=Paper= {{Paper |id=Vol-2533/paper16 |storemode=property |title=Simulation Model and Practical Realization of Barker-Like Codes |pdfUrl=https://ceur-ws.org/Vol-2533/paper16.pdf |volume=Vol-2533 |authors=Ivan Tsmots,Oleg Riznyk,Vasyl Rabyk,Yurii Kynash,Mykhailo Dendiuk,Olga Myaus,Michal Gregus ml. |dblpUrl=https://dblp.org/rec/conf/dcsmart/TsmotsRRKDMG19 }} ==Simulation Model and Practical Realization of Barker-Like Codes== https://ceur-ws.org/Vol-2533/paper16.pdf
    Simulation Model and Practical Realization of Barker-
                        Like Codes

              Ivan Tsmots1[0000-0002-4033-8618], Oleg Riznyk1[0000-0002-3815-043X],

             Vasyl Rabyk2[0000-0003-2655-0812], Yurii Kynash1[0000-0002-3762-3215],

           Mykhailo Dendiuk3[0000-0002-7631-022X], Olga Myaus1[0000-0001-5332-7080]

                              Michal Gregus4[0000-0001-6207-1347]
                    1 Lviv Polytechnic National University, Lviv, Ukraine

    {ivan.tsmots, riznykoleg, yuk.itvs, myausolya2016@gmail.com}
                2 Ivan Franko National University of Lviv, Lviv, Ukraine

                                   rabykv@ukr.net
                 3 Ukrainian National Forestry University, Lviv, Ukraine

                                   dendiuk@ukr.net
            4 Comenius University in Bratislava, Bratislava, Slovak Republic

                          michal.gregusml@fm.uniba.sk



       Abstract. In the work we presented method of getting barker-like codes. It was
       implemented on the basis of numerical lines, that is, knots. The presented algo-
       rithm was realized on FPGA EP3C16F484N6, Altera. We have reviewed the
       main advantages, areas of use and peculiarities of barker-like codes. Besides, it
       was given functional diagram of the DS-SS system. The barker-like code gen-
       erator and its frequency domain simulation were performed in VHDL language.

       Keywords: Autocorrelation function, Barker code, Barker-like code, DS-SS,
       FPGA, Hardware implementation, Numerical ruler-bundle.


1      Introduction

The noise immunity and sensitivity of the pseudorandom code sequence primarily
depends on its parameters. The length of the code may be the same, but the sequence
parameters are different. Therefore, in the radio system of transmission information
selecting pseudorandom code sequence is very important [1].
   We propose to consider Barker's signals, because they are the ones that cause the
greatest interest among scholars. They are also referred to as signals with a low level
of side lobes of the autocorrelation function (ACF). It's interesting that a low level of
side lobes provides a high value of the main lobe of the ACF. Basically, these signals
will be built and researched on a numerical sequence from -1 to 1 [2].
   However, it is known [3] that when the value of ACF does not exceed unit (exclud-
ing the main petal), and Barker's signals occupy odd positions that are more than 13,
then they simply disappear, that is, they do not exist. Among the known Barker sig-

Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License
Attribution 4.0 International (CC BY 4.0)
2019 DCSMart Workshop.
2


nals, the maximum ratio of the main petal to other petals is 13. But in the course of
research, the ratio of barker-like code signals equal to 14 or more was found [4].
Therefore, it makes sense to continue research in this direction.
   So far there is no universal algorithm that provides an acceptable quality signal
processing in all radar tasks [5]. In connection with this, the task of each modern radar
station is to provide a constantly updated set of algorithms and signals that, when they
are used jointly, are capable of solving certain tasks [6]. The electronic properties of
materials to radar systems can be calculated by methods from first principles [7].
   The paper presents the development of methods for synthesizing noise-like codes
with the use of barker-like sequences for encoding and decoding data [8]; the devel-
opment of simulation model of the synthesis of noise-like codes according to different
criteria (by the functions of autocorrelation, by the length of the sequence and by the
number of detected and corrected errors) [9]; realization of received sequences on
FPGA [10]. The subject of research is the ACF-function of the model of barter-like
codes and methods for its finding [11].


2      Review of the Literature

An urgent problem in our time is the protection of real-time data transmission with
onboard systems, protection of their impedance and secrecy, and the general increase
of strong cryptography. After all, these systems must meet the requirements for ener-
gy consumption, prices and general parameters in general. It is for this purpose that
there are noise-like signals. They have a fairly high impedance over high-bandwidth
interference with high power, can split subscribers by codes, have high protection
against multi-beam propagation, provide secrecy of data transmission. In addition,
noise signals have high resolution, even when positioned in radar and navigational
measurements.
   Many scientists have been working on the development of methods and means of
silent coding in their time. Most of them used noise-like codes based on Barker se-
quences. For instance: M. Kelman and F. Rivest - the algorithm of encoding and de-
coding in real time with the use of sequences Barker [12]; P. Kim and E. Jang - re-
search noisy codes are presented on the basis of sequences Goley and Barker;
R. Nilawar and D, Bhalerao [13] - wireless data protection and data transmission sys-
tems that works in real time with certain parameters; S. Omar and F. Kassem - the
solution of the problems of the ambiguity using methods with links to a Barker se-
quence [14]; S. Matsuyuki and A. Tsuneda - examples of the application of noise-
coding codes in control systems, communication codes (the auto-collegial function is
minimal) [15] and others.
   After analyzing the scientific materials presented above, we concluded that it is
impossible to find the Barker code for lengths greater than 13. Moreover, we found
that the construction of barker-like sequences of any length is still an unresolved
problem in our time. Regular methods of their construction were not yet developed. It
follows that the known Barker codes can be used only for signals having a small
base [16].
                                                                                        3


   Since finding sequences longer than 13 that are similar to the Barker sequence,
with the lowest possible value of the lateral petals is a major problem in our time, the
regular method of constructing these codes proposed by us is actual. The method is
based on ideal ring nodes. With its help, it is possible to realize the implementation of
software and hardware components in order to synthesize small-scale real-time data
transmission systems [17].


3      Problem Statement

We use Barker codes in communication networks with its extended range. After com-
parative analysis, it was found that Barker codes have more advantages than other
pseudo-noise (PN) codes. In addition, they are well befit for Direct Sequence-Spread
Spectrum (DS-SS). In systems DS-SS in each of the transmitted bits is embedded a
certain sequence of chips. It is called a noise-like code. This is done in order to ex-
pand the spectrum of the narrowband signal. Each chip is represented as a rectangular
pulse line with a duration that is one time smaller than the duration of the information
bit. Figure 1 rep-presents the expansion of the spectrum for two information bits [18].




        Fig. 1. The extension of the signal spectrum Barker code whose length is N=7.

  Here, the Barker code is used instead of the pseudo-noise code. Its length is N=7.
On this figure is marked: d t – information signal (two bits), Tb – period of each bit,
bct – Barker code, Tc – the period of each chip, txt – the converted signal which is
generated when the transmission of signals d t and bct through an XOR element with
a denial.
   The transmitter is governed by regenerating the signal of txt. This is done using the
Binary Phase Shift Keying (BPSK) method. A method of demodulation of BPSK
restores the modulated signal in the receiver [19]. Functional diagram of the system
DS-SS are shown in Fig. 2.




            Fig. 2. The figuration of the functional scheme of the DS-SS system.
4


   The PN-sequence generator is one of the main blocks in each DS-SS system. A
range consisting of N of elements of a j for 1  j  N , which taking values +1 and -
1, make Barker's sequence. They must alternate so that the condition has being ful-
filled:

                                  N −i
                                    a j a j +i  1 ,                                (1)
                                   j =1

where 1  i  N .
   Barker codes provide optimal reception, because they have minimum level of side
lobes ACF. Well-known sequences of Barker have a length 2  N  13 [20].
   Sequence the ACF of the Barker code is a finite discrete sequence, which is formed
by performing convolution on the sequence and its own copy:
                                          N− j
                                 R j =  ai ai*+ j ,                                 (2)
                                          i =1

where the discrete index between the sequence and its copy in time is indicated.
   This designation indicates a complex conjugate value. From the general properties
of the autocorrelation function, it follows that it is symmetric with respect to the main
lobe.
   The mainlobe level (ML) is a module for the ACF coefficient for zero’s displace-
ment j = 0 . The level of the main petal has the greatest value and is equal to own
length. Peak sidelobe level (PSL) is defined as the maximum absolute value among
the coefficients of the autocorrelation function for a non-zero shift 1≤j3.0.CO;2-#
12. Riznyk, O., et. al.: Transformation of information based on noisy codes. In: 2018 IEEE
    Second Int. Conf. on Data Stream Mining & Processing (DSMP), pp. 162-165. Lviv,
    Ukraine (2018). doi:10.1109/DSMP.2018.8478509
13. Riznyk, O., et. al.: Information encoding method of combinatorial configuration. In: 2007
    9th Intern. Conf. - The Experience of Designing and Applications of CAD Systems in Mi-
    croelectronics, pp. 370-370. Lviv-Polyana, Ukraine (2007). doi:10.1109/CADSM.2007.
    4297583
14. Kim, P., et. al.: Barker-sequence-modulated golay coded excitation technique for ultra-
    sound imaging. In: 2016 IEEE Int. Ultrasonics Symp. (IUS), pp. 1-4. Tours (2016).
    doi:10.1109/ULTSYM.2016.7728737
15. Oleg, R., et. al.: Information technologies of optimization of structures of the systems are
    on the basis of combinatorics methods. In: 2017 12th Int. Scient. and Techn. Conf. on
    Comp. Sci. and Infor. Techn. (CSIT), pp. 232-235. Lviv, Ukraine (2017).
    doi:10.1109/STC-CSIT.2017.8098776
16. Omar, S.M., et. al.: A novel barker code algorithm for resolving range ambiguity in high
    PRF radars. In: 2015 Europ. Radar Conf. (EuRAD), pp. 81-84. Paris (2015).
    doi:10.1109/EuRAD.2015.7346242
17. Wang, S., et. al.: Research on low intercepting radar waveform based on LFM and barker
    code composite modulation. In: 2018 Int. Conf. on Sensor Networks and Signal Processing
    (SNSP), pp. 297-301. Xi'an, China (2018). doi:10.1109/SNSP.2018.00064
18. Rosli1, S.J., et. al.: Design of Binary Coded Pulse Trains with Good Autocorrelation Prop-
    erties for Radar Communications. In: 2018 MATEC Web of Conf., doi:10.1051/ matec-
    conf/201815006016
19. Lakshmi, C. R., et. al.: Barker coded thermal wave imaging for anomaly detection. In:
    2018 Conf. on Signal Processing And Communication Engineering Systems (SPACES),
    pp.198-201.Vijayawada (2018). doi: 10.1109/SPACES.2018.8316345
20. Li, J., et. al.: A 3-Gb/s Radar Signal Processor Using an IF-Correlation Technique in 90-
    nm CMOS. In: IEEE Transactions on Microwave Theory and Techniques, vol. 64, no. 7,
    pp. 2171-2183 (2016). doi: 10.1109/TMTT.2016.2574983
21. Dua, G., et. al.: Applications of barker coded infrared imaging method for characterisation
    of glass fibre reinforced plastic materials. In: Electronics Letters, vol. 49, no. 17, pp. 1071-
    1073 (2013). doi: 10.1049/el.2013.1661
22. Riznyk, O., et. al.: Synthesis of non-equidistant location of sensors in sensor network. In:
    2018 XIV-th Int. Conf. on Perspective Technologies and Methods in MEMS Design
    (MEMSTECH), pp. 204-208. Lviv, Ukraine (2018). doi:10.1109/MEMSTECH.2018.
    8365734
23. Nilawar, R.C., et. al.: Reduction of SFD bits of WiFi OFDM frame using wobbulation
    echo signal and barker code. In: 2015 Int. Conf. on Pervasive Computing (ICPC), pp. 1-3.
    Pune (2015). doi:10.1109/PERVASIVE.2015.7087095
24. Sekhar, S., et. al.: Comparative analysis of offset estimation capabilities in mathematical
    sequencesfor WLAN. In: 2016 Int. Conf. on Communication Systems and Networks
    (ComNet), pp. 127-131. Thiruvananthapuram (2016). doi:10.1109/CSN.2016.7824000
25. Xia, S., et. al.: Application of pulse compression technology in electromagnetic ultrasonic
    thickness measurement. In: 2018 IEEE Far East NDT New Technology & Application Fo-
    rum (FENDT), pp. 37-41. Xiamen, China (2018). doi:10.1109/FENDT.2018.8681975
                                                                                           11


26. Banket, V., et. al.: Composite Walsh-Barker sequences. In: 2018 9th Int. Conf. on Ul-
    trawideband and Ultrashort Impulse Signals (UWBUSIS), pp. 343-347. Odessa (2018).
    doi:10.1109/UWBUSIS.2018.8520220
27. Chunhong, Y., et. al.: The superiority analysis of linear frequency modulation and barker
    code composite radar signal. In: 2013 Ninth Int. Conf. on Computational Intelligence and
    Security, pp. 182-184. Leshan (2013). doi:10.1109/CIS.2013.45
28. Riznyk, O., et. al.: Composing method of anti-interference codes based on non-equidistant
    structures. In: 2017 XIIIth Int. Conf. on Perspective Technologies and Methods in MEMS
    Design (MEMSTECH), pp. 15-17. Lviv, Ukraine (2017). doi:10.1109/MEMSTECH.
    2017.7937522
29. Riznyk, O., et. al.: The Method of Encoding Information in the Images Using Numerical
    Line Bundles. In: 2018 IEEE 13th Int. Scientific and Technical Conf. on Comp. Sci. and
    Infor. Techn. (CSIT), pp. 80-83. Lviv, Ukraine (2018). doi:10.1109/STC-
    CSIT.2018.8526751
30. Riznyk, O., et. al.: A synthesis of barker sequences is by means of numerical bundles. In:
    2017 14th Int. Conf. The Experience of Designing and Application of CAD Systems in
    Microelectronics (CADSM), pp. 82-84. Lviv, Ukraine (2017). doi:10.1109/CADSM.
    2017.7916090
31. Riznyk, V., et. al.: Information Encoding Method of Combinatorial Optimization. In.:
    2006 Int. Conf. Modern Problems of Radio Engineering, Telecommunications, and Comp.
    Sci., pp. 357-357. Lviv-Slavsko (2006), doi: 10.1109/TCSET.2006.4404550
32. Holubnychyi, A.: Generalized binary barker sequences and their application to radar tech-
    nology. In.: 2013 Signal Processing Symp. (SPS), pp. 1-9. Serock (2013), doi:
    10.1109/SPS.2013.6623610
33. Tsmots, I., et. al. (2020) Implementation of FPGA-Based Barker’s-Like Codes. In:
    Lytvynenko V., Babichev S., Wójcik W., Vynokurova O., Vyshemyrskaya S., Radetskaya
    S. (eds) Lecture Notes in Computational Intelligence and Decision Making. ISDMCI 2019.
    Advances in Intelligent Systems and Computing, vol 1020. Springer, Cham, doi.:
    10.1007/978-3-030-26474-1_15