COMPARATIVE ANALYSIS OF MONOLITHIC AND CYCLIC NOISE-PROTECTIVE CODES EFFECTIVENESS

Author:

Riznyk V. V.ORCID, ,Skrybaylo-Leskiv D. Yu.,Badz V. M.,Hlod C. I.,Liakh V. V.,Kulyk Y.-M.,Romanjuk N. B.,Tkachuk K. I.,Ukrajinets V. V., , , , , , , ,

Abstract

Comparative analysis of the effectiveness of monolithic and cyclic noise protective codes built on "Ideal Ring Bundles" (IRBs) as the common theoretical basis for synthesis, researches and application of the codes for improving technical indexes of coding systems with respect to performance, reliability, transformation speed, and security has been realized. IRBs are cyclic sequences of positive integers, which form perfect partitions of a finite interval of integers. Sums of connected IRB elements enumerate the natural integers set exactly R-times. The IRB-codes both monolithic and cyclic ones forming on the underlying combinatorial constructions can be used for finding optimal solutions for configure of an applicable coding systems based on the common mathematical platform. The mathematical model of noise-protective data coding systems presents remarkable properties of harmonious developing real space. These properties allow configure codes with useful possibilities. First of them belong to the self-correcting codes due to monolithic arranged both symbols "1" and of course "0" of each allowed codeword. This allows you to automatically detect and correct errors by the monolithic structure of the encoded words. IRB codes of the second type provide improving noise protection of the codes by choosing the optimal ratio of information parameters. As a result of comparative analysis of cyclic IRB-codes based with optimized parameters and monolithic IRB-codes, it was found that optimized cyclic IRB codes have an advantage over monolithic in relation to a clearly fixed number of detected and corrected codes, while monolithic codes favorably differ in the speed of message decoding due to their inherent properties of self-correction and encryption. Monolithic code characterized by packing of the same name characters in the form of solid blocks. The latter are capable of encoding data on several levels at the same time, which expands the ability to encrypt and protect encoded data from unauthorized access. Evaluation of the effectiveness of coding optimization methods by speed of formation of coding systems, method power, and error correcting has been made. The model based on the combinatorial configurations contemporary theory, which can find a wide scientific field for the development of fundamental and applied researches into information technolodies, including application multidimensional models, as well as algorithms for synthesis of the underlying models.

Publisher

Lviv Polytechnic National University

Reference14 articles.

1. [1] BCH code. (2020). From Wikipedia. The Free Encyclopedia. Retrieved from: https://en.wikipedia.org/wiki/BCH_code

2. [2] Blahut, R. E. (1986). Theory and Practice of Error Control Codes. Moscow: Mir, 576 p. [In Russian].

3. [3] Error correction code. (2021). Wikipedia. The Free Encyclopedia. Retrieved from: https://en.wikipedia.org/wiki/Error_correction_code

4. [4] Golay Code. (2021). Wolfram MathWorld the webs most extensive mathematics resource. Retrieved from: http://mathworld.wolfram.com/GolayCode.html

5. [5] Gryciuk, Y., & Grytsyuk, P. (2016). Implementation details for the cipher key generation Cardano permutation. Modern Problems of Radio Engineering, Telecommunications and Computer Science. Proceedings of the 13th International Conference on TCSET2016, 498-502. https://doi.org/10.1109/TCSET.2016.7452098

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Implementation of eco startups in the development of green territories;Proceedings of Scientific Works of Cherkasy State Technological University Series Economic Sciences;2023-10-29

2. Administrative liability of juveniles for smoking;Law. Human. Environment;2023-07-14

3. Features of the functioning of express delivery market in Ukraine during the war;Economics Entrepreneurship Management;2023-05-01

4. MAIN CRIMINALISTIC FEATURES OF A PERSON COMMITTING DOMESTIC VIOLENCE IN UKRAINE;Law. Human. Environment;2022-04-18

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3