-16368-5_4.
  4. J. Donovan, "Building the Network of the Future: Getting Smarter, Faster, and More Flexible with a Software Centric Approach," Donovan John, Prabhu Krish (eds.). Chapman and Hall/CRC, 2017.
  5. O. Lemeshko, O. Yeremenko, and M. Yevdokymenko, "Tensor Model of Fault-Tolerant QoS Routing with Support of Bandwidth and Delay Protection," In: XIIIth International Scientific and Technical Conference Computer Sciences and Information Technologies, pp. 135-138, 2018.
  6. O. V. Lemeshko, O. S. Yeremenko, N. Tariki, and A.M. Hailan, "Fault-tolerance improvement for core and edge of IP network," 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT), Lviv, Ukraine, 2016, pp. 161-164.
  7. O. Lemeshko, O. Yeremenko, M. Yevdokymenko, A. Shapovalova, A. M. Hailan, and A. Mersni, "Cyber Resilience Approach Based on Traffic Engineering Fast ReRoute with Policing," 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Metz, France, 2019, pp. 117-122, doi: 10.1109/IDAACS.2019.8924294.
  8. L. Uryvsky and K. Martynova, "Complex analytical model of priority requires service on cloud server," International Conference on Information and Tele-communication Technologies and Radio Electronics (UkrMiCo-2019), 9-13 Sept. 2019, Odesa, Ukraine. [Online]. Available: https://doi.org/10.1109/ UkrMiCo47782.2019.9165323.
  9. I.V. Strelkovskaya, E.V. Lysyuk and R.V. Zolotukhin, "Comparative analysis of restoration of continuous signals by Kotelnikov series and spline functions," East-European Journal of Advanced Technologies, vol. 2, no. 9(62), 2013, pp. 12-15.
  10. I. Strelkovskaya, I. Solovskaya, N. Severin, and S. Paskalenko, "Spline approximation based restoration for self-similar traffic," Eastern-European Journal of Enterprise Technologies, 2017, no. 3/4 (87), pp. 45-50.
  11. I. Strelkovskaya and I. Solovskaya, "Using spline-extrapolation in the research of self-similar traffic characteristics," Journal of Electrical Engineering, vol. 70, no. 4, 2019, pp. 310-316.
  12. I. Strelkovskaya, "Fingerprinting/Indoor positioning using complex planar splines," Journal of Electrical Engineering, vol. 72, 2021, no. 6, pp. 401-406. [Online]. Available: https://doi.org/10.2478/jee-2021-0057.
  13. V.I. Belyi and I.V. Strelkovskaya, "Approximation of functions by analytic complex splines in domains quasiconformal boundary," Ukrainian Mathematical Journal, vol. 40, no. 5, 1988, pp. 481-486.
  14. S. Kivalov and I. Strelkovskaya, "Detection and prediction of DDoS cyber attacks using spline functions," IEEE TCSET 2022: 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), Slavske, Ukraine, February 22 – 26, 2022.
  15. J.H. Ahlberg, E.N. Nilson, and J.L. Walsh, "The Theory of Splines and Their Applications," Academic Press, New York, 1967.
  16. S.H. Hameedah, M. Hussein, S. Mad Saad, and A. MatDzahir, "An overview of local positioning system: technologies, techniques and applications," Int. J. Eng. Technol., vol. 7, no. 3, 2018, pp. 1-5. [Online]. Available: https://doi.org/10.14419/ ijet.v7i3.25.17459.
  17. F. Gu, et al., "Indoor localization improved by spatial contexts. A survey," ACM Comput. Surv., vol. 52, no. 3(64), 2019, pp. 1-35. [Online]. Available: https://doi.org/10.1145/3322241.
  18. Q. Yang, S. Zheng, M. Liu, et al., "Research on Wi-Fi indoor positioning in a smart exhibition hall based on received signal strength indication," Jur. Wirel. Commun. Netw., no. 275, 2019, [Online]. Available: https://doi.org/10.1186/s13638-019-1601-3.
  19. G. Opfer and M. Puri, "Complex planar splines," J. Approxim. Theory, vol. 31, no. 4, 1981, pp. 383-402.
  20. L.L. Schumaker, "Spline Functions: Basic Theory," Cambridge University Press, New York, 2007.
  21. D. Evans, "The Internet of Things. How the Next Evolution of the Internet Is Changing Everything," Cisco White Paper, April, 2011.
  22. J. Mocnej, А. Pekar, W. K.G. Seah, and I. Zolotova, "Network Traffic Characteristics of the IoT Application Use Cases," School of Engineering and Computer Science, Victoria University of Wellington, 2018.
  23. F. Tang, Z. Md. Fadullah, B. Mao, and N. Kato, "An Intelligent Traffic Load Prediction-Based Adaptive Channel Assignment Algoritm in SDN-IoT: A Deep Learning Approach," IEEE Internet of Things Journal, vol. 5, no. 6, 2018. [Online]. Available: https://doi.org/10.1109/JIOT.2018.2838574.
  24. M.F. Iqbal, M. Zahid, D. Habib, and L.K. John, "Efficient Prediction ob Network Traffic for Real-Time Applications," Journal of Computer Networks and Communications, vol. 1, 2019. [Online]. Available: https://doi.org/10.1155/2019/4067135.
  25. N.S. Khan, S. Ghani, S. Haider, and N.S. Khan, "Real-Time Analysis of a Sensor’s Data for Automated Decision Making in an IoT-Based Smart Home," Sensors (Basel), vol. 18, no. 6, 2018. [Online]. Available: https://doi.org/10.3390/s18061711.
  26. M. Pivarníková, P. Sokol, and T. Bajtoš, "Early-Stage Detection of Cyber Attacks," Information, vol. 11, 2020, p. 560.
  27. D. Alghazzawi, O. Bamasag, H. Ullah, and M.Z. Asghar, "Efficient Detection of DDoS Attacks Using a Hybrid Deep Learning Model with Improved Feature Selection," Appl. Sci., vol. 11, 2021, p. 11634.
  28. T. Radivilova, L. Kirichenko, O. Lemeshko, et al., "Analysis of anomaly detection and identification methods in 5G traffic," 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021.
  29. B. Petrik and V.I. Dubrovin, "Detection of DoS attacks in network traffic by wavelet transform," Applied questions of mathematical modelling, vol. 4, no. 1, 2021, pp. 186-196. [Online]. Available: https://doi.org/10.32782/KNTU2618-0340/ 2021.4.1.20.
  30. P. Dymora and M. Mazurek, "Network Anomaly Detection Based on the Statistical Self-similarity Factor," Lecture Notes in Electrical Engineering, vol. 324(1), 2021, pp. 271-287. [Online]. Available: https://doi.org/10.1007/978-3-319-11248-0_21.


    HOME

       - Call for Papers
       - Paper Submission
       - For authors
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 12, Issue 1 (ICAIIT 2024)        - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

DOI: http://dx.doi.org/10.25673/115729


        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.