<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Coding for information systems security and viability</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>State University of Telecommunications</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1919</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>In this article, models of discrete channels are analyzed. It is proposed to use the L.P. Purtov for building channels of information systems. Redundant binary and non-binary codes and their error-correcting capability are analyzed. Formulas are derived for finding the probability of an uncorrected error for errorcorrecting codes, for codes that find errors, and for codes that detect and correct errors. The coefficient of increasing the information array is calculated for different probabilities of the detection of one element of the codeword in the channel and different error rates. Calculation of the redundancy of the error burst correction codes is performed. The use of Fire codes as anti-noise codes in the channels of the information system is proposed.</p>
      </abstract>
      <kwd-group>
        <kwd>error-correcting codes</kwd>
        <kwd>error bursts</kwd>
        <kwd>discrete channel model</kwd>
        <kwd>code redundancy</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The issue of transmitting discrete information in information systems and networks in
the case when it is impossible or unprofitable from an economic point of view to use a
reverse communication channel to increase the reliability of messages is of interest to
a wide range of specialists in the field of security, wire and radio communications. A
large number of articles and monographs are devoted to this topic. However, most of
the publications are devoted to the coverage of information channels in which binary
correction codes are used as error-correcting codes. This is mainly due to the simplicity
of operations in the binary number system, which are performed by various computer
devices in the processing, accumulation and storage of information in information
systems and networks.</p>
      <p>
        The use of combined types of modulation in information channels allows to
significantly increase the data transmission rate in comparison with binary systems. And
the use of error-correcting codes with q  2 alphabet, which allow you to identify and
correct errors, in such systems is quite a logical step. Such codes are called Non-binary
(multi-positional, multi-base or q-ary) [
        <xref ref-type="bibr" rid="ref12 ref13 ref3 ref5">3, 4, 5, 7, 8, 15, 16</xref>
        ]. Despite the fact that some
redundant nonbinary codes, such as the generalized Hamming code, the Reed-Solomon
code, and others, have been widely used in information channels [
        <xref ref-type="bibr" rid="ref10 ref11 ref4 ref6 ref7 ref8 ref9">6, 9, 10, 11, 12, 13,
14</xref>
        ], the development issues of the nonbinary coding theory remain quite relevant.
      </p>
      <p>Statement of research problem</p>
      <p>Discrete channel mathematical model
The description of the channel consists of determining the restrictions on the signals
S(t), the transmission of which it provides, and the nature of the transformation S(t)→
S*(t), which it performs. For discrete channels, it is enough to indicate the allowed
signals (symbols) or simply their number m and the allowed moments of signal change.
For m = 2 (such channels are called binary), the allowed times of signal change
(significant moments) are completely determined by the modulation rate. The transformation
S(t) → S*(t) in the ideal case reduces to the equality S(t)=S*(t). The difference arises
from the non-improvement of the communication line. The transformation S(t)→S*(t)
has two components - deterministic and random. Deterministic changes in the signal in
a discrete channel are delayed (time offset). The resolving device is a threshold device,
it emits signals of a fixed form, so no signal changes are observed. Random signal
changes are caused by interference.</p>
      <p>When converting symbols in a discrete channel, the received sequence of message
elements</p>
      <p>differs from the transmitted one  . In the general case, the probabilistic
laws of transformation</p>
      <p>→  ∗ are very complex due to the complex nature of the
interference. The influence of noise can be represented as an elemental summation of
a sequence with a sequence of errors. Then  ∗</p>
      <p>0 → 1 , the errors are considered symmetric. The multiplicity (number
of errors) is the number of errors t, which accounted for a given number of unit
elements: errors can be single, double, etc.</p>
      <p>From the point of view of the influence of interference on the fidelity of the
transmission, the channels are divided into symmetrical and asymmetrical, channels with
memory and without memory, stationary and non-stationary. In a symmetric channel,
the transmission probability does not depend on the statistics of the transmitted
sequence, but is completely determined by the error statistics. A stationary channel
without memory is called one in which the probability of an error in receiving an element
does not depend on the number of an element in the transmitted sequence and does not
depend on the values (zero or one) of the elements preceding or following it.</p>
      <p>The probabilistic model of a discrete channel is called the final description of the
channel, which allows, with known probabilities of the input signal, to find expensive
probabilities of the characteristics of a discrete channel without resorting to
experimental data or additional assumptions. Since statistics in a symmetric channel are
completely determined by the error statistics and do not depend on statistics, an error stream
is sufficient to describe it.
binomial distribution</p>
      <p>For independent errors, it is enough to know the only parameter 
to find the
distributions of the random variable. Based on Bernoulli's theorem, the probability of
occurrence in an n-element combination is equal to  errors   , 
is found by the
for 0  

0 the above equation becomes:
it is seen that the probability of receiving an undistorted combination
  ,</p>
      <p>1 
 0, 
1</p>
      <p>,
(1)
(2)
(3)
(4)
In the case of the probability of receiving a false combination, that is, a combination
that contains at least one error, the above equation becomes:
 
, 
∑</p>
      <p>1 

1, 
1 
0, 
1 
,
In the case of the probability of occurrence of m or more errors in a combination of
length n, the above equation becomes:
A simple error model gives only an approximate state in real channels. Further
investigation of the stream of errors in real channels showed that errors in communication
channels are grouped. The probability of an error in a group (pack) of errors increases
sharply and is significantly greater than 
. Let there be possible independent errors with conditional probabilities
P0  P1  1
in a "good" state
mula:
 and  in both channel states. Then the error probabilities are calculated by the
for

 
 .</p>
    </sec>
    <sec id="sec-2">
      <title>For  0 and  1, the statistics coincide with statistics.</title>
      <p>
        The mathematical model of the channel should provide the engineering ability to
calculate the basic characteristics [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the knowledge of which may be required when
evaluating various methods of increasing the reliability of the transmission [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] of
discrete information. These characteristics primarily include: the probability of an error
(incorrect reception of a single element)  ; distribution of intervals between errors,
as well as distribution of lengths of series of errors, bursts of errors; distribution of
probabilities   - occurrence of t errors in a block of information of length n.
2.2
      </p>
      <p>Discrete Channel Models with Error Bursts
As a general mathematical model of an information system channel, the model of L.P.
Purtov is used most of all. Models with Markov chains require a more accurate
description of the initial parameters and a large amount of computation, so they are used to
describe specific channels. L.P. Purtov's model describes the probability of a
multiplicity error equal to or greater than t in a block of length n elements, depending on the
error probability in the p element and the error grouping coefficient α:
 
∝
,
where  is the length of the codeword.</p>
      <sec id="sec-2-1">
        <title>The application of the model is limited by the values of the error rate</title>
        <p>typical for most channels.</p>
        <p>The error grouping factor varies within 0.5 ... 0.7 - for cable and 0.2 ... 0.4 - for radio
channels. Limit values: ∝ = 0 - independent errors and ∝ = 1 - all errors are collected
in one batch.</p>
        <p>Let us investigate the dependences   of the error probability of multiplicity t in the
code word using the above model. Let the code combination have  = 128 bits with
the probability of an independent error  10 and the error grouping factors ∝ =
0.5; 0.6 and 0.7. Figure 1 shows graphs of these dependencies.</p>
        <p>Figure 1 shows that, firstly, with an increase in the error grouping coefficient, all
other things being equal, the probability of an error of the multiplicity t decreases, and
this pattern remains in the entire field of application of the L.P. Purtov.
In other cases, the probability of an error of multiplicity t is always greater than the
probability of an error of multiplicity  1. And finally, with an increase in the error
grouping coefficient, the difference between the probabilities of errors of multiplicity 
and  + 1 changes.</p>
        <p>Analyzing the above figure, we can conclude that in real transmission channels of
control information, errors tend to be grouped. In this case, there is a tendency, for a
given number of bits of information (  = 128), the greatest probability of occurrence
of a burst of errors is when the length of this burst is  → 5. So, suppose that the
multiplicity of the error will be 4. To correct this error, it will be necessary apply noise
immunity code, will have a large correcting ability, with little redundancy.
(6)
, which are
0.02
0.015
P(t0.5)
P(t0.6) 0.01
P(t0.7)
0.005
0 0
5
10
15
20</p>
        <p>25
t
There are such coding methods that increase the efficiency of information transmission:
optimal coding, error detection coding and error correction coding [3].</p>
        <p>Error detection and correction codes increase the noise immunity of information
transmission.</p>
        <p>To select the type of correction code that is used for secondary coding, consider
the error rate and the nature of their distribution in time.</p>
        <p>A careful distribution of the statistical characteristics of the sequence of errors in
real communication channels showed that the errors are dependent and have a tendency
to grouping (batching), that is, there is a correlation between them.</p>
        <p>Most of the time, information on communication channels passes without
interference, and at some points in time there are bursts of errors, within which the error
probability turns out to be much higher than the average error probability, which is
found for a sufficiently long transmission time interval.</p>
        <p>With the group nature of the distribution of errors, one parameter - the probability
of error - does not fully characterize the channel; additional parameters are needed that
reflect the degree of grouping of errors in various types of channels.</p>
        <p>The reasons for the group nature of errors in channels of various types are as
follows: tropospheric radio links - fading and interference; radio relay lines - short-term
interruptions and impulse noise; over cable communication lines - overload of group
paths of high-frequency equipment, short-term interruptions and various kinds of
station and operational interference.</p>
        <p>For dedicated telephone cable channels, the error rate ranges from (2 ... 5) * 10-4
to 10-5. In switching telephone channels p = 10-3 ... 10-4, depending on the length of the
channel, the number and load of automatic telephone exchanges involved in the
connection of subscribers. For radio relay and tropospheric channels p = 10-3 ... 10-4 [3].</p>
        <p>In all real channels, the errors are very unevenly distributed over time. This is
especially typical for cable channels, in which the bulk of errors are concentrated at
certain hours of the day, responding mainly to an increase in the load of
channel-forming equipment and the3 time of changing the duty of the service personnel.</p>
        <p>The assessment of the reliability of information exchange, when designing
information transmission systems, is determined by the permissible probability of
interference in messages  int, At the same time, the probability of interference of the binary
symbol of the transmitted message  bs is indicated., In the event of independent errors
in the communication channels and (1- Pbs) - the probability of no interference. Then
for a binary sequence, that has n characters [4], equation becomes:
─ for the probability of a correctly received sequence:
,
.
,
─ for the probability of error in the received sequence:
When using redundant codes, it becomes possible to find and correct one or another
error rate depending on the code distance:
where i = 1,2,3, etc. is frequency of errors, and 
determined from the formula:

∙ ∑
∙
∑
∙
∙
mission channels.
to the formula:
This expression allows you to calculate the probability of an uncorrectable error in
transmitting information using a code that corrects t-fold errors.</p>
        <p>In practice, communication channels are characterized by the dependence of the
probability of interference of the next transmitted symbol on the distortion of the
previous one, as well as seasonal and daily changes in the weather, the presence of
industrial interference that changes the intensity at the time of the day and days of the week,
mutual interference, etc. All this leads to an abrupt nature errors in information
trans</p>
        <p>The calculation of error probabilities for batch distribution is carried out according</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>For codes that correct errors of multiplicity to t, the probability of correction</title>
      <p>Then four situations can be formulated:
2) The code word was received with an error (probability 
).
1) The code word was received without errors (the probability of this event is 

∑

 
1 
.</p>
      <sec id="sec-3-1">
        <title>From formula (13) it follows that the probability of uncorrected errors:</title>
        <p>Let us substitute formulas (8) and (11) into this expression and obtain:

-∑
 
1 
3) The code word was received with an error, which is corrected with the probability
of</p>
        <p>.
ability of this event is</p>
        <p>, then
4) The code word was received in error and cannot be corrected by this code. The
prob</p>
        <p>or 






1


1 
1
1 
1 
1</p>
        <p>!
∑
!
!
1
(7)
(8)
(9)
(10)
is:
(11)
).
(12)
(13)
(14)
(15)
a packet of errors of length b; 
where b is the length of the error packet; 
a packet to the length of this packet b.
is the density of errors in a packet, which is equal to the ratio of the number of errors in
- conditional probability of occurrence of
is the probability of distortion of a binary symbol; q</p>
      </sec>
      <sec id="sec-3-2">
        <title>Equation (16) determines the transmission error probability: by the formulas:</title>
        <p>Probability 

∑
1
and 

∑
for codes that determine bursts of errors, are calculated
∙ ∙ ∑
∑
1
1
∙
∑
∑
∙
∙
;
∑
where  is the length of the error packet found.</p>
        <p>Approximate formulas for determining 
─ for error-correcting codes:
look like:
where t is the multiplicity of the error being corrected; s - error grouping indicator;
─ for codes that find errors:



∑
,
,
 .
─</p>
        <p>for codes that detect and correct errors:
These formulas give good results if the number of errors e in combination with n
symbols satisfying the requirements e</p>
        <p>
          0.3n [
          <xref ref-type="bibr" rid="ref4">6</xref>
          ].
        </p>
        <p>When transmitting information with a simple non-redundant code, the reliability
of reception depends on the type of channel and the type of interference in it. In most
cases, the reliability that is found is insufficient. It must be increased so that the
probability of erroneous reception of the message by the consumer is less than the probability
of errors in the message without special measures.</p>
      </sec>
      <sec id="sec-3-3">
        <title>The use of redundant code is one of the ways to improve the reliability.</title>
      </sec>
      <sec id="sec-3-4">
        <title>All redundant codes can be used for:</title>
        <p>─ identification of errors;
─ error correction;
─ identification and correction of errors.</p>
        <p>In order to increase the reliability with the help of codes designed to detect errors,
it is necessary to introduce a feedback channel. Then the code word received on the
forward channel is analyzed to determine if it belongs to the allowed combination. The
allowed combination comes to the consumer after the check bits are rejected. If an error
is detected, a request signal is sent over the reverse channel, through which the
transmitter repeats the transmission of information. Therefore, the transmitting device must
(17)</p>
        <p>,
(18)
(19)
(20)
(21)
store information about the sent signals for a period of time sufficient for the receiving
device to analyze the combination and receive a possible error request.</p>
        <p>Error correction is usually applied when there are independent errors or short
bursts of errors in the communication channel. If the error weight is the same as the
codeword length, then the error burst corrections lead to unjustified losses of equipment
for encoders and decoders.</p>
        <p>Error-correcting codes can correct errors, the weight of which numerically does
not exceed 20-25% of the length of the code combination. Most probable errors with a
weight close to 50% of the length of the code word. Therefore, if it is necessary to
correct, those methods are appropriate that allow you to determine the verification
pulses from the information for a time exceeding the probable length of the burst of
errors [8].</p>
        <p>Thus, the choice of a method for increasing the reliability of information
transmission depends on many factors: the reliability of reception, the permissible
transmission rate, and dependence on errors in the communication channel are necessary.</p>
        <p>The degree of information protection from errors by the appropriate coding
method depends mainly on the minimum coding distance dmin of the given code.</p>
        <p>There are three types of code distance: Hamming, Lee and matrix. The first is
most widely used in coding theory. The Hamming code distance is inextricably linked
with the concept of the weight w of the code combination - the number of its elements
that are not equal to zero. Hamming code distance d between two combinations of the
same length n is defined as the number of similarly named bits (positions) that have
unequal elements. So, for binary codes, since in binary arithmetic adding identical
elements gives 0, and unequal ones - 1, the Hamming distance between two code
combinations can be determined by adding them bitwise modulo 2 and then counting the
number of nonzero elements, that is, determining the weight w of such a sum.</p>
        <p>The total number of code combinations of length n is equal to 2n, and the number of
those of them that are distant from the given in view d is the number of messages from
n to d:
In the Lie metric
  , 
0, 
 



!
!
2
!</p>
        <p>1..
∑

error correction with multiplicity 
rors, the condition must be satisfied:</p>
        <p />
      </sec>
    </sec>
    <sec id="sec-4">
      <title>To identify all elements with multiplicity, the code distance must be</title>
    </sec>
    <sec id="sec-5">
      <title>1. To correct and identify all er</title>
      <p>Due to the fact that, on the whole, each element (bit) of a combination of a Non-binary
(multi-position) code can have, in contrast to a binary, and more than one position (m</p>
      <sec id="sec-5-1">
        <title>1) from the alphabet q, the code distance is determined by the expression:</title>
        <p>where m is the number of positions in each bit (single new interval, corresponding to
the duration of one element) of the code combination.</p>
        <p>In the Hamming metric, the code distance, as for a binary code, is determined by
the number of bits of the same name with different positions (symbols):
(22)
1, and
(23)
(24)
(25)
|.</p>
        <p>|, 
| 
| =
,  
,
(26)</p>
        <p>, 
where 
ulo q.
plement.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>In modular metric   ,</title>
      <p>|</p>
      <p>|, that is, you should perform subtraction
mod</p>
      <p>The most rational should be considered information transmission systems in
which redundant codes are used only for detecting errors, because in real channels there
are often bursts of errors with a length of several tens or hundreds of symbols and to
correct them one would need a code with a code combination length that is measured
in thousands and tens of thousands of discharges, which is technically difficult to
im</p>
      <p>If the nature of the distribution of errors in a channel is known, this does not mean
that such errors are present only in this channel, and not in the modem, which is used
for research and can only change when the transmission rate, signal power, etc. The
nature of the errors is highly dependent on the modem being used. Therefore, it is
always necessary to consider the choice of modem and code as a single task and find
the optimal solution.</p>
      <p>After determining the characteristics of the communication channel, further
selection of the code is characterized by the error probability. By this parameter, codes are
selected in which the probability of detecting an error 
less 
. .</p>
      <p>.</p>
      <p>
        To ensure a given information transfer rate, you need to choose a code with the
minimum required number of check bits, which provide 
. In this case, one should not
forget that the detecting properties are determined not only by the number of check bits,
but also by the type of check ratios, and for cyclic codes - a generating polynomial.
Compared to other codes, the best code that not only detects but also corrects
independent (single) errors and has recommendations of international organizations and is
relatively simple to implement is Hamming code, both binary and generic. As for both
packets and independent errors, the BCH, Fire and Reed-Solomon codes are the best
for the same parameters. These codes can be used for the transmission the ring codes
shift indexes vectors that are described in [
        <xref ref-type="bibr" rid="ref14 ref15">17, 18</xref>
        ]. But ring codes may have limited use
for the transmission of service information.
      </p>
      <p>Despite all the advantages of error-correcting coding, one of its disadvantages is an
increase in the information array. Table 1 shows the coefficient of increasing the
information array for the above defined optimal codes for various error probabilities of
one element in the communication line (channel).</p>
      <p>According to the OSI hierarchy, the control information transmission channel
consists of physical and data link layers.</p>
      <p>The physical layer of the channel ensures that the parameters of the signal are
matched to such characteristics of the physical channel as the amplitude-frequency
characteristic and the distribution of the noise power density, and must provide the
specified constant component of the signal delay and the probability of an error in the
binary bit of the transmitted digital stream, which, in turn, defines the requirements for
the average bit rate. Building a physical layer subsystem is a multi-criteria optimization
problem, the criteria of which are:</p>
      <sec id="sec-6-1">
        <title>Distortion probability of one element in a line</title>
      </sec>
      <sec id="sec-6-2">
        <title>Coefficient of increasing the information array (at k = 8)</title>
      </sec>
      <sec id="sec-6-3">
        <title>Distortion probability of one element in a line</title>
      </sec>
      <sec id="sec-6-4">
        <title>Coefficient of increasing the information array (at k = 8)</title>
      </sec>
      <sec id="sec-6-5">
        <title>Distortion probability of one element in a line</title>
      </sec>
      <sec id="sec-6-6">
        <title>Coefficient of increasing the information array (at k = 8)</title>
      </sec>
      <sec id="sec-6-7">
        <title>Distortion probability of one element in a line</title>
      </sec>
      <sec id="sec-6-8">
        <title>The coefficient of increasing the information array (at k = 8)</title>
      </sec>
      <sec id="sec-6-9">
        <title>Distortion probability of one el</title>
        <p>ement in a line
Coefficient of increasing the
information array
(at k = 8)</p>
        <p>3
n
o
ita 2,5
m
fro 2
n
i
teh 8=1,5
isegan kt(a 1
r a0,5</p>
        <p>y
c r
ifn ra
o 0
t
n
e
i
c
i
f
f
e
o
C</p>
        <p>
          Distortion probability of one element in the channel
─ constant value of the digital stream delay in the channel;
─ the value of the error probability in a binary digit of a digital stream;
─ average bit rate of digital stream; the cost of the physical layer subsystem.
The link layer provides the combination of control messages into a single stream for
transmission to the physical layer, control of the error probability of the received
information, control of the message delay in the channel depending on the probability of
drinking, which is provided by the physical layer subsystem and the length of a specific
control message transmitted by the upper layers of the network control system. The
construction of the link level subsystem is also a multi-criteria optimization problem,
the criteria of which are:
─ variance of the control message delay value in the channel;
─ the value of the error probability in the control message;
─ average transmission rate of the message flow [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ];
─ cost of the link layer subsystem [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
        <p>The random nature of the message delay in the channel and the error probability in the
message are determined by the non-stationarity of the interference characteristics in
most physical channels and, as a consequence, by the variable value of the bit error
probability itself and the message processing time at the channel layer. There are
possibilities to reduce the variance of the message error probability and the variance of the
message delay in the channel:
─ the use of correction codes with a large correction capacity (for example,
convolutional ones, which leads to the introduction of significant redundancy, will not be
effectively used when reducing the probability of an error in a bit and will
significantly reduce the channel capacity;
─ block coding when transmitting very large blocks, the length of which is so large
that the probability of errors in a block differs very little from the average. It is
widely known block codes with optimal redundancy for a given correction ability,
however, coding in very large blocks leads to an unacceptable value for control
information of a constant value of the digital stream delay in the channel and an
increased complexity of correction code decoders.</p>
        <p>The following restrictions are most typical for such a control information transmission
channel:
─ control information arrives at the channel input in the form of messages (blocks)
with a length that is a multiple of 8 bits (due to the specifics of the development of
a modern element base);
─ the block nature of the control information determines the use of block codes (more
often Bose-Chowdhury-Hawkingham (BCH) codes or their non-binary subclass</p>
        <sec id="sec-6-9-1">
          <title>Reed-Solomon (RS) codes);</title>
          <p>─ the physical layer provides the error probability for the binary symbol y, but errors
are grouped into packets.
and the number of information items - by the expression:</p>
          <p>Among the anti-jamming codes, we will choose a code, using which, the indicators of
quality and survivability of the information system will increase.</p>
        </sec>
        <sec id="sec-6-9-2">
          <title>When choosing a</title>
          <p>code, it is necessary that the total number of characters is approximately the same.
Then, comparing the redundancy of the codes with the redundancy of the BCH code,
namely, it is used as a noise immunity code when transmitting information in
information systems, where bursts of errors prevail.</p>
          <p>For BCH codes to correct 4 errors, it is necessary that the code distance adheres to the
condition dmin = 
+</p>
          <p>+ 1, therefore dmin = 4 + 4 + 1 = 9 the length n of the BCH
code combination can be determined as follows:
an odd number. Thus, the length n can only have an odd number of elements.
where h &gt; 0 is integer;  is an odd positive number, when divided by which n becomes
The number of verification code elements is determined by the expression:



2</p>
          <p>1 or
2
,</p>
          <p>,

1
or   
28,
Thus, n = 127 = 27 - 1 = 127, 
redundancy R = 28/127 = 0,22.</p>
          <p>For the Fire code, we find h, provided that the length of the error burst is 4. h = 24 - 1 =
15. For this situation, the generating polynomial for the Fire code is PF(х) = (х4 + х +
1)( х7 + 1) = х11 + х8 + х7 + х4 + х + 1, then the degree of the irreducible polynomial
P(х) is l = 4, c = 7. Referring to formulas (3.12), (3.13), (3.14), we find
n, r, k.</p>
          <p>n = НСК (7, 15) = 715 = 105; r = 4 + 7 = 11; k = 105 - 7 - 4 = 94. Redundancy of
the code R = 11/105 = 0,1.</p>
          <p>It follows from this that it is much easier to correct four errors that are in the same place
than the same four errors, which are randomly distributed over the entire length of the
.
k = 127 - 28 = 99. Code
(27)
(28)
(29)
combination.</p>
        </sec>
      </sec>
      <sec id="sec-6-10">
        <title>Codes</title>
      </sec>
      <sec id="sec-6-11">
        <title>Compound</title>
      </sec>
      <sec id="sec-6-12">
        <title>Fire</title>
        <p>BCH</p>
      </sec>
      <sec id="sec-6-13">
        <title>Compound</title>
      </sec>
      <sec id="sec-6-14">
        <title>Fire</title>
        <p>BCH</p>
        <p>Reed-Solomon
5
7
9
11
13</p>
        <p>15
After analyzing the data obtained, we can conclude that the Fire code provides a lower
probability of an uncorrected error than the BCH, compound, or Reed-Solomon codes
at the same coding distance, that is, these codes require greater message redundancy to
provide the same probability uncorrected error as the Fire code.</p>
        <p>So, after considering the codes that allow you to correct single bursts of errors, you
can propose the use of the Fire code instead of the BCH or Reed-Solomon code, since
it has less redundancy compared to other noise immunity codes that correct bursts of
errors.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskiy</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.</surname>
          </string-name>
          <article-title>Tsopa Assessment Technique and Selection of Interconnecting Line of Information Networks</article-title>
          .
          <source>-IEEE, 3rd International Conference on Advanced Information and Communications Technologies (AICT)</source>
          .
          <source>-2019</source>
          . - pp.
          <fpage>71</fpage>
          -
          <lpage>75</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Boiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Druzhynin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Zeniv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Eromenko</surname>
          </string-name>
          .
          <article-title>Increasing the efficiency of information transmission in communication channels</article-title>
          .
          <source>Indonesian Journal of Electrical Engineering and Computer Science</source>
          . -
          <year>2020</year>
          . - Vol
          <volume>19</volume>
          , №
          <fpage>3</fpage>
          -
          <lpage>С</lpage>
          .
          <fpage>1306</fpage>
          -
          <lpage>1315</lpage>
          . DOI: http://doi.org/10.11591/ijeecs.v19.
          <year>i3</year>
          .
          <fpage>pp1306</fpage>
          -
          <lpage>1315</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          5. Richard E.
          <source>Blahut Theory and Practice of Error Control Codes Hardcover - January 1</source>
          ,
          <fpage>1984</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          6.
          <string-name>
            <surname>Berrou</surname>
            <given-names>C</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glavieux</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <article-title>"Near Optimum Error Correcting Coding and Decoding: TurboCodes"</article-title>
          ,
          <source>IEEE Trans. On Comm.</source>
          , Vol.
          <volume>44</volume>
          , No.
          <volume>10</volume>
          , pp.
          <fpage>1261</fpage>
          -
          <lpage>1271</lpage>
          , Oct.
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wu</surname>
          </string-name>
          .
          <article-title>"Implementation of parallel and serial concatenated convolutional codes." Dissertation submitted to the Faculty of the Virginia Polytechnic Institute</article-title>
          and State University. April,
          <year>2000</year>
          . - 206 p.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          9.
          <string-name>
            <given-names>J.</given-names>
            <surname>Hagenauer</surname>
          </string-name>
          ,
          <article-title>"The turbo principle: Tutorial introduction and state of the art,"</article-title>
          <source>in Proc. of The Int. Symp. on Turbo Codes and Related Topics (Brest</source>
          , France), Sept.,
          <year>1997</year>
          . - pp.
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          10.
          <string-name>
            <given-names>P.</given-names>
            <surname>Jung</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Plechinger,</surname>
          </string-name>
          <article-title>"Performance of rate compatible punctured Turbo-codes for mobile radio applications,"</article-title>
          <source>Electronics Lettes</source>
          ,
          <year>1997</year>
          , vol.
          <volume>33</volume>
          , No.
          <volume>25</volume>
          , pp.
          <fpage>2102</fpage>
          -
          <lpage>2103</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          11.
          <string-name>
            <given-names>G.</given-names>
            <surname>Caire</surname>
          </string-name>
          and
          <string-name>
            <given-names>E</given-names>
            <surname>Biglieri</surname>
          </string-name>
          ,
          <article-title>"Parallel concatenated codes with unequal error protection,"</article-title>
          <source>IEEE Transactions on Communications</source>
          , vol.
          <volume>46</volume>
          , No. 5, May
          <year>1998</year>
          , pp.
          <fpage>565</fpage>
          -
          <lpage>567</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          12.
          <string-name>
            <given-names>P.</given-names>
            <surname>Robertson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Villebrun</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Hoeher</surname>
          </string-name>
          ,
          <article-title>"A comparison of optimal and sub-optimal MAP decoding algorithms operating in the log domain,"</article-title>
          <source>in Proc. IEEE Int. Conf on Commun.</source>
          ,
          <year>1995</year>
          . - pp.
          <fpage>1009</fpage>
          -
          <lpage>1013</lpage>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          13.
          <string-name>
            <surname>Tilavat</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Shukla</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Simplification of procedure for decoding Reed-Solomon codes using various algorithms: an introductory survey</article-title>
          .
          <source>International Journal of Engineering Development and Research</source>
          ,
          <volume>2</volume>
          (
          <issue>1</issue>
          ),
          <fpage>279</fpage>
          -
          <lpage>283</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          14.
          <string-name>
            <surname>Sarwate</surname>
            ,
            <given-names>D. V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Morrison</surname>
            ,
            <given-names>R. D.</given-names>
          </string-name>
          (
          <year>1990</year>
          ).
          <article-title>Decoder malfunction in BCH decoders</article-title>
          .
          <source>Information Theory</source>
          , IEEE Transactions on,
          <volume>36</volume>
          (
          <issue>4</issue>
          ),
          <fpage>884</fpage>
          -
          <lpage>889</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          15. Richard E. Blahut,
          <article-title>"Algebraic Codes for Data Transmission"</article-title>
          ,
          <year>2003</year>
          , chapter
          <issue>7</issue>
          .
          <article-title>6 "Decoding in Time Domain"</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>S. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chung</surname>
            ,
            <given-names>W. H.</given-names>
          </string-name>
          , &amp; Han,
          <string-name>
            <surname>Y. S.</surname>
          </string-name>
          (
          <year>2014</year>
          ,
          <article-title>October)</article-title>
          .
          <article-title>Novel polynomial basis and its application to reed-solomon erasure codes</article-title>
          .
          <source>In Foundations of Computer Science (FOCS)</source>
          ,
          <source>2014 IEEE 55th Annual Symposium on</source>
          (pp.
          <fpage>316</fpage>
          -
          <lpage>325</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          17.
          <string-name>
            <surname>Otrokh</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuzminykh</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hryshchenko</surname>
            <given-names>O..</given-names>
          </string-name>
          <article-title>Method of forming the ring codes/</article-title>
          / CEUR WorkshopProceedings - Vol-
          <volume>2318</volume>
          , -
          <fpage>2018</fpage>
          , pp.
          <fpage>188</fpage>
          -
          <lpage>198</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          18.
          <string-name>
            <surname>Berkman</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Otrokh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuzminykh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hryshchenko</surname>
            <given-names>O</given-names>
          </string-name>
          .
          <article-title>Method of formation shift indexes vector by minimization</article-title>
          of polynomials// CEUR Workshop Proceedings -Vol-
          <volume>2577</volume>
          , -
          <fpage>2019</fpage>
          , pp. pp.
          <fpage>259</fpage>
          -
          <lpage>269</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>