Random Number Generator with Long-Range Dependence and Multifractal Behavior Based on Memristor

: Random number generators are used in areas such as encryption and system modeling, where some of these exhibit fractal behaviors. For this reason, it is interesting to make use of the memristor characteristics for the random number generation. Accordingly, the objective of this article is to evaluate the performance of a chaotic memristive system as a random number generator with fractal behavior and long-range dependence. To achieve the above, modeling memristor and its corresponding chaotic systems is performed, from which a random number generator is constructed. Subsequently, the Hurst parameter for the detection of long-range dependence is estimated and a fractal analysis of the synthesized data is performed. Finally, a comparison between the model proposed in the research and the β -MWM algorithm is made. The results obtained show that the data synthesized from the proposed generator have a variable Hurst parameter and both monofractal and multifractal behavior. The main contribution of this research is the proposal of a new model for the synthesis of traces with long-range dependence and fractal behavior based on the non-linearity of the memristor.


Introduction
Random number generators (RNGs) are currently used to encrypt information and model natural processes. In the encryption area, RNGs allow to encoding information that is transmitted from one point to another without running the risk of being deciphered by an external agent. To achieve this, complex encryption processes are required to decipher the information only through the encryption key. In most cases, this encryption key is a combination of a data sequence with the information to be transmitted [1]. These sequences must be sufficiently long and random enough, in addition to presenting independence between the generated values [2]. For the generation of independent random numbers, the inverse transformation method can be used: a uniformly distributed random number is generated, with parameters 0 and 1, and it is evaluated in the desired quantile function (the inverse of the cumulative function). Now, although the inverse transformation method solves the problem of the type of distribution, it only allows the generation of independent random numbers and, consequently, it is not suitable for modeling natural processes that are highly correlated and that show dependencies between the different scales; for example: detection of climate zones [3], market behavior [4] and video traffic in Moving Picture Experts Group 4 (MPEG-4) [5]. the existence of the monofractal/multifractal behavior of a memristor-based RNG is detected, it is shown that its characteristics can be modified and it is shown what could be done to achieve it.
The rest of the article is structured as follows. Section 2 mentions some of the works related to the topic of RNGs, long-range dependence and multifractal analysis. Section 3 describes the methodology used. Subsequently, Section 4 presents the results achieved in the investigation. And finally, Section 5 presents the conclusions and future work.

Related Work
In the field of chaotic systems, several works describing different memory circuits and functions have been published. In principle, Cruz and Chua [20] mathematically develop a chaotic system using a device which was called the Chua diode. Subsequently, Muthuswamy and Chua [19] generated another chaotic oscillator using a memristor. From this, several authors have made modifications both in the memory function memconductance and in the circuit for specific applications. For example, in [21,22] new functions are implemented to generate chaotic systems. In 2016 and 2017 new circuits were proposed for encryption and decryption of images and texts [23].
Through the previous investigations, several RNGs have been built. Some of these proposals can be studied in [24,25], where RNGs are implemented based on a chaotic signal emulated by an FPGA and sampling the signal presented in [19]. The result of both articles is the implementation of a system capable of approving the National Institute of Standards and Technology (NIST) test bench for its application in computer security systems.
Other generators are exposed by Melgarejo and Piraján [26], who propose a random number generator from a noisy signal emanating from a Zener diode, obtaining a generator with normal or uniform distribution and with particular statistical characteristics; and Li et al. [27], who built a RNGs based on a chaotic signal emanated by a laser, with the possibility of generating random bits every 10 Gb/s.
On the other hand, Leland et al. [7] observed the self-similar nature of Ethernet traffic, showing that such traffic is statistically self-similar and showing that the degree of self-similarity is an indication of traffic variability, estimated in terms of the Hurst parameter. What was stated by [7] allowed to conclude that the models used until that moment were incapable of capturing this property, opening the way to the characterization and modeling of modern traffic. This need led to the study of fractal traffic through the Wavelet transform [18][19][20][21][28][29][30][31]. For this reason, Riedi et al. [10] proposed a wavelet multifractal model (WMM) which characterizes and synthesizes positive data with long-range dependence (LRD) and Tuberquia et al. [32] made an algorithm to generate multifractal time series with Hurst parameter and multifractal spectrum width, sample and adjustable.
As evidenced in the previous paragraphs, there are no works that generate random numbers based on a chaotic system with LRD and that exhibit fractal behavior. Related investigations allow the generation of random numbers without performing the fractal analysis of the synthesized traces. In this research a proposal of a model that starts from a physical signal to generate traces with said behaviors is developed.

Materials and Methods
The scheme of Figure 1 represents the methodology used in this investigation. Initially, the memristor device is introduced, which allows it (from its non-linear behavior) to generate the chaotic systems implemented as physical signals for the proposed RNG model, which synthesizes the traces of data to be analyzed. Subsequently, the NIST test bench is used to measure the degree of randomness of the synthesized data [7]. Some sequences were estimated with the Hurst parameter (H) for the detection of LRD from two tools: the variance-time diagram (VT) and the log-scale diagram (LD). The first calculates the moments of aggregation and the autocovariance of the process X[k] [33]. The second computes the average of the detail coefficients of the discrete wavelet transform [25,26]. If these traces have long-range dependence, they can be classified as single-or multifractal with multiscale (MD) and Electronics 2020, 9, 1607 4 of 24 linear multiscale (LMD) diagrams [25,27]. Similarly, the multifractal spectrum (MS) allows analyzing fractal processes from the Legendre transform [10], providing information on the data trace, such as its fractal dimension, spectrum width and information dimension, among others [34][35][36][37].

Memristor
In the decade of the 60s research was started on a device that would represent the link lost in the relation of the four circuital variables exposed in the deduction of Faraday's law of induction: voltage v, current i, flux ϕ and charge q [38]. It was then that Widrow [39] developed a new device called a memistor. This is a three-terminal device, for which the conductance between two of its terminals is controlled by the time integral of the current at the third terminal, and its resistance by the charge. Chua [18], who is considered the father of non-linear circuits, predicted the existence of a missing element that would relate the charge to the flux. To this element Professor Chua called it memristor. The memristor is a nonlinear two terminal device that directly relates flux and charge. There are two models of memristor: one controlled by charge and another controlled by flux, which are described in Equations (1) and (2).
Chua [18] named the function M(q(t)) as the memristive and W(φ(t)) as the memductance. For a device to be considered memristor, it must comply with the following characteristics [31,32]:

•
The device must exhibit a pinched hysteresis loop in the voltage-current plane for some period of excitation signal.

•
The area of the pinched hysteresis lobe should decrease monotonically with excitations of increments in frequency.

•
The pinched hysteresis loop must shrink to a simple function value when the frequency tends to infinity.

Memristor
In the decade of the 60s research was started on a device that would represent the link lost in the relation of the four circuital variables exposed in the deduction of Faraday's law of induction: voltage v, current i, flux φ and charge q [38]. It was then that Widrow [39] developed a new device called a memistor. This is a three-terminal device, for which the conductance between two of its terminals is controlled by the time integral of the current at the third terminal, and its resistance by the charge. Chua [18], who is considered the father of non-linear circuits, predicted the existence of a missing element that would relate the charge to the flux. To this element Professor Chua called it memristor. The memristor is a nonlinear two terminal device that directly relates flux and charge. There are two models of memristor: one controlled by charge and another controlled by flux, which are described in Equations (1) and (2).
Chua [18] named the function M(q(t)) as the memristive and W(ϕ(t)) as the memductance. For a device to be considered memristor, it must comply with the following characteristics [31,32]: Electronics 2020, 9, 1607 5 of 24

•
The device must exhibit a pinched hysteresis loop in the voltage-current plane for some period of excitation signal.

•
The area of the pinched hysteresis lobe should decrease monotonically with excitations of increments in frequency.

•
The pinched hysteresis loop must shrink to a simple function value when the frequency tends to infinity.

Chaotic Systems
In this section, the chaotic systems that synthesize the input signals for the random number generator, based on memristor as a device that provides the non-linearity, are presented. Each system displays the phase diagram of two electrical variables measured in their respective electrical circuit, in addition to presenting the system of equations that describe it.

System 1
One of the first circuits proposed by Cruz and Chua [20] as a generator of chaotic systems is shown in Figure 2a, with the phase diagram of Figure 2b. Cruz and Chua [20] used the Chua diode for this purpose, which emulates a linear piecewise function in the form of a current that depends on the potential differential between its two terminals. The mathematical development of Figure 2a is shown in Equation (3).

Chaotic Systems
In this section, the chaotic systems that synthesize the input signals for the random number generator, based on memristor as a device that provides the non-linearity, are presented. Each system displays the phase diagram of two electrical variables measured in their respective electrical circuit, in addition to presenting the system of equations that describe it.

System 1
One of the first circuits proposed by Cruz and Chua [20] as a generator of chaotic systems is shown in Figure 2a, with the phase diagram of Figure 2b. Cruz and Chua [20] used the Chua diode for this purpose, which emulates a linear piecewise function in the form of a current that depends on the potential differential between its two terminals. The mathematical development of Figure 2a     Chaotic generators have been used for the encryption and decryption of information. Yang et al. [23] designed and implemented a chaotic circuit (Figure 3a) in which the memristive is a piecewise linear function, similar to the one exposed in the Chua diode. Yang et al. [23] describe the steps to encrypt and decrypt text and images. The structure of the circuit is presented in Figure 3b, which is generated by Equation (4).

Random Number Generator (RNG)
Below the procedure for generating a sequence of random numbers from a chaotic input signal is explained. The starting point lies in the model presented by Li et al. [27] (Figure 4), to which modifications have been made including the proposal of Corinto et al. [25] to synthesize data with greater randomness. The degree of randomness is measured with the NIST test bench.
The block diagram of Figure 4 shows the process for an RNG dependent on a chaotic signal (for example, emitted by a laser beam) [27]. In this investigation the chaotic signal will be generated by the two systems presented previously.
The resolution of the analog to digital converter (ADC) block depends on the n-bits of the converter, allowing to distinguish values closer to each other with a larger number of bits. This suggests that at a high sampling rate, an ADC with low resolution will allow the conversion of

Random Number Generator (RNG)
Below the procedure for generating a sequence of random numbers from a chaotic input signal is explained. The starting point lies in the model presented by Li et al. [27] (Figure 4), to which modifications have been made including the proposal of Corinto et al. [25] to synthesize data with greater randomness. The degree of randomness is measured with the NIST test bench.
The block diagram of Figure 4 shows the process for an RNG dependent on a chaotic signal (for example, emitted by a laser beam) [27]. In this investigation the chaotic signal will be generated by the two systems presented previously.
The resolution of the analog to digital converter (ADC) block depends on the n-bits of the converter, allowing to distinguish values closer to each other with a larger number of bits. This suggests that at a high sampling rate, an ADC with low resolution will allow the conversion of consecutive equal data, decreasing the randomness of the generator. Therefore, it is necessary to add an intermediate block that reduces the sampling rate depending on the number of bits of the converter to eliminate unnecessary information from the chaotic signal sampled. A normalization block is also added in Electronics 2020, 9, 1607 7 of 24 order to decrease the sampling rate of the multitasking processor. The calculation of this rate is shown in Equations (5) and (6).
The intention of the Equation (5) is to find the biggest difference between consecutive data of the sampled signal and normalized input, in order to reduce the sampling rate using the limit values of the signal and this difference, without neglecting the number of bits of the ADC. This value must be calculated a priori and reduced to a constant. The modifications are presented in Figure 5.
The intention of the Equation (5) is to find the biggest difference between consecutive data of the sampled signal and normalized input, in order to reduce the sampling rate using the limit values of the signal and this difference, without neglecting the number of bits of the ADC. This value must be calculated a priori and reduced to a constant. The modifications are presented in Figure 5.  In order to grant more randomness to the RNG, inspired by [25], the generator combines the first three state variables of each chaotic system, sampled with the process of Figure 5 and generates a unique binary sequence. Following, a b-bits DAC and another normalization block are inserted at the output to deliver discrete numbers in a wider range to the binary (W[K] ∈ [0,1]). Figure 4 is extended to Figure 6 with these modifications.

NIST Tests
The NIST test bench, described in [49,50] consists of fifteen (15) statistical tests to prove the randomness of binary (arbitrarily long) sequences produced by random or pseudo-random generators based on software or hardware, to be implemented in applications of information encryption. The data synthesized by the generator is subjected to these tests in order to discard traces with low approval rate. The tests that the bank performs are: The runs test; • Tests for the longest-run-of-ones in a block; The intention of the Equation (5) is to find the biggest difference between consecutive data of the sampled signal and normalized input, in order to reduce the sampling rate using the limit values of the signal and this difference, without neglecting the number of bits of the ADC. This value must be calculated a priori and reduced to a constant. The modifications are presented in Figure 5.  In order to grant more randomness to the RNG, inspired by [25], the generator combines the first three state variables of each chaotic system, sampled with the process of Figure 5 and generates a unique binary sequence. Following, a b-bits DAC and another normalization block are inserted at the output to deliver discrete numbers in a wider range to the binary (W[K] ∈ [0,1]). Figure 4 is extended to Figure 6 with these modifications.

NIST Tests
The NIST test bench, described in [49,50] consists of fifteen (15) statistical tests to prove the randomness of binary (arbitrarily long) sequences produced by random or pseudo-random generators based on software or hardware, to be implemented in applications of information encryption. The data synthesized by the generator is subjected to these tests in order to discard traces with low approval rate. The tests that the bank performs are: Tests for the longest-run-of-ones in a block; In order to grant more randomness to the RNG, inspired by [25], the generator combines the first three state variables of each chaotic system, sampled with the process of Figure 5 and generates a unique binary sequence. Following, a b-bits DAC and another normalization block are inserted at the output to deliver discrete numbers in a wider range to the binary (W[K] ∈ [0, 1]). Figure 4 is extended to Figure 6 with these modifications.
The intention of the Equation (5) is to find the biggest difference between consecutive data of the sampled signal and normalized input, in order to reduce the sampling rate using the limit values of the signal and this difference, without neglecting the number of bits of the ADC. This value must be calculated a priori and reduced to a constant. The modifications are presented in Figure 5.  In order to grant more randomness to the RNG, inspired by [25], the generator combines the first three state variables of each chaotic system, sampled with the process of Figure 5 and generates a unique binary sequence. Following, a b-bits DAC and another normalization block are inserted at the output to deliver discrete numbers in a wider range to the binary (W[K] ∈ [0,1]). Figure 4 is extended to Figure 6 with these modifications.

NIST Tests
The NIST test bench, described in [49,50] consists of fifteen (15) statistical tests to prove the randomness of binary (arbitrarily long) sequences produced by random or pseudo-random generators based on software or hardware, to be implemented in applications of information encryption. The data synthesized by the generator is subjected to these tests in order to discard traces with low approval rate. The tests that the bank performs are: Tests for the longest-run-of-ones in a block;

NIST Tests
The NIST test bench, described in [49,50] consists of fifteen (15) statistical tests to prove the randomness of binary (arbitrarily long) sequences produced by random or pseudo-random generators based on software or hardware, to be implemented in applications of information encryption. The data synthesized by the generator is subjected to these tests in order to discard traces with low approval rate. The tests that the bank performs are: • The Each test assumes that the data is random. This hypothesis is rejected if the result of the p-value (mathematical result of each test) is lower than a constant α. By default α = 0.01. indicating that only an error equal to or less than 1% is accepted. The NIST test bench is rigorous because its focus is on sequences used for information encryption. The documentation and source files to execute them can be downloaded [51].
Below the procedure for generating a sequence of random numbers from a chaotic input signal is explained. The starting point lies in the model presented by Li et al. [27] (Figure 4), to which modifications have been made including the proposal of Corinto et al. [25] to synthesize data with greater randomness. The degree of randomness is measured with the NIST test bench.

Diagram Variance-Time
In this section the procedure to detect the LRD from the estimation of the Hurst parameter by means of the VT diagram is outlined. Then an example trace is exposed and the Hurst parameter is estimated with this tool. For a stochastic discrete time process X[k], k ∈ N its aggregate process X (m) is defined, with an aggregation level m, as shown in Equation (7) [33]: If the autocovariance function of X is asymptotically self-similar of second order (Equation (8)): If γ is the autocovariance function and the Hurst parameter H is between 0.5 < H < 1, it is said that the stochastic process X has long-range dependence. This shows a relationship of stochastic process data, since for values of H < 0.5, the autocovariance of X[k] becomes close to zero. While for H = 1, the autocovariance is equal to the variance, thus presenting a particular case [33]. Furthermore, if the process X[k] is exact or asymptotically self-similar, the sample variance of the aggregate process is found from Equation (9).
Now, when applying the logarithm function on both sides of the Equation (9), get Equation (10): Thus, if it is assumed in a graph that y = log S 2 x (m) and x = log (m), the Hurst parameter could be estimated by means of a linear regression. In the literature this graph is known as the variance-time diagram [36].
Sheluhin et al. [36] show the performance of the VT diagram and explain that it is a tool used as a diagnosis, since it is biased and, in addition, the bias increases with the growth of H. On the other hand, the use of the wavelet transform for parameter estimation of Hurst is not parametric and the estimator of its variance is not biased [33]. For this reason, tools such as the log-scale diagram are used.

Diagram Log-Scale
In this section the mathematical model for the construction of the LD is presented. The basis of this tool is the discrete wavelet decomposition of the stochastic process X[k], calculating the detail coefficients by means of a filter bank with multiple sampling rates.
The continuous wavelet decomposition (CWT) of a signal X(t) is a linear transformation defined by Equation (11) [34].
A fundamental characteristic of the CWT is its redundancy, since neighboring coefficients share information about X(t). To reduce this redundancy, the discrete wavelet transform is introduced into the Equation (12) [36]: Being d X (j,k) the detail coefficients of the wavelet transform. The respective scale function is obtained with a bank of multi-tasking filters [25,26]. A temporal estimator has a small variance when there is a lack of correlation between the detail coefficients. This can be estimated for the process d X (j,•) by Equation (13) [26,27].
where n j is the number of detail coefficients in the octave j and µ j ≈ E [|d x (j,k)| 2 ]. Since the second moment of the detail coefficients follows a power law with exponent 2H − 1, it is possible to estimate the Hurst parameter, using the estimator (Equation (14)) [36]: The graph of j versus y j is nown as the log-scale diagram [35]. The value of H is an approximation that depends on the amount of detail coefficients used and the number of octaves used in the linear regression. Taking the plot exposed in [52], in Figure 7 shows the series of times with LRD ( Figure 7a) and the estimation of the Hurst parameter with the LD between octaves 3 and 14 (Figure 7b). = log = (2 − 1) + log The graph of j versus is nown as the log-scale diagram [35]. The value of H is an approximation that depends on the amount of detail coefficients used and the number of octaves used in the linear regression. Taking the plot exposed in [52], in Figure 7 shows the series of times with LRD (Figure 7a) and the estimation of the Hurst parameter with the LD between octaves 3 and 14 (Figure 7b).

Multiscale Diagram and Linear Multiscale
Now the MD and LMD tools used as the first approach to the multifractal analysis are shown, explaining in a rough way the mathematical basis of each diagram and illustrating the

Multiscale Diagram and Linear Multiscale
Now the MD and LMD tools used as the first approach to the multifractal analysis are shown, explaining in a rough way the mathematical basis of each diagram and illustrating the implementation of each tool with two traces as an example. The estimator of order q of a process d x (j,•) show in Equation (15) as an extended concept of the estimator of the Equation (13) to higher order moments [25,27].
For processes with LRD, the estimator of Equation (15) follows the law of powers shown in Equation (16) [34]. µ q j ≈ E d X ( j, k) q = C q 2 j(ζ(q)−q/2) where C q is a function that depends on the order of the estimator and ζ(q) is a function that allows to distinguish between monofractal and multifractal processes. If the estimator of Equation (13) is equal to that of Equation (15), the expression ζ(q) = qH is satisfied, with which it is deduced that said process is monofractal [36]. Thus, in a similar way to the analysis carried out in Equation (10) and Equation (14), the multiscale diagram is obtained when performing the graph of the Equation (17).
where α q can be computed by Equation (18).
Two processes with LRD are analyzed: interarrival times of BCpAu89 trace with multifractal behavior and Fractional gaussian noise with monofractal. For q > 0 the time series with multifractal is convex, but empirically determining this fact is complex. For this reason, the linear multiscale diagram described by Equation (19).
H(q) = α q /q + 1/2 If the process with LRD presents monofractal behavior, the Equation (19) satisfies the expression h(q) = H and therefore, this process presents the same parameter of Hurst in all orders.

Multifractal Spectrum
As a last tool, the Legendre transform is introduced as the main foundation for the built of the multifractal spectrum. The process of transforming the mass exponents to their local dimension is briefly exposed, allowing to differentiate multifractal sequences of monofractals.
By means of the Legendre transform, the multifractality can be analyzed in a process with LRD, for which it is necessary to know the exponents of mass τ(q) (Equation (20)).
At this point, the Legendre transform defined by the Equation (22), which represents the local dimension of the multifractal set [53].
Finally, the multifractal spectrum is obtained by plotting the singular exponent versus the local dimension of the multifractal set. The result is a long concave bow down where the difference between the minimum of α(q) and its maximum is called the multifractal spectrum width [54] for multifractional processes and a local point for monofractal processing. For a more detailed explanation, consult [32].
In principle, the exponents of mass τ(q) are calculated to find the singular exponent α(q) and after, the Legendre transform of the time series. Finally, the multifractal behavior of the traces is observed, concluding the multifractal nature of the trace Interarrival times of BCpAu89 and the monofractal nature of Fractional gaussian noise.

Multiplicative Cascades
The multifractal wavelet model (MWM) proposed by [10] provides an algorithm for the synthesis of data with LRD by means of a binomial conservative cascade of computational complexity O(N). This algorithm is used as a reference point in the investigation. Riedi et al. [10] establishes the possibility of generating traces of multifractal data with LRD, assuming that the multiplying coefficients p and p − 1 must be random variables, identically distributed, with a mean of 0.5, that take values in the interval [0, 1] and have a beta probability distribution defined in Equation (23) [55].
When the parameters α and β are equal (Equation (24)), the density function beta is symmetric with respect to 0.5 and therefore, the average takes the value of 0.5. Riedi et al. [10] shows that using a symmetric beta density function as expressed in Equation (24) for the multipliers of the Wavelet coefficients (called the β-MWM model) it is possible to control the Hurst parameter when modifying the β parameter of the multipliers. The relationship proposed by Riedi et al. [10] is shown in Equation (25).
An example of implementation of the β-MWM algorithm is shown in Figure 8 for a data length 2 20 , condition of U 0,0 = 100 and Hurst parameter H = 0.9. coefficients (called the -MWM model) it is possible to control the Hurst parameter when modifying the parameter of the multipliers. The relationship proposed by Riedi et al. [10] is shown in Equation (25).
An example of implementation of the β-MWM algorithm is shown in Figure 8 for a data length 2 20 , condition of U0,0 = 100 and Hurst parameter H = 0.9. In Figure 9a-c the MD, LMD and MS are exposed, respectively. With these diagrams, the multifractal behavior of the trace generated by the β-MWM algorithm is affirmed. It should be noted that the width of the spectrum can be modified with different values of H. In Figure 9a-c the MD, LMD and MS are exposed, respectively. With these diagrams, the multifractal behavior of the trace generated by the β-MWM algorithm is affirmed. It should be noted that the width of the spectrum can be modified with different values of H. The estimate of the Hurst parameter for this trace is shown in Figure 10a,b. Note the estimation of the Hurst parameter with respect to the one introduced in the algorithm. The estimate of the Hurst parameter for this trace is shown in Figure 10a,b. Note the estimation of the Hurst parameter with respect to the one introduced in the algorithm. The estimate of the Hurst parameter for this trace is shown in Figure 10a,b. Note the estimation of the Hurst parameter with respect to the one introduced in the algorithm.

Results
The results show the combinations of the RNG used to synthesize the different random sequences submitted to the NIST tests. Then, the result of the tools applied to the data for the detection of LRD and multifractal analysis is displayed. Finally, a brief comparison is made between the proposed generator and the β-MWM algorithm.

Results
The results show the combinations of the RNG used to synthesize the different random sequences submitted to the NIST tests. Then, the result of the tools applied to the data for the detection of LRD and multifractal analysis is displayed. Finally, a brief comparison is made between the proposed generator and the β-MWM algorithm.

Random Number Generator
Using the RNG shown in Figure 6 for the chaotic signals of the six (6) systems, random sequences of length 1 × 10 6 were synthesized by varying the parameters of the generator, such as the quantity of n-bits used in the ADC, the quantity m-LSBs taken from the ADC and the number of b-bits used in the DAC, where b = 0 is the output of the RNG a purely binary data sequence (the DAC is not used). When synthesizing the different sequences, it was shown that some combinations had a deterministic behavior or LRD was not detected, where it was necessary to implement the threshold function (Equation (26)) to the traces generated with b 0, because the NIST tests are only implemented for binary data.
Each sequence was submitted to the first fourteen NIST tests, with parameters chosen according to Table 1 (in those tests that needed an external parameter). From Tables 2 and 3, the p-value computation is shown for each combination defined by each NIST test. The default value of α is taken to discriminate the sequences, with p-value < α a failed test. The possible causes of a p-value < α are due to the correlated data or that the threshold function does not adapt to the data. It is observed that the tests with the lowest approval rate are: frequency test within a block, the discrete Fourier transform (spectral) test and the overlapping template matching test, while the tests with the highest approval rate are: the random excursions variant test, the random excursions test and the linear complexity test.    B  12  16  8  8  10  8  8  8  16  0  Approval rate  N  12  16  12  16  16  10  16  12  12  10  M  3  9  5  9  11  5  13  9  9  6 NIST Tests The NIST tests are rigorous, since its approach is to evaluate systems for information encryption. However, because in general the synthesized data approve several tests, the randomness of the sequences can be evidenced for its use in systems modeling and not for encryption. Tables 2 and 3 present data sequences with a higher approval rate. The combinations selected in Tables 2 and 3 exceeds half of the approved tests and were chosen to expose the LRD process and its multifractal analysis. For convenience, the combination chosen in Table 3 will be named Synthesis of monofractal data and the sequence chosen from Table 2 will be named Synthesis of multifractal data. Figure 11a,b shows the traces Synthesis of monofractal data and Synthesis of multifractal data in a time interval of 4.5 × 10 5 < k < 4.55 × 10 5 . The length of each trace is one million data.   0.5458 0.5998 0.6666 0.6726 0.6938 0.7456 0.7718 0.7845 0.8104 0.8614 RNG Param.  In Figure 12 the VT diagram applied to the two traces is observed with a confidence interval for the first trace of 0.77007 < H < 0.77347 and for the second trace of 0.71737 < H < 0.72174. Then long- In Figure 12 the VT diagram applied to the two traces is observed with a confidence interval for the first trace of 0.77007 < H < 0.77347 and for the second trace of 0.71737 < H < 0.72174. Then long-range dependence is detected in the two traces because the Hurst parameter is estimated between the values 0.5 < H < 1.0, and the two synthesized sequences present correlation between their data because they are generated by means of a physical signal in which the value  To perform the diagram shown in Figure 13 the analysis octaves j1 = 3 and j2 = 14 for Synthesis of monofractal data and the octaves j1 = 5 and j2 = 13 for Synthesis of multifractal data were chosen, in order to take values so that the regression was as linear as possible. In addition, the estimated Hurst parameter is close to the values proposed in Tables 2 and 3. Consequently, the octaves defined by means of this diagram will be those used for the multifractal analysis.
In order to analyze the type of multifractality present in the data, the diagrams of Figure 14 are made. In Figure 14a there is no notable difference between the data Synthesis of monofractal data and Synthesis of multifractal data, so Figure 14b is performed, where it is shown that for the data Synthesis of monofractal data a horizontal line is drawn at q > 0 indicating that the Hurst parameter remains constant at a value of ≈0.76, thus demonstrating the monofractality of the trace. In contrast, the Synthesis of multifractal data traces a gentle downward curve because the Hurst parameter is altered through the orders, suggesting the presence of multifractality. It is appreciated that when q = 2 the value of H ≈ 0.7784.
The MS is drawn from the Legendre transform ( Figure 15). The trace Synthesis of monofractal data is reduced to its fractal dimension value which coincides with the estimate of the Hurst parameter, since the singular exponent in this case is a constant (H). On the other hand, the trace Synthesis of multifractal data presents a downward concave MS, whose fractal dimension (maximum value) is the estimate of the Hurst parameter. Additionally, f(min(α)) > f(max(α)), representing the existence of a higher concentration of high values compared to the concentration of low values. Another measure is the width of the spectrum, which is approximately between 0.7 to 1.7.
It is possible, by altering the initial conditions of the system of equations, the circuital conditions and the parameters of the memristive function in the chaotic system, to modify the properties of the To perform the diagram shown in Figure 13 the analysis octaves j 1 = 3 and j 2 = 14 for Synthesis of monofractal data and the octaves j 1 = 5 and j 2 = 13 for Synthesis of multifractal data were chosen, in order to take values so that the regression was as linear as possible. In addition, the estimated Hurst parameter is close to the values proposed in Tables 2 and 3. Consequently, the octaves defined by means of this diagram will be those used for the multifractal analysis.
In order to analyze the type of multifractality present in the data, the diagrams of Figure 14 are made. In Figure 14a there is no notable difference between the data Synthesis of monofractal data and Synthesis of multifractal data, so Figure 14b is performed, where it is shown that for the data Synthesis of monofractal data a horizontal line is drawn at q > 0 indicating that the Hurst parameter remains constant at a value of ≈0.76, thus demonstrating the monofractality of the trace. In contrast, the Synthesis of multifractal data traces a gentle downward curve because the Hurst parameter is altered through the orders, suggesting the presence of multifractality. It is appreciated that when q = 2 the value of H ≈ 0.7784.
The MS is drawn from the Legendre transform ( Figure 15). The trace Synthesis of monofractal data is reduced to its fractal dimension value which coincides with the estimate of the Hurst parameter, since the singular exponent in this case is a constant (H). On the other hand, the trace Synthesis of multifractal data presents a downward concave MS, whose fractal dimension (maximum value) is the estimate of the Hurst parameter. Additionally, f(min(α)) > f(max(α)), representing the existence of a higher concentration of high values compared to the concentration of low values. Another measure is the width of the spectrum, which is approximately between 0.7 to 1.7. It is possible, by altering the initial conditions of the system of equations, the circuital conditions and the parameters of the memristive function in the chaotic system, to modify the properties of the multifractal spectrum of the synthesized sequences ( Figure 16). However, these parameters do not significantly change the estimation of the Hurst parameter ( Figure 16).
Electronics 2020, 9, x FOR PEER REVIEW 16 of 22 multifractal spectrum of the synthesized sequences ( Figure 16). However, these parameters do not significantly change the estimation of the Hurst parameter ( Figure 16).      A summary of the type of multifractality found for all combinations of Tables 2 and 3 is shown  in Tables 4 and 5, where the symbol • represents a monofractal trace and the symbol ∩ a multifractal trace. In the tables it is observed that 6 of 20 cases have multifractality. Table 4. Results of multifractal analysis of system 1.  A summary of the type of multifractality found for all combinations of Tables 2 and 3 is shown  in Tables 4 and 5, where the symbol • represents a monofractal trace and the symbol ∩ a multifractal trace. In the tables it is observed that 6 of 20 cases have multifractality. Table 4. Results of multifractal analysis of system 1. A summary of the type of multifractality found for all combinations of Tables 2 and 3 is shown in  Tables 4 and 5, where the symbol • represents a monofractal trace and the symbol ∩ a multifractal trace. In the tables it is observed that 6 of 20 cases have multifractality.

Comparation with the Multiplicative Cascades
To make the comparison, the example shown in Figure 8 was used. The NIST tests were applied to this trace (Table 6) by implementing the function of the threshold equation (Equation (27)) using its mean as the discriminant value, finding that the approval rate is 2/14. Then, the VT diagram was used to estimate the Hurst parameter, computing H = 0.8792. To have another vision of the results, the binary format of decimal numbers with simple floating point of the IEEE [56] was used in order to represent the data synthesized by the β-MWM algorithm, reaching similar results.
In contrast to the research carried out, the synthesis of sequences using the β-MWM algorithm presents a lower approval rate when applying the NIST tests. This suggests a disadvantage in relation to the data synthesized in the investigation, since combinations with a higher approval rate are presented. However, the cause could be the threshold function necessary for the development of NIST tests. On the other hand, the data synthesized by the multiplicative cascades are characterized in such a way that they vary the width of the spectrum and the estimation of the Hurst parameter. In this investigation, it was possible to alter the spectrum width and to vary H in an empirical way, without being characterized. Another difference between the two models is their construction, given that the β-MWM algorithm is recursive and uses a random number generator, unlike the one proposed in the research that starts from a physical signal that depends on the initial conditions of the system of equations.

Conclusions
In the research, a random number generator with long range dependence was developed from different input chaotic signals, allowing the variation of H through the parameters of the RNG (such as the number of bits in the ADC, DAC and the number of less significant bits taken from the ADC). It was found that the combinations analyzed (Tables 2-6) have mostly monofractal properties, with the possibility of implementing multifractal sequences, allowing the study of data synthesis with fractal behavior.
Another aspect to consider is that when discarding combinations that had a deterministic behavior or without LRD it was not possible to model the Hurst parameter through a mathematical expression, and therefore parameterize the generator (as the multiplicative cascade algorithm does using β-MWM). This raises the possibility of implementing in the future a neural network that allows to emulate the global system having the possibility of varying the Hurst parameter to a desired value and altering the properties of the multifractal spectrum, obtaining a more general model comparable with the algorithm β-MWM and that allows the synthesis of traces both monofractal and multifractal, giving rise to its physical implementation by means of electronic devices, achieving a more versatile system in comparison with the algorithm β-MWM.
Although this research has direct application in telecommunications network traffic, its main product can be usefully exploited in different disciplines where monofractal/multifractal signals are common phenomena (financial analysis, geophysics, hydrology, etc.). Of course, this is an ongoing research project for which there is a lot of additional work to be done. For example, we can still play with the parameters of the circuit elements that are part of chaotic systems, explore other chaotic systems and other alternatives to converters that complement the generator structure. In this way it is hoped to capture additional characteristics such as precise multifractal properties or higher order statistics. In addition, we would like to extend the applicability of our tool to the synthesis of electrical biopotentials that, according to the preliminary tests that have been developed in the research, have shown monofractal/multifractal characteristics. In particular, the proposed model would capture the dependence present in the cardiac rate that until now has only been modeled with distributions generated by the inverse transformation method (that is, assuming independence). In this way, the proposed generator would facilitate the correct evaluation of the algorithms that help to detect changes in the cardiac rhythm (as occurs in arrhythmias) while allowing us to compare the model with real hardware.