<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Soft Decoding Based on Ordered Subsets of Verification Equations of Turbo-Productive Codes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>V. N. Karazin Kharkiv National University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svobody sq.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine kuznetsov@karazin.ua</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>nastyak</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@gmail.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>kate.kuznetsova.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@gmail.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>t.ivko@outlook.com</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Central Ukrainian National Technical University</institution>
          ,
          <addr-line>avenue University, 8, Kropivnitskiy, 25006</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Customs and Finance</institution>
          ,
          <addr-line>st. Volodymyr Vernadsky, 2/4, Dnipro, 49000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Methods of soft decoding of cascade code constructions based on the schemes-products of linear block codes (Turbo Product Codes) are considered. An approach is being developed based on the iterative exchange of soft solutions between block codes constituting a cascade design. It is shown that a sequential execution of procedures for the formation of ordered subsets of test equations and the logarithms estimation of a likelihood ratio allows decoding of turbo-productive codes according to the criterion of minimizing the erroneous reception of code symbols.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Cascade Structures</kwd>
        <kwd>Turbo Product Codes</kwd>
        <kwd>Soft Decoding</kwd>
        <kwd>Verification Equations</kwd>
        <kwd>Noise Immunity</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>A promising area in the development of noise-resistant coding theory is cascade code
structures [1-7, 32-33], methods and algorithms for their decoding with an iterative
exchange of soft solutions that allow to provide a required noise immunity of discrete
message transmission [8-14].</p>
    </sec>
    <sec id="sec-2">
      <title>It should be noted that the implementation complexity of decoding methods based</title>
      <p>on the use of decision functions increases with length of the code and the correcting
capacity [14-17]. Decoding complexity can be reduced by using decision functions
defined on a preformed subset of check equations [18-20]. At the same time, this
decrease also leads to a decrease in the energy gain [19, 20].</p>
    </sec>
    <sec id="sec-3">
      <title>Thus, an actual direction of research is a development (improvement) of decoding</title>
      <p>methods with soft solutions based on decisive functions, which, without significantly
reducing the energy gain from coding, would significantly reduce the complexity of
practical implementation. A promising direction in this sense is the formation of
ordered subsets of test equations and decoding methods based on them.
2</p>
      <p>Theoretical substantiation of the proposed decoding method
The theoretical basis for soft decoding methods is a criterion for testing hypotheses,
the mathematical justification for which is based on the total probability formula and
the Bayes theorem [18-20].</p>
      <sec id="sec-3-1">
        <title>Suppose that one can make mutually M exclusive assumptions (hypotheses) H1 ,</title>
        <p>H2 , …, HM about the setting of the experience, and an event A can appear only
with one of these hypotheses.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Then the probability of an event is calculated by the formula of total probability:</title>
      <p>P  A  P  H1  P  A H1   P  H2  P  A H2   ...  P  HM  P  A HM  </p>
      <p>M
  P  Hi  P  A Hi ,</p>
      <p>i1
where P  Hi  is the probability of the hypothesis Hi ; P  A Hi  - conditional
probability of an event A with this hypothesis.</p>
    </sec>
    <sec id="sec-5">
      <title>If prior to the experiment, probabilities of the hypotheses</title>
      <p>were P  Hi  , i  1, 2,..., M and as a result of the experiment an event A occurred,
then the a posteriori (experimental, subject to the occurrence of the event A )
hypotheses probabilities are calculated using the Bayes formula:</p>
      <p>P  Hi A  M
 P  Hi  P  A Hi 
i1</p>
      <p>P  Hi  P  A Hi 
, i  1, 2,..., M .</p>
      <p>The Bayes formula makes it possible to calculate the conditional probabilities of
occurrences of the following events, taking into account the posterior probabilities of
hypotheses, P  Hi A , i  1, 2,..., M . So, if after the first experiment in which an
event A occurred, the next experiment B is performed, in which an event may
occur, the conditional probability P  B A is calculated using the formula of total
probability, into which not a priori probabilities P  Hi  are substituted, but a posteriori,
calculated after the occurrence of the event A , probabilities P  Hi A , i.e. we will
receive:</p>
      <p>M
P  B A   P  Hi A P  B Hi A , i  1, 2,..., M ,</p>
      <p>i1
where Hi A is an event A under the hypothesis Hi , P  B Hi A is the conditional
probability of co-being B under the hypothesis Hi and event A .</p>
    </sec>
    <sec id="sec-6">
      <title>Suppose now that the demodulator, based on the observation of the received signal</title>
      <p>and noise interference, estimates which of the possible signals Si S1, S2 ,..., SM 
(from an ensemble of signals with power M ) was transmitted. You will make
mutually exclusive assumptions M (hypotheses) that the corresponding signal Si
i  1, 2,..., M has been transmitted,. We calculate the posterior probability of the i
hypothesis, subject to admission: S *</p>
      <p>P  Si S *  M
 P  Si  P  S * Si 
i1</p>
      <p>
        P  Si  P  S * Si 
, i  1, 2,..., M ,
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
where P  Si  - a priori probability of formation S * of a signal Si by the transmitter;
P  S * Si  - conditional probability of reception under the condition that the signal
      </p>
      <sec id="sec-6-1">
        <title>Si is formed by the transmitter.</title>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>It is usually S * represented as a continuous random variable underlying the hy</title>
      <p>pothesis testing criteria. Consider the probability distribution function P  S * :</p>
      <p>M
P  S *   P  Si  P  S * Si  .</p>
      <p>i1</p>
      <sec id="sec-7-1">
        <title>P  S * - is a probability distribution function of the mixture of signal and interfer</title>
        <p>ence S * , which gives test statistics in the full signal space S1, S2 ,..., SM  .</p>
      </sec>
      <sec id="sec-7-2">
        <title>In equation (1), the value of the function p  S * is the scaling factor, since the val</title>
        <p>ue P  S * is obtained by averaging over the entire space of the signals.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Consider a case for two signals. Let binary logic elements 1 and 0 be represented</title>
      <p>by signals S1  1 and S2  1 . A rigid decision rule, called as a maximum likelihood
rule, determines a choice of one of the hypotheses (corresponding to the transmission
of signals S1 and S2 , accordingly) based on the comparison of probabilities values
P  S*  x S1  and P  S*  x S2  the choice of the larger one. For each data bit
transmitted, it is decided that the signal S1 was transmitted if S*  x falls on the right side
of the decision line (indicated ), or that the signal S2 was otherwise transmitted.</p>
    </sec>
    <sec id="sec-9">
      <title>A similar decision rule, known as the maximum a posteriori probability (MAP), can be represented as a minimum error probability rule, taking into account the prior probability of data. In general, the MAP rule is expressed as follows:</title>
      <p> S1, if P  S*  x S1   P  S*  x S2  ,
S  </p>
      <p>S2 , if P  S*  x S1   P  S*  x S2 
where S - value of the signal corresponding to the decision.</p>
    </sec>
    <sec id="sec-10">
      <title>Thus, expression (2) establishes the rule for choosing one of the hypotheses corre</title>
      <p>
        sponding to the signals S1 and S2 . Using expression (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), we obtain the equivalent
expression:
where probability
      </p>
      <p> S1, if P  S1  P  S * S1   P  S2  P  S * S2  ,
S  
S2 , if P  S1  P  S * S1   P  S2  P  S * S2 </p>
      <p>M
P  S *   P  Si  P  S * Si </p>
      <p>i1
in both parts of inequality reduced.</p>
    </sec>
    <sec id="sec-11">
      <title>Using (2) we introduce a function as a ratio of likelihood functions</title>
      <p>
        P  S*  x S1  and P  S*  x S2  :
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
F 
      </p>
      <p>P  S1  P  S * S1  ,</p>
      <p>P  S2  P  S * S2 
S   S1, если F  1 .</p>
      <p>S2 , если F  1
then the rule for choosing one of the hypotheses is written as</p>
    </sec>
    <sec id="sec-12">
      <title>Let us translate the expression (3), we get:</title>
      <p> P  S * S1   .</p>
      <p> P  S1    ln  P  S * S2  
ln F  ln  P  S2  </p>
    </sec>
    <sec id="sec-13">
      <title>Thus, a logarithm of the ratio of likelihood functions ln F is a real representation</title>
      <p>of the soft solution at the decoder input, with first term on right side of the equality
being the logarithm of the relations of a priori probabilities P  S1  and P  S2 
 P  S1   ,</p>
      <p>LS  S1, S2   ln  P  S2  
and the second term is the essence of the logarithm of the posterior probability ratio
P  S * S1  and P  S * S2  :
 P  S * S1  </p>
      <p>LDS  S1, S2   ln  P  S * S2  
as a result of channel measurements in the receiver.</p>
      <sec id="sec-13-1">
        <title>So, the logarithm of the likelihood function LFS  ln F is rewritten as</title>
        <p>
          LFS  S1, S2   LS  S1, S2   LDS  S1, S2  .
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
        </p>
      </sec>
    </sec>
    <sec id="sec-14">
      <title>It should be noted that for AWGN channels, the logarithm of the likelihood function as the result of channel measurements of the received mixture of signal and noise in the receiver will be as follows:</title>
      <p> 1
 P  S * S1    ln  2
LDS  S1, S2   ln 
 P  S * S2  
1  S * 1 2
    
2   
1  S * 1 2</p>
      <p>  
2   
2
 2</p>
      <p>S *.
 1
 2</p>
      <p> 1  S * 1 2  
exp     
 2     
 1  S * 1 2   
exp  2     </p>
    </sec>
    <sec id="sec-15">
      <title>Considering the ratio</title>
      <p>1  2Eb ,
 2 N0</p>
      <p>E
where b - is the ratio of energy of a binary signal Eb to the spectral power density</p>
      <p>N0
of the noise N0 , we obtain:</p>
      <p>E
LDS  S1, S2   4  b S * ,</p>
      <p>N0
those value of a logarithm of posterior probability ratio P  S * S1  and P  S * S2  , as
a result of channel measurements at the receiver, depends exclusively on the
signalto-noise ratio and the value of the received signal and noise mixture S * .</p>
    </sec>
    <sec id="sec-16">
      <title>In [20], it was shown that for systematic codes, the soft decision at the decoder output (on a logarithmic scale) about received symbol is written in the form of expression</title>
      <p>where LDK С1, С2  is the logarithm of the likelihood function relation on the received
symbol, obtained as a result of decoding.</p>
    </sec>
    <sec id="sec-17">
      <title>Substituting (5) into (6) we get:</title>
      <p>LFDK  S1, S2 , C1, C2   LS  S1, S2   LDS  S1, S2   LDK c1, c2  ,
those the soft decision at the decoder output depends on three values: LS  S1, S2  - a
logarithm of the ratio of the prior probabilities of the signals S1 and S2 ; -a logarithm
of the ratio of the posterior probabilities of the signals S1 and S2 (the result of channel
measurements) and LDK С1, С2  - a logarithm of ratio of the likelihood functions of
binary code symbols C1 and C2 as the result of decoding.</p>
      <p>To get LFDK  S1, S2 , С1, С2  , you need to sum up the individual contributions, since
all three components are statistically independent [20]. Soft decoder
output LFDK  S1, S2 , С1, С2  is a real number, providing both the hard decision itself and
its reliability. The sign LFDK  S1, S2 , С1, С2  sets a hard decision, i.e.:</p>
      <p>
        LFDK  S1, S2 , C1, C2   LFS  S1, S2   LDK c1, c2  ,
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
An eigenvalue LFDK  S1, S2 , С1, С2  determines the reliability of the decision.
      </p>
      <p>As a rule, ta value LDK С1, С2  has the same sign as LFDK  S1, S2 , С1, С2  , thus
increasing the reliability of the decision.</p>
      <p>For statistically independent values x and y , the sum of two logarithmic likelihood
ratios L(x) and L( y) is determined by the following expression:</p>
      <p> С1  1, if LFDK  S1, S2 , с1, с2   0
сi  
С2  0, if LFDK  S1, S2 , с1, с2   0
,
where сi is the value of the i -th bit corresponding to the taken decision.
 eLx  eL y 
L  x L  y   L  x  y   ln   
1  eLxeL y 

  1  sgn L  x  sgn L  y   min  L  x , L  y   ,
where function sgn  z returns a sign of its argument z , and the sign "" is used to
denote the sum of data modulo 2 represented by binary digits. The sign  is used to
denote the sum of the logarithms of the likelihood functions, which is defined as the
logarithm of the likelihood function of the sum modulo 2 of the corresponding
arguments.</p>
      <p>1. Install LS  S1, S2   0 .
tion LFDK  S1, S2 , С1, С2  .</p>
    </sec>
    <sec id="sec-18">
      <title>2. We decode with the soft solution the first composite code, i.e. find a soft solu</title>
      <p>
        An implementation of the turbo decoding procedure involves the use of decoding
methods with a soft solution at the input and a soft solution at the output. During the
first iteration on such a decoder, the data is considered equally probable, which gives
the initial a priori value LS  S1, S2   0 in equation (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ). Channel measurement gives
the value LDS  S1, S2  that is obtained by taking the logarithm of the ratio of the
values P  S*  x S1  and P  S*  x S2  for certain values and is the second member of
equation (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ). The decoder output LDK С1, С2  is information derived from the
decoding process. For iterative decoding, the external likelihood is fed back to the input (of
another composite decoder) to update the prior probability of the next iteration
information, i.e. updates a priori probability:
      </p>
      <p>LS  S1, S2   LDK С1, С2  .</p>
    </sec>
    <sec id="sec-19">
      <title>Thus, the decision in the final decoding of each character of the code sequence and</title>
      <p>
        information about its reliability depends on the value LFDK  S1, S2 , С1, С2  . Based on
equation (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ), we write the algorithm that gives an estimate of the soft output of the
decoder LDK С1, С2  and the resulting estimate LFDK  S1, S2 , С1, С2  .
      </p>
    </sec>
    <sec id="sec-20">
      <title>3. Based on equation (7) we calculate</title>
      <p>LDK С1, С2   LFDK  S1, S2 , С1, С2   LS  S1, S2   LDS  S1, S2 
4. For the following composite code install LS  S1, S2   LDK С1, С2  .</p>
    </sec>
    <sec id="sec-21">
      <title>5. With a soft solution, we decode the following composite code, i.e. find a soft so</title>
      <p>lution LFDK  S1, S2 , С1, С2  .</p>
    </sec>
    <sec id="sec-22">
      <title>6. For all composite codes, repeat steps 3-5.</title>
    </sec>
    <sec id="sec-23">
      <title>7. The result of turbo decoding is a hard decision about a code symbol с by expres</title>
      <p>
        sion (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) based on the soft decision obtained in the last step LFDK  S1, S2 , С1, С2  .
      </p>
    </sec>
    <sec id="sec-24">
      <title>Thus, as the analysis of above algorithm shows, the main task in implementation</title>
      <p>of turbo decoding is a development of efficient soft decoding procedures for
composite codes, i.e. development of soft decision LDK С1, С2  calculation procedures for an
iterative exchange procedure in the process of turbo decoding.</p>
      <p>
        We study the procedures for finding the soft solution LDK С1, С2  at the decoder
output, analyze the possible ways to calculate the last term on the right side of
equality (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) - the logarithm of the ratio of the likelihood functions of binary code symbols
      </p>
      <sec id="sec-24-1">
        <title>C1 and C2 as a result of decoding.</title>
        <p>
          Consider a linear n, k, d  block code over a finite field GF (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) . A linear code as a
subspace GF k (
          <xref ref-type="bibr" rid="ref2">2</xref>
          )  GF n (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) is defined by the generator matrix G , the lines of which
form the basis of the linear space GF k (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) . By definition, for each linear code there is
an orthogonal completion - a subspace GF nk (
          <xref ref-type="bibr" rid="ref2">2</xref>
          )  GF n (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) , all elements of which are
orthogonal to the elements of GF k (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) . The basis of the linear space GF nk (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) is
given by the check matrix H , and the mutual orthogonality condition implies
equality GH T  0 , where by “0” is meant the k  r matrix of zero elements GF (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) .
        </p>
        <p>
          We write the last equality in the form сH T  0 , where с  с0 , с1,..., сn1  is the
arbitrary code word of the linear block n, k, d  code under consideration, i.e.
c  GF k (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) ci 0,1 .
        </p>
        <sec id="sec-24-1-1">
          <title>Taking into account the fact that all elements GF nk (2) can be expressed in terms</title>
          <p>of a linear combination of rows of a check matrix H , we have сhiT  0 :,
where hi  hi0 , hi1 ,..., hin1  is an arbitrary vector obtained by a linear combination of
rows of a matrix H , i  0,1,..., 2nk 1 .</p>
          <p>
            In other words, the last equality holds for all 2nk vectors from GF nk (q) and we
have a system of test equations:
 c0h00  c1h01  ...  c0h0n1  0;
 c0h10  c1h11  ...  c0h1n1  0;
 ...
c0h2nk 1  c1h2nk 1  ...  c0h2nk 1n1  0.
 0 1
(
            <xref ref-type="bibr" rid="ref10">10</xref>
            )
          </p>
          <p>Suppose now that the code word с  с0 , с1,..., сn1  is taken by the criterion of the
maximum a posteriori probability, i.e. the values of the log-rhymes of the posterior
probabilities P  S * S1  and P  S * S2  :
 P  S * S1  </p>
          <p>LDS (с j )  LDS  S1, S2   ln  P  S * S2  
about each code symbol с j , j  0,1,..., n 1 as a result of channel measurements of the
corresponding signals in the receiver.</p>
          <p>The logarithms of the relations of a priori probabilities P  S1  and P  S2  ,
corresponding to each of the code symbols с j , j  0,1,..., n 1 we denote
 P  S1   .</p>
          <p>LS с j   LS  S1, S2   ln  P  S2  </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-25">
      <title>Then, taking into account (7) and rule (9) for the i -th checking equation, we have</title>
      <p>
        LDKi c j  
where the summation of "  " and " 
adding likelihood logarithms, i.e. by expression (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ).
      </p>
      <p>" is carried out according to the rule of</p>
      <p>
        If we assume that all the estimates LDKi c j  j  0,1,..., n 1 are statistically
independent (for example, if the test equations are mutually orthogonal), then the resulting
estimate LDK c j  will be written as:
if hij  1;
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
LDK c j  
2nk 1
 LDKi c j  ,
i0
where the summation is performed according to the usual arithmetic rule of addition
of real numbers.
      </p>
      <p>
        The soft output of the decoder LFDK с j   LFDK  S1, S2 , С1, С2  is a real number,
and is determined by the expression (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ):
      </p>
      <p>LFDK с j   LS с j   LDS с j   LDK c j  </p>
      <p>2nk 1
 LS с j   LDS с j    LDKi c j .</p>
      <p>
        i0
The sign LFDK с j  sets a tough decision according to rule (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ):
      </p>
      <p>
         С1  1, if LFDK с j   0;
с j  
С2  0, if LFDK с j   0.
(
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
(
        <xref ref-type="bibr" rid="ref13">13</xref>
        )
      </p>
    </sec>
    <sec id="sec-26">
      <title>Expressions (11), (12) and (13) define the decisive function based on using loga</title>
      <p>
        rithms of the ratio of likelihood functions of received signals (calculated using a priori
and a posteriori probabilities), as well as the logarithm of the ratio of likelihood
functions of binary code characters as a result of decoding. The corresponding sum (
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
defines the decision function based only on the use of the decoding result.
      </p>
      <p>
        Let us analyze the expression (
        <xref ref-type="bibr" rid="ref12">12</xref>
        ). Expanding the summation sign according to
rule (
        <xref ref-type="bibr" rid="ref11">11</xref>
        ), we obtain that expression (
        <xref ref-type="bibr" rid="ref12">12</xref>
        ) contains 2nk terms, each of which is the
result of summation of the n logarithms of the likelihood of code symbols. In turn, the
likelihood logarithms of code symbols are the sum of the likelihood logarithms of the
received signals (calculated using a priori and a posteriori probabilities). It is obvious
that with an increase in the code parameters n, k, d  , the number of terms increases
rapidly and already with the application n  k  32 of the considered approach it
becomes computationally inexpedient. A promising direction in this sense is the
development of a rule for the formation of ordered subsets of check equations and a
theoretical substantiation on their basis of decisive functions for decoding methods with
soft solutions.
3
      </p>
      <p>Conclusions
As a result of the conducted research, the method of soft decoding of cascade code
constructions with iterative exchange of soft solutions was improved which differs
from the known methods by the accelerated procedure of selecting test equations with
the most reliable symbols, which allows realizing decoding of code words by the
criterion of minimizing the erroneous reception of code symbols and speeding up the
process of turbo decoding of concatenated codes.</p>
    </sec>
    <sec id="sec-27">
      <title>The obtained results may be useful in constructing information security code schemes [21-26], for example, as a real alternative to traditional cryptography for post-quantum applications [27]. In addition, research results may be useful for optimizing computing in modern telecommunications networks [28-31, 34-35].</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Gomtsyan</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          :
          <article-title>Computer simulation of cascade codes for CDMA systems</article-title>
          .
          <source>In: Proceedings of the Second International Symposium of Trans Black Sea Region on Applied Electromagnetism (Cat. No.00TH8519)</source>
          , Xanthi, Greece,
          <year>2000</year>
          , p.
          <fpage>105</fpage>
          . (
          <year>2000</year>
          ) doi:10.1109/AEM.
          <year>2000</year>
          .943262
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Perez</surname>
            ,
            <given-names>L.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Costello</surname>
            ,
            <given-names>D.J.:</given-names>
          </string-name>
          <article-title>Cascaded convolutional codes</article-title>
          .
          <source>In: Proceedings of 1995 IEEE International Symposium on Information Theory, Whistler</source>
          ,
          <string-name>
            <surname>BC</surname>
          </string-name>
          , Canada,
          <year>1995</year>
          , p.
          <fpage>160</fpage>
          . (
          <year>1995</year>
          ) doi:10.1109/ISIT.
          <year>1995</year>
          .531509
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Permuter</surname>
            ,
            <given-names>H.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weissman</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Cascade source coding with side information at first two nodes</article-title>
          .
          <source>In: IEEE Information Theory Workshop on Information Theory (ITW</source>
          <year>2010</year>
          , Cairo), Cairo,
          <year>2010</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . (
          <year>2010</year>
          ) doi:10.1109/ITWKSPS.
          <year>2010</year>
          .5503190
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Joint design of QC-LDPC codes for cascade-based multisource coded cooperation</article-title>
          .
          <source>In: International Conference on Wireless Communications &amp; Signal Processing (WCSP)</source>
          ,
          <year>Nanjing</year>
          ,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . (
          <year>2015</year>
          ) doi:10.1109/WCSP.
          <year>2015</year>
          .7340967
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serhiienko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prokopovych-Tkachenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Construction of cascade codes in the frequency domain</article-title>
          .
          <source>4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T</source>
          <year>2017</year>
          ), Kharkov,
          <year>2017</year>
          , pp.
          <fpage>131</fpage>
          -
          <lpage>136</lpage>
          . (
          <year>2017</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2017</year>
          .8246366
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ling</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xing</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Quantum codes from concatenated algebraic-geometric codes</article-title>
          .
          <source>IEEE Transactions on Information Theory</source>
          ,
          <year>2005</year>
          , vol.
          <volume>51</volume>
          (
          <issue>8</issue>
          ), pp.
          <fpage>2915</fpage>
          -
          <lpage>2920</lpage>
          , (
          <year>2005</year>
          ) doi:10.1109/TIT.
          <year>2005</year>
          .851760
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Changuel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Le</surname>
            <given-names>Bidan</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Pyndiah</surname>
          </string-name>
          , R.:
          <article-title>Iterative Decoding of Block Turbo Codes over the Binary Erasure Channel</article-title>
          .
          <source>In: IEEE International Conference on Signal Processing and Communications, Dubai</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>1539</fpage>
          -
          <lpage>1542</lpage>
          . (
          <year>2007</year>
          ) doi:10.1109/ICSPC.
          <year>2007</year>
          .4728625
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Landolsi</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          :
          <article-title>A Comparative Performance and Complexity Study of Short-Length LDPC and Turbo Product Codes</article-title>
          .
          <source>In: 2nd International Conference on Information &amp; Communication Technologies, Damascus</source>
          ,
          <year>2006</year>
          , pp.
          <fpage>2359</fpage>
          -
          <lpage>2364</lpage>
          . (
          <year>2006</year>
          ) doi:10.1109/ICTTA.
          <year>2006</year>
          .1684775
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Nakajima</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sato</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Trellis-coded 8-PSK scheme combined with turbo and single-paritycheck product codes</article-title>
          .
          <source>In: Proceedings IEEE 56th Vehicular Technology Conference</source>
          , Vancouver, BC, Canada,
          <year>2002</year>
          , vol.
          <volume>3</volume>
          , pp.
          <fpage>1782</fpage>
          -
          <lpage>1786</lpage>
          . (
          <year>2002</year>
          ) doi:10.1109/VETECF.
          <year>2002</year>
          .1040523
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Stasev</surname>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .V.,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nosik</surname>
            ,
            <given-names>A.M.:</given-names>
          </string-name>
          <article-title>Formation of pseudorandom sequences with improved autocorrelation properties</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          ,
          <year>2007</year>
          , vol.
          <volume>43</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          . (
          <year>2007</year>
          ) doi:10.1007/s10559-007-0021-2
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Berrou</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glavieux</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thitimajshima</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Near Shannon Limit Error- Correcting Coding</surname>
          </string-name>
          and
          <article-title>Decoding: Turbo Codes</article-title>
          .
          <source>In: Proceedings of ICC '93 - IEEE International Conference on Communications, Geneva, Switzerland</source>
          ,
          <year>1993</year>
          , vol.
          <volume>2</volume>
          , pp.
          <fpage>1064</fpage>
          -
          <lpage>1070</lpage>
          . (
          <year>1993</year>
          ) doi:10.1109/ICC.
          <year>1993</year>
          .397441
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Stasev</surname>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .V.,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          :
          <article-title>Asymmetric code-theoretical schemes constructed with the use of algebraic geometric codes</article-title>
          .
          <source>Kibernetika i Sistemnyi Analiz</source>
          ,
          <year>2005</year>
          , vol.
          <volume>3</volume>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>57</lpage>
          . (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>F.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>The iterative decoding algorithm research of Turbo Product Codes</article-title>
          .
          <source>In: The 2010 International Conference on Apperceiving Computing and Intelligence Analysis Proceeding, Chengdu</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>97</fpage>
          -
          <lpage>100</lpage>
          . (
          <year>2010</year>
          ) doi:10.1109/ICACIA.
          <year>2010</year>
          .5709859
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>MacKay</surname>
            ,
            <given-names>D.J.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neal</surname>
            ,
            <given-names>R.M.</given-names>
          </string-name>
          :
          <article-title>Near Shannon limit performance of low density parity check codes</article-title>
          .
          <source>IEEE Electronics Letters</source>
          ,
          <year>1996</year>
          , vol.
          <volume>33</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>457</fpage>
          -
          <lpage>458</lpage>
          . (
          <year>1996</year>
          ) doi:10.1049/el:19970362
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>15. Turbo Product Code Encoder / Decoder. www.aha.com</mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. IEEE 802.16 Broadband Wireless Access Working Group.
          <article-title>Turbo Code Comparison (TCC v TPC)</article-title>
          .
          <source>http://ieee802.org/16</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Turbo</surname>
          </string-name>
          <article-title>Product Code FEC</article-title>
          .
          <article-title>Comtech EF Data Corp</article-title>
          . www.comtechefdata.com
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>MacWilliams</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sloane</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          :
          <article-title>The Theory of Error-Correcting Codes</article-title>
          .
          <source>Elsevier</source>
          (
          <year>1977</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Proakis</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>Digital communications</article-title>
          .
          <source>McGraw Hill</source>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Sklar</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Digital Communications: Fundamentals and Applications</article-title>
          . Prentice Hall Communications Engineering and
          <string-name>
            <given-names>Emerging</given-names>
            <surname>Techno</surname>
          </string-name>
          . Pearson
          <string-name>
            <surname>Education</surname>
          </string-name>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>QC-MDPC</surname>
            <given-names>KEM</given-names>
          </string-name>
          :
          <article-title>A Key Encapsulation Mechanism Based on the QC-MDPC McEliece Encryption Scheme”</article-title>
          ,
          <source>NIST Submission</source>
          ,
          <year>2017</year>
          . https://csrc.nist.gov/Projects/Post-QuantumCryptography/Round-1-Submissions
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>RLCEKey Encapsulation Mechanism (RLCE-KEM) Specifcation</article-title>
          . NIST Submission.
          <article-title>(</article-title>
          <year>2017</year>
          ) http://quantumca.org
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Melchor</surname>
            ,
            <given-names>C.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aragon</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bettaieb</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bidoux</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Blazy</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Deneuville</surname>
            ,
            <given-names>J.-C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gaborit</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zemor</surname>
          </string-name>
          , G.:
          <article-title>Rank Quasi-Cyclic (RQC)</article-title>
          .
          <source>NIST Submission</source>
          .
          <article-title>(</article-title>
          <year>2017</year>
          ) http://pqc-rqc.org
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          ,
          <source>Round 1 Submissions</source>
          ,
          <year>2017</year>
          . https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutsenko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chepurko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Code-based cryptosystems from NIST PQC</article-title>
          .
          <source>In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Kyiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>282</fpage>
          -
          <lpage>287</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/DESSERT.
          <year>2018</year>
          .8409145
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <article-title>Pushkar'ov,</article-title>
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Kiyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Kuznetsova</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          :
          <article-title>Code-based electronic digital signature</article-title>
          .
          <source>In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Kyiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>331</fpage>
          -
          <lpage>336</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/DESSERT.
          <year>2018</year>
          .8409154
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Bernstein</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buchmann</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dahmen</surname>
          </string-name>
          , E.:
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
          </string-name>
          . Springer-Verlag, Berlin-Heidleberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Rassomakhin</surname>
            ,
            <given-names>S.G.</given-names>
          </string-name>
          :
          <article-title>Mathematical and physical nature of the channel capacity</article-title>
          .
          <source>Telecommunications and Radio Engineering</source>
          ,
          <year>2017</year>
          , vol.
          <volume>76</volume>
          (
          <issue>16</issue>
          ), pp.
          <fpage>1423</fpage>
          -
          <lpage>1451</lpage>
          . (
          <year>2017</year>
          ) doi:10.1615/TelecomRadEng.v76.
          <year>i16</year>
          .
          <fpage>40</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshman</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          :
          <article-title>A Method for Operational Diagnosis of Data Represented in a Residue Number System</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          ,
          <year>2018</year>
          , vol.
          <volume>54</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>336</fpage>
          -
          <lpage>344</lpage>
          . (
          <year>2018</year>
          ) doi:10.1007/s10559-018-0035-y
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>I.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamula</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semenko</surname>
            ,
            <given-names>A.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morozov</surname>
            ,
            <given-names>V.L.</given-names>
          </string-name>
          :
          <article-title>Method for synthesis of performed signals systems based on cryptographic discrete sequences of symbols</article-title>
          .
          <source>Telecommunications and Radio Engineering</source>
          ,
          <year>2017</year>
          , vol.
          <volume>76</volume>
          (
          <issue>17</issue>
          ), pp.
          <fpage>1523</fpage>
          -
          <lpage>1533</lpage>
          . (
          <year>2017</year>
          ) doi:10.1615/TelecomRadEng.v76.
          <year>i17</year>
          .
          <fpage>40</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Tenth UK Teletraffic</surname>
          </string-name>
          <article-title>Symposium</article-title>
          .
          <article-title>Performance Engineering in Telecommunications Network</article-title>
          .
          <source>In: Tenth UK Teletraffic Symposium</source>
          , 10th. Performance Engineering in Telecommunications Network, Martlesham Heath, UK
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Conceptual fundamentals of a theory of mathematical interpretation</article-title>
          .
          <source>Int. J. Computing Science and Mathematics</source>
          ,
          <year>2015</year>
          , vol.
          <volume>6</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>107</fpage>
          -
          <lpage>121</lpage>
          . (
          <year>2015</year>
          ) doi:10.1504/IJCSM.
          <year>2015</year>
          .069459
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prokopovych-Tkachenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kurinniy</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shoiko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Periodic Properties of Cryptographically Strong Pseudorandom Sequences</article-title>
          . In: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>129</fpage>
          -
          <lpage>134</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2018</year>
          .8632021
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Zamula</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Complex systems modeling with intelligent control elements</article-title>
          .
          <source>Int. J. Model. Simul. Sci. Comput</source>
          .,
          <year>2017</year>
          , vol.
          <volume>08</volume>
          (
          <issue>01</issue>
          ). (
          <year>2017</year>
          ) doi:10.1142/S179396231750009X
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamula</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikheev</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Calculation of expense for local computer networks</article-title>
          .
          <source>In: Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T)</source>
          ,
          <year>2017</year>
          4th International, Kharkiv, Ukraine,
          <year>2017</year>
          , pp.
          <fpage>146</fpage>
          -
          <lpage>151</lpage>
          . (
          <year>2017</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2017</year>
          .8246369
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>