<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Assessment of Possibility of Modernization of Hierarchy Code Structure of Multidimensional Signal to Increase the Efficiency of Functioning of Educational and Training Telecommunication Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Golubenko</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">State University of Telecommunications</orgName>
								<address>
									<addrLine>7 Solomenska str</addrLine>
									<postCode>03110</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrii</forename><surname>Onysko</surname></persName>
							<email>oniskoandrij@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">National Technical University &quot;Igor Sikorsky Kyiv Polytechnic Institute</orgName>
								<address>
									<addrLine>&quot; 37 av. Peremohy</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andriy</forename><surname>Lemeshko</surname></persName>
							<email>andrii.lemeshko@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution">State University of Telecommunications</orgName>
								<address>
									<addrLine>7, Solomenska str</addrLine>
									<postCode>03110</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrii</forename><surname>Zelnytskyi</surname></persName>
							<affiliation key="aff3">
								<orgName type="institution">Ivan Cherniakhovskyi National Defence University of Ukraine</orgName>
								<address>
									<addrLine>28 Povitroflotskyi ave</addrLine>
									<postCode>03049</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleg</forename><surname>Zabolotnyi</surname></persName>
							<affiliation key="aff3">
								<orgName type="institution">Ivan Cherniakhovskyi National Defence University of Ukraine</orgName>
								<address>
									<addrLine>28 Povitroflotskyi ave</addrLine>
									<postCode>03049</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrii</forename><surname>Zakharzhevskyi</surname></persName>
							<email>a.zakharzhevskyi12@gmail.com</email>
							<affiliation key="aff3">
								<orgName type="institution">Ivan Cherniakhovskyi National Defence University of Ukraine</orgName>
								<address>
									<addrLine>28 Povitroflotskyi ave</addrLine>
									<postCode>03049</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Turovsky</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">State University of Telecommunications</orgName>
								<address>
									<addrLine>7, Solomenska str</addrLine>
									<postCode>03110</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff4">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>Lubomyr Husar ave. 1</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff5">
								<orgName type="department">Internet of Things</orgName>
								<address>
									<addrLine>January 19</addrLine>
									<postCode>2022</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Assessment of Possibility of Modernization of Hierarchy Code Structure of Multidimensional Signal to Increase the Efficiency of Functioning of Educational and Training Telecommunication Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">F379939229AF221CAAE7FA18627F0368</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T05:30+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Continuous transmission channel, multidimensional signal, hierarchical signal code structure, signal distance 0000-0002-1776-5160 (O. Golubenko)</term>
					<term>0000-0001-7178-1471 (A. Onysko)</term>
					<term>0000-0001-8003-3168 (A. Lemeshko)</term>
					<term>0000-0002-3910-7329 (A. Zelnytskyi)</term>
					<term>0000-0002-5950-5068 (O. Zabolotnyi)</term>
					<term>0000-0001-7019-9949 (A. Zakharzhevskyi) 0000-0002-4961-0876 (O. Turovsky)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In order to increase the efficiency of modern functioning of educational and training telecommunication systems, research is currently being conducted to increase the amount of information transmitted, its security and speed of transmission through communication channels. One of the directions of such work is the introduction of the approach to the use of multidimensional signals when using them in continuous information transmission channels of educational and training telecommunication systems. The results of research conducted in recent years show that to ensure high quality information transmission in continuous channels can be a method of joint demodulation and decoding operations in the process of performing a single procedure, which involves creating a code structure of multidimensional signal. In the given article the questions of an estimation of possibility of modernization of a hierarchical code design of a multidimensional signal by a method of variation of its parameter for increase of efficiency of work of a continuous channel of information transfer in educational and training telecommunication systems are considered. It is established that the hierarchical code construction of a multidimensional signal, when applied, has the potential to increase the speed of information transmission through a continuous channel. This can be done by upgrading the specified code structure of the signal by reducing the signal distance. The influence of the reduction of the signal distance on the efficiency of the hierarchical code construction is estimated. It was found that by reducing the signal distance of the hierarchical code structure of the signal from 2 or more times, the signal transmission rate can increase and reach up to twenty percent. The implementation of the modulation procedure has no fundamental difficulties, provided that for each code of the code structure known coding procedure using binary codes. The obtained results allow to build a sufficiently accepted procedure for demodulation according to the hierarchical code constructions of the signal with a simultaneous increase in the data rate in the continuous channel that will use such a code construct.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>One of the ways to increase the efficiency of modern educational and training telecommunication systems is to improve existing and develop new methods of modulation and noise-tolerant coding for continuous signal transmission channels. The transition in the communication lines of educational and training telecommunication systems to ensembles of multidimensional signals increases the speed of information transmission and provides the transmission of large arrays of information. At the same time, the issues of ensuring a high probability of information transmission are solved by using perfect noisetolerant coding.</p><p>The use of multidimensional (with a large base, components, complex) signals can significantly improve the quality of message transmission through communication channels training -training and other telecommunications systems <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Problem Statement</head><p>Constructive signal theory is developed mainly for a discrete, primarily binary channel, ie in the framework of coding theory. In coding theory, a discrete channel formed by a modulator of elementary signals, a continuous channel and a demodulator of elementary signals is considered to be given. At the same time, it is not possible to approach the potential characteristics of the continuous channel both due to the narrowing of the signal class and due to insufficient use when decoding information about the distortion of the signal in the continuous channel. The latter disadvantage is overcome by combining demodulation and decoding into a single reception procedure as a whole, the so-called soft (or analog) decoding (or solution) and reception in a semi-continuous channel <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>. To overcome the first disadvantage, modulation, ie the conversion of a message word into a signal at the input of a continuous channel, should be considered as a single procedure that combines the coding and modulation of elementary signals. The number of known signal designs that reflect this approach is small. Basically, these are code constructions based on the construction of a hierarchical structure, ie hierarchical code constructions of the signal (HS) <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>In turn, regarding the construction of such code structures and the features of their use in multidimensional signals, it can be concluded that their certain parameters due to changes in values may affect the speed of information transmission in a continuous channel. That is, in general, to influence the effectiveness of such a channel <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>.</p><p>The question of estimating the possibility of the influence of the parameters of hierarchical code constructions of multidimensional signals on the efficiency of the continuous information transmission channel in training and other telecommunication systems is an urgent scientific task and is currently insufficiently studied.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Review of the Literature</head><p>A number of works are devoted to the analysis of code constructions of multidimensional signal and assessment of their possibilities for modernization in the direction of influencing the efficiency of continuous channel operation.</p><p>The paper <ref type="bibr" target="#b6">[7]</ref> presents the results of research on the analysis and synthesis of code structures designed for use in modern and advanced telecommunications systems. Types and features of application of different types of code constructions are given. However, there was no direct assessment of the possibility of their modernization in the direction of the impact of changing the parameters to increase the efficiency of the continuous channel.</p><p>The work <ref type="bibr" target="#b7">[8]</ref> is devoted to the research of the development of the theory of signal code constructions and code coding. In this paper the issues of application of different types of code constructions are considered at a high level and the directions of their improvement are determined. Direct questions of an estimation of efficiency of change of parameters of code designs in the direction of increase of efficiency of a continuous channel of information transfer are not presented in this work.</p><p>In article <ref type="bibr" target="#b8">[9]</ref> the consideration of the question of construction of continuous channels of information transfer at application in them of various types of code designs is given. The issue of evaluating the efficiency of the channel and building a code structure is not considered in the paper. Accordingly, there are no questions in the paper to assess the impact of modernization of code structures on the efficiency of the continuous information transmission channel.</p><p>Article <ref type="bibr" target="#b9">[10]</ref> investigates the construction of multidimensional information transmission signals using the hierarchical coding algorithm based on an integral system proposed in this paper. One of the types of code design of the signal is directly considered, but without the analysis of its efficiency and the impact on it of changes in the parameters of the code design.</p><p>Thus, the scientific task to which this article is devoted is the analysis and evaluation of the possibility of modernization of the hierarchical code structure of multidimensional signals in the direction of improving the efficiency of continuous information transmission channels. This modernization in general, while providing the properties of simplicity and versatility, should provide greater speed of information transmission in a continuous channel through its modernization by changing the parameters of the code design</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Materials and Methods</head><p>The research is carried out in relation to the structural scheme of a single -channel information transmission system, which uses the code structure of a multidimensional signal for a continuous information transmission channel of a training telecommunication system.</p><p>The block diagram of a particular system is shown in Fig. <ref type="figure" target="#fig_0">1 [7]</ref>. Methods of noise-tolerant coding theory with error correction, theory of radio signal redundancy were used to conduct research and evaluate the possibility of modernization of hierarchical code constructions of multidimensional signal for continuous information transmission channel. Operator methods of radio space transformation, statistical theory of communication, methods of determining the free distance of invariant signal-code structures were also used <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b12">13]</ref>  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Channel codec Modem</head><p>A pair of mappings f and φ specifies the mapping of the dictionary onto the set of signals, determining the design! of the signal system, hereinafter referred to as code. Here is a constructive set of signals, presented in the form of a Cartesian power <ref type="bibr" target="#b12">[13]</ref>.</p><p>Suppose that for each pair of signals a measure of distinction D (x', x") is defined, hereinafter referred to as a signal distance or simply a distance if misunderstandings are excluded. The signal distance is not necessarily a metric but in some cases of interest is a monotonic function of the metric. For many (but not all) types of channels, the signal distance is additive, that is, represented in the form <ref type="bibr" target="#b0">[1]</ref>:</p><formula xml:id="formula_0">           0 1 , , . N nn n D x x D x x (<label>1</label></formula><formula xml:id="formula_1">)</formula><p>An example is the Euclidean distance square (not the metric) or the distances of Hamming and Lee (metrics). When using a code construct, the relationship between the minimum signal distance on the set of signals and the Hamming's distance d is given in conditions (1) by the obvious ratio <ref type="bibr" target="#b0">[1]</ref>:</p><formula xml:id="formula_2">            ,,</formula><p>,. min</p><formula xml:id="formula_3">x x A x x D D x x d (<label>2</label></formula><formula xml:id="formula_4">)</formula><p>In the hierarchical code structure X is one-dimensional real (if the channel is low-frequency) or onedimensional complex, that is, a two-dimensional real set (with amplitude and phase modulation of elementary signals in band channels). Fundamentally, the code construct is suitable at any dimensionality in the set of elementary X signals. However, it is successful only if all nonzero distances in X are the same, for example, when X is the correct simplex (in particular, consists of two signals) or a set of orthogonal signals with the same norms. Then the signal distance between the two signals from A is proportional to Hamming's distance between the words of the coderepresentations of these signals, and, with a good code, the dope is good. However, with a high power M of the set X, the increase of which is necessary to obtain high speed, the distances on X are significantly different. The code construct that replaces all nonzero distances     0 , nn D x x with the smallest of them, which can be interpreted as binary distance quantization, does not take into consideration these differences. At the same time, it has two important advantagescomparative simplicity and versatility. Under versatility, a fundamental possibility of obtaining signals systems of arbitrary dimensionality and with arbitrary signal distances is accepted. Simplicity is ensured by the regularity (for example, algebraic properties) of codes that combine the same-type elementary signals into multidimensional. Code structures retain these advantages in one way or another but make it possible to obtain more powerful signal systems due to more subtle accounting of the distribution of distances on X <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b12">13]</ref>.</p><p>Hierarchical code structure are based on the split of many elementary signals into continuous subsets, in each of which, with a successful split, the signal distance between the nearest signals is greater than all X. The most convenient hierarchical structure (HS) is the one in which the ideas of the generalized cascade code <ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref> are adapted for the signal system with arbitrary additive signal distance <ref type="bibr" target="#b15">[16]</ref>. The hierarchy means the set L of the breakdown of sets X into classes such that all classes of the same level (one partition) are equally powerful and can include classes of the previous level only entirely. That is, classes of the previous level are "nested" in classes of the next level, similar to the system of internal nested codes of generalized cascading code. The set of classes of the (l-1)-level, included in the class of the 1st level, is mapped mutually and unambiguously onto the set of characters of the Мl-dimension code N, Ml, dl)Ml of the l-th level. This is the analog of the external code of the generalized cascading code, where M1M2 ... ML=M. Since the signal distances between elementary signals of the l-level class increase with a decrease in l, the transition from a code structure with one M-dimensional code to a multicode HS makes it possible to increase the power of the set of signals without reducing the minimum signal distance. This is similar to when the transition from cascading to generalized cascading code makes it <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b12">13]</ref>:</p><formula xml:id="formula_5">               1 ln 1 ln</formula><p>1, ,..., ,..., , ..., 0 ,, min nn l n q Ln q q q q l n n q D x x <ref type="bibr" target="#b2">(3)</ref> where</p><formula xml:id="formula_6">       1 ln 1,</formula><p>, , ,..., ,</p><formula xml:id="formula_7">n n l n Ln x f q q q q        1 ln 1,</formula><p>, , ,..., .</p><p>n n l n Ln</p><p>x f q q q q Possible to increase code power without reducing the minimum Hamming's distance <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>.</p><p>The totality of L-convolutional codes makes it possible to get a convolutional analog of HS signals for continuous or discrete channels with additive signal distance based on the same hierarchy.</p><p>First of all, in terms of assessing the effect of signal distance on the efficiency of code structure operation, we are interested in those designs in which the character encoding at all levels of the hierarchy is carried out through the signal distance <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b6">7</ref>]. Let's analyze and evaluate the influence of the signal distance on the efficiency of the hierarchical code structure.</p><p>Suppose that on a set of elementary signals X of power M=M1M2...ML a hierarchy is defined -a set L of division into disparate classes. Each class of the l-th level of the hierarchy (l-th division) includes Ml classes of the (l-1) level, that is, it consists of μl=M1M2….Ml signals. The numbering of the classes of the (l-1)-th level, which are included in the class of the l-th level, sets a mutually unique mapping of the set of classes of the (l-1)-th level onto the set of digits {0, ..., Мl-1}. Therefore, the set (q1n,...,qln), where it determines the only value of the n-th elementary signal, where f is the rule (operator) of modulation of elementary signals. We compare the l-th level and the minimum l-th signal distance in the class <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref> The L level class is the same as X, so δL=δ. In the hierarchy, one can also include a zero level with M classes of one signal in each and at δ0=∞. Since the class of the next level can include the class of the previous level only entirely, then one can combine two levels by disregarding the (l-1)-th partitioning, so that one can take into consideration that δ1&gt;δ2&gt;...&gt;δL=δ <ref type="bibr" target="#b12">[13]</ref>.</p><p>Let q1=(qi1, ..., qiN) be the word of code (N, Ml, dl)Ml of the l-th level, the source dictionary is represented by the Cartesian product of the subsection of mutually unambiguous mapping onto the llevel code. Under the hierarchical structure, authentic authors understand the totality of the hierarchy on the set of elementary X signals, the mapping of the f sets of (qin, ..., qLn) on the set of X, L level codes and L mapping φl. The scheme of the corresponding sequence of transformations (modulation) is as follows <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>:</p><formula xml:id="formula_8">           1 1 ln ,..., ,..., . l f L l l n u u u q q q x</formula><p>Here, the left arrow means splitting a word into subsections (the word u can be a block in the sequence of characters of the source of information; if the power of the sets of blocks is less, then some dictionary words and signals are not used). Then each subword is encoded into the word code (Nl, dl )Ml. The result is L code words of the same length N. The elementary signal modulator converts a set of n-characters of all words into the n-th elementary signal that enters the channel.</p><p>Assertion 1. The hierarchical structure sets the signal system with a power of the set of signals and with a minimum signal distance <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b10">11]</ref>:</p><formula xml:id="formula_9">    min . ll i l L Dd (4)</formula><p>The statement about the number of signals is obvious. It is also clear that HS sets the signal system, that is, the mutually unambiguous mapping of dictionary U on the set of signals A. To prove (4), consider a distance between the two signals</p><formula xml:id="formula_10">    1 ,..., , N x x x       1 ,..., , N x x x where      1 ,..., , n Ln n x qq f         1 ,..., . nL n n x q f q</formula><p>There are at least one l and one n such as</p><formula xml:id="formula_11">  </formula><p>11 nn qq at x′≠x′′ and, then, there is</p><formula xml:id="formula_12">           11 max : ,1<label>,1 , .</label></formula><p>nn l q q l L n L Then δλ is the least of the nonzero distances between the elementary signals included in x′ and x′′ any of such distances</p><formula xml:id="formula_13">           0 1 1 , , , n n n n xq D x q</formula><p>where  </p><formula xml:id="formula_14">    1 1 , n n q q</formula><p>is the Kronecker symbol (0 or 1). Hence:</p><formula xml:id="formula_15">                    1 , , , N nn n D x x q q d (<label>5</label></formula><formula xml:id="formula_16">)</formula><p>Since the signals correspond to different words of the λ-th level code. Since such λ is found for any pair of different signals from, (4) follows from <ref type="bibr" target="#b4">(5)</ref>.</p><p>With the predefined minimum signal distance D, the minimum Hamming's distance of codes should be chosen equal to <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>: <ref type="bibr" target="#b5">(6)</ref> where ]D/δ l [ is the smallest integer, not less than D/δ l . Since at l&lt;L, the Hamming's distance d l necessary for codes of all levels, except the last, can be, especially for the first levels, significantly less than d=dL, which makes it possible to increase the power of the set of signals in HS compared to the code construct.</p><formula xml:id="formula_17">     , l l D d</formula><p>Note 2. 1: The hierarchy is set by any L equivalence relationship on X if each breaks X into equalpower classes and the class of the next equivalence relation includes either all or no elements of the class of the previous relation. Thus, if X is mutually unambiguously mapped onto group G (for example, <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b10">11]</ref>) and    12 ...</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>L G G</head><p>G G are its subgroups of orders μ 1 , …, μ L , where μ L =M 1 …M l , then the adjacent class of group G on the subgroup G l is mapped on the class of the l-level of the hierarchy. This type of HS with Hamming's distance as a signal includes generalized cascading codes. If X is given (as the region of values) by the function of integer arguments, then the equivalence ratio can be defined by the fixation of some arguments <ref type="bibr" target="#b12">[13]</ref>.</p><p>Let (λ 1 ,…., λ Λ ) be a permutation of indexes and q ln =p λ . Any such order of indices corresponds to the Λ-level hierarchy with the minimum δ l , conditioned by <ref type="bibr" target="#b2">(3)</ref>. Instead of permutation, one can use another arbitrary mutually unambiguous match of sets (p 1n ,…., p Λn ) and (q 1n , …, q Ln ), given by L functions. We do not know the general method of such variable recoding, which leads to a successful hierarchy. Some of the recoding techniques are given in examples 8-10.</p><p>Note 2. 2: The signal system given by the hierarchical structure can be matched with other HSs, as any of the L! level permutations define any HS. Let q ln becomes a symbol of the l-th level at the i-th permutation, at which, taking into consideration the corresponding changes in (3), the order of character fixation, the minimum distance equals  () .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>i l</head><p>From statement 1, the score from below follows Dd This score is true for all permutations, therefore <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b12">13]</ref> Methods of mathematical modeling to assess the impact of changes in the signal distance on the efficiency of the continuous channel of information transmission for certain types of code structures of multidimensional signals.</p><formula xml:id="formula_18">   () min . i li</formula><p>For the hierarchical code structure we will perform the following calculations. For a hierarchical code structure, the following calculations will be made. Example 2: Assume v=2, N=3, X (0) is the point at the coordinate origin (degenerate polytope), X (1) and X (2) are the mutually rotated hexagons with radii</p><formula xml:id="formula_19">   1 2, p    2 6 p</formula><p>and angles at the vertices <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b18">19]</ref>:</p><formula xml:id="formula_20">            1 / 6 / 3 2 / 3, i n n n i s t where    1,2 , i    0,1 , n s    0,1,2 . n t</formula><p>It should be borne in mind that the minimum energy distance between polytopes <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b4">5]</ref>:</p><formula xml:id="formula_21">                <label>2 2 , 4 sin</label></formula><p>,</p><formula xml:id="formula_22">i j i j x ij i j p p p p<label>(7)</label></formula><p>where ψ ij is the half of the smallest angle between the vertices of polytopes. The mapping As a result of ( <ref type="formula" target="#formula_22">7</ref>), here</p><formula xml:id="formula_23">        0,1 1,2 2, xx    0,<label>2 6.</label></formula><p>x Assume that to build using HS signals on the sphere it is necessary to satisfy the condition [2, 3, 5]:</p><formula xml:id="formula_24">   2 1 , N nv n pN  , nn px<label>(8)</label></formula><p>The four words of the polytope code P satisfy (8): (1,1,1)it corresponds to a set of radii</p><formula xml:id="formula_25">     1 2 3 , ,<label>2, 2</label></formula><p>, 2 p p p and cyclic shifts of the word (2,0,0), that is, a set of radii ( 6 ,0,0). Let D=6. The energy distance between any pair of four constructive classes of signals X (p) is not less than D=6, which is checked by <ref type="bibr" target="#b6">(7)</ref>. Between the signals of each of the last three classes (with different dialing radii), the distance is also at least D=6, so all elements of these classes can be taken as signals. Such signals are 3•6=18. In the first constructive class, 63=216 signals. Of these, using an HS example 4, one can select 332=54 signal at D=6 The resulting set of M=72 signals corresponds to the most well-known 6dimensional packing of equal spheres relating to their equal sphere <ref type="bibr" target="#b19">[20]</ref> The resulting set of signals can be matched to the hierarchy and then use HS.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Results!</head><p>Generalized results of estimating the signal distance reduction effect with improving the operational efficiency of code structure of multidimensional signal are given in Table <ref type="table">1</ref>.</p><p>Table <ref type="table">1</ref> lists the parameters of signal code constructs built using the results of solutions to the examples of the specified types of code structures <ref type="bibr" target="#b12">[13]</ref>.</p><p>The first column shows the dimensionality of a signal system. The secondthe dimensionality of elementary or, in the form of the sum of dimensionalities, a composite elementary polytope. The third the minimum energy (Euclid square) distance (with a single average energy per coordinate). The fourth column shows the speed R in bits per coordinate. Then the R 1 speed of the best quaternary CPM (or other PM specified in the footnote) with the same N v and D upper Shannon speed limits R Sh <ref type="bibr" target="#b0">[1]</ref> and Kabatyansky-Levenstein speed R KL <ref type="bibr" target="#b20">[21]</ref>. The last column shows the example number and the structure (HeS stands for a heterogeneous structure).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>Results of computing the signal distances of code constructs of multidimensional signals  5 from <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref>.</p><formula xml:id="formula_26">N v v D R R 1 R ш R КЛ Примітка 30 2<label>6</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Discussion</head><p>Our analysis of the results, summarized in Table <ref type="table">1</ref>, reveals the following. The win of HS is the more noticeable the larger the dimensionality. Note, for comparison, that a single (binary) PM corresponds to the speed R=0.5 and D=8, and the two-time (quaternary) -R=1.0, D=4 <ref type="bibr" target="#b12">[13]</ref>.</p><p>This is explained by the fact that the HS, due to the peculiarities of formation and the possibility of varying the changes in the components of the code construct, can provide all nonzero distances with the same value. First of all, this is an opportunity to form the correct simplex from two signals of a simple HS. Or a set of orthogonal signals with the same norms in more complex HS constructs. An additional advantage of the HS, which is confirmed by the data in Table <ref type="table">1</ref>, is that it has the ability to replace all nonzero signal distances with the smallest of them. That is, the possibility of binary quantization of the signal distance. This gives significant advantages in the speed of information transmission. As shown by the data in Table 1 <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b12">13]</ref>.</p><p>We shall define the features of the proposed method of forming code structures of multidimensional signals. Implementing modulation procedures, as can be seen from their description, does not encounter fundamental difficulties even in a general case, unless, of course, an acceptable encoding procedure is known for each code. Difficulties may rather arise due to the fact that HS usually require non-binary codes and even optionally codes over the prime number. Not much is known about specific codes of this type. Recently, significant progress has been made in the theory of non-binary codes. The new ternary and quaternary codes <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b21">22,</ref><ref type="bibr" target="#b22">23]</ref> are described. Attractive is the direction associated with the codes above the rings of deductions <ref type="bibr" target="#b23">[24,</ref><ref type="bibr" target="#b24">25]</ref>. Sometimes, the necessary codes can be built using HS. The possibilities of reversible structures are also limited primarily by a small number of known structures of reversible codes, especially non-binary ones. Obviously, the most promising HS is with a reversible code in the form of a composition of equilibrium ones.</p><p>Thus, the connection between the signal distance of a certain type of code constructions and the speed of a continuous multidimensional signal transmission channel is established and substantiated against the background of maintaining a certain level of noise immunity in educational and training telecommunication systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.">Conclusions</head><p>1. It is established that code constructions, which are based on the construction of a hierarchical structure, specify a system of signals with minimum signal distances, which can be determined by the values of the minimum Heming distances in the code structure of the code structure.</p><p>Varying the values of signal distances to the minimum, comparable to Heming distances, for hierarchical code constructions of multidimensional signals can significantly increase the volume and speed of transmitted information through a continuous communication channel of the training telecommunication system.</p><p>2. As a result of simulation it is established that changes in the signal distance can significantly increase the speed of information transfer in bits per coordinate.</p><p>For a hierarchical code structure, this can be up to 20 percent when the signal distance is halved.</p><p>3. The implementation of the modulation procedure has no fundamental difficulties, provided that for each code of the code structure known coding procedure using binary codes.</p><p>The simplest approximate demodulation procedure that implements the signal distance can be constructed as a sequence of descending procedures of the reception procedures as a whole for individual codes that determine the design of the code system as a whole.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Block diagram of a single-channel information transmission system in a continuous channel</figDesc><graphic coords="3,175.26,376.62,78.06,173.46" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>! 5 .</head><label>5</label><figDesc>ExperimentsLet us denote for a multidimensional signal the M-dimensionality code of length N with words and the minimum Hamming distance d through (N, M, d)м or, at M=MK, through [N, K, d]M=(N, MK, d)m. The operator f of modulation of elementary signals is mapped to the symbol qnϵ{0, …, M-1} of the word q=(q1, ..., qN)ϵ(N, М, d)m elementary signal xn=f(qn) from the set of elementary signals X of power |Х|=M, contained in the full set of possible, at the input of a continuous channel, elementary signals. And! the coding operator φ to the word u of the source dictionary! U of the word q of the code.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>p</head><label></label><figDesc>to which the n-th elementary signal x n belongs and thereby matches the word of the code of polytopes P to a constructive class X(p) .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="1,0.00,190.95,595.32,460.02" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>. Elements of this set can be encoded with four source characters that is, the word р=(1,1,1) of the polytope code is passed, and the angles at the vertices of polytopes (hexagons) are equal to</figDesc><table><row><cell cols="3">quaternary. If  4 u</cell><cell>2,</cell><cell>then</cell><cell cols="3">  1 p p p p    1 2 3</cell><cell></cell><cell>2,</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="5">       1 n n n st   / 3 2 / 3, n</cell><cell>where  11 , tu</cell></row><row><cell> 22 , tu</cell><cell> 34 , tu</cell><cell cols="4">   2 3 s s s u If  1 3 . 4 u</cell><cell>3,</cell><cell cols="3">then  0 n p</cell><cell cols="2">at  1, 2 nu</cell><cell> 1 p</cell><cell>u</cell><cell></cell><cell>6,</cell><cell>1  </cell><cell> </cell><cell>/ 6</cell><cell>3  </cell><cell>/ 3</cell><cell></cell><cell>1</cell><cell> 2 / 3.</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>2</cell><cell></cell><cell></cell><cell>2</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="4"> u u u u u  1 2 3 4 , , , ,  160</cell><cell cols="8">from which u 1 , u 2 are three, u 3 is binary, u 4 is</cell></row></table><note>u uu</note></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="9.">Acknowledgements</head><p>We express our respect and deep gratitude to Oleksandr Vasyliovych Drobik, Candidate of Technical Sciences, Professor, Director of the Scientific Center at the State Telecommunications University, for fruitful cooperation and significant contribution to the preparation of the material for this study.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Coding theory and information theory</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">V</forename><surname>Hamming</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Radio and Communication</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page">176</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Coding theory</title>
		<author>
			<persName><forename type="first">T</forename><surname>Kasami</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1978">1978</date>
			<publisher>Mir</publisher>
			<biblScope unit="page">576</biblScope>
			<pubPlace>Moscow</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The art of noise-immune coding</title>
		<author>
			<persName><forename type="first">R</forename><surname>Morelos-Zaragoza</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Methods, algorithms, application</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page">320</biblScope>
		</imprint>
	</monogr>
	<note>, Technosphere</note>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Redundancy of signals in radio communications</title>
		<author>
			<persName><forename type="first">P</forename><surname>Polushin</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page">256</biblScope>
			<pubPlace>Moscow, Radiotekhnika</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Coding theory</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">P</forename><surname>Varbanets</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page">43</biblScope>
			<pubPlace>Odessa, ONU</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">The general structure of a linear noise-tolerant coding system, News of higher educational institutions</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Seletkov</surname></persName>
		</author>
		<idno type="DOI">10.20535/S0021347010120034</idno>
		<ptr target="https://doi.org/10.20535/S0021347010120034" />
	</analytic>
	<monogr>
		<title level="j">Radio Electronics</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="24" to="31" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">High-performance reliable block encryption algorithms secured against linear and differential cryptanalytic attacks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kinzeryavyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Iavich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Prysiazhnyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Yubuzova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">2104</biblScope>
			<biblScope unit="page" from="657" to="668" />
		</imprint>
	</monogr>
	<note>Cited 20 times</note>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">The Revised Relational Coding System</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fogel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Koeyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Secrist</surname></persName>
		</author>
		<idno type="DOI">10.13140/RG.2.2.27439.46245</idno>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Modeling continuous communication channels in the form of transformation operators of some spaces</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">A</forename><surname>Batenkov</surname></persName>
		</author>
		<idno type="DOI">10.15622/sp.42.6</idno>
		<ptr target="https://doi.org/10.15622/sp.42.6" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of SPIIRAN</title>
				<meeting>SPIIRAN</meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="171" to="198" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Improvements Encoding Energy Benefit in Protected Telecommunication Data Transmission Channels</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Boiko</surname></persName>
		</author>
		<idno type="DOI">10.11648/j.com.20140201.12</idno>
	</analytic>
	<monogr>
		<title level="j">Communications</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="7" to="14" />
			<date type="published" when="2014">2014</date>
			<publisher>Scientific Journal -Science Publishing Group</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Аnalysis and monitoring of telecommunication networks based on intelligent technologies</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Khlaponin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Zhirov</surname></persName>
		</author>
		<idno>nbn:de:0074-1813-0 P. 203 -212</idno>
	</analytic>
	<monogr>
		<title level="s">CEUR Workshop Proceedings (CEUR-WS</title>
		<imprint>
			<biblScope unit="volume">1813</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Methods for assessing the impact of bandwidth of control channels on the quality of telecommunications networks in the transmission of data packets of different types</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Khlaponin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mohammed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Berkman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Zaika</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Polonskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Turovsky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Communication Networks and Information Security (IJCNIS)</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="220" to="229" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Analyzing the code structures of multidimensional signals for a continuous information transmission channel</title>
		<author>
			<persName><forename type="first">L</forename><surname>Berkman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Turovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Kyrpach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Varfolomeeva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Dmytrenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pokotylo</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2021.242357</idno>
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="issue">5/9</biblScope>
			<biblScope unit="page" from="70" to="81" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Generalized concatenated codes</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">L</forename><surname>Blokh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Zyablov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Communication</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1976">1976</date>
			<biblScope unit="page">240</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Theory and practice of error control codes</title>
		<author>
			<persName><forename type="first">R</forename><surname>Bleihut</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1986">1986</date>
			<publisher>Mir</publisher>
			<biblScope unit="page">576</biblScope>
			<pubPlace>Moscow</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Statistical communication theory and its practical applications</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">R</forename><surname>Levina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Communication</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1979">1979</date>
			<biblScope unit="page">376</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Error Correction Coding in Digital Communication Systems</title>
		<author>
			<persName><forename type="first">D</forename><surname>Clark</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kane</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Radio and communication</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1987">1987</date>
			<biblScope unit="page">392</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channelб</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">W</forename><surname>Wong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">F</forename><surname>Wong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Shea</surname></persName>
		</author>
		<idno type="DOI">10.1109/TIFS.2011.2139208</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Forensics and Security</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="551" to="564" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A four-dimensional toric code with non-Clifford transversal gates</title>
		<author>
			<persName><forename type="first">Tomas</forename><surname>Jochym</surname></persName>
		</author>
		<author>
			<persName><forename type="first">-O'</forename><surname>Connor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Theodore</forename><forename type="middle">J</forename><surname>Yoder</surname></persName>
		</author>
		<idno type="DOI">10.1103/PhysRevResearch.3.013118</idno>
	</analytic>
	<monogr>
		<title level="j">Phys. Rev. Research</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page">13118</biblScope>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">An elementary introduction to Lobachevsky geometry</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Norden</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page">220</biblScope>
			<pubPlace>Moscow, Lenan</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Method for determining the free distance of invariant signal-code structures</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Banquet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">D</forename><surname>Prokopov</surname></persName>
		</author>
		<ptr target="http://hdl.handle.net/123456789/1711" />
	</analytic>
	<monogr>
		<title level="j">Pratsi UNDIRT</title>
		<imprint>
			<biblScope unit="issue">21</biblScope>
			<biblScope unit="page" from="39" to="45" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Pre-registration of new production codes for channels from deletions</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">Y</forename><surname>Zhurakovsky</surname></persName>
		</author>
		<ptr target="http://nbuv.gov.ua/UJRN/vduikt_2012_10_2_18" />
	</analytic>
	<monogr>
		<title level="j">Visnik DUIKT</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="93" to="96" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Secure Hash Function Constructing for Future Communication Systems and Networks Advances</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kinzeryavyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kyrychenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Yubuzova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Aleksander</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Odarchenko</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-12082-5_51</idno>
	</analytic>
	<monogr>
		<title level="m">Intelligent Systems and Computing</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="561" to="569" />
		</imprint>
	</monogr>
	<note>Cited 21 times</note>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Kavun Techniques for performance improvement of integer multiplication in cryptographic applications</title>
		<author>
			<persName><forename type="first">R</forename><surname>Brumnik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kovtun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Okhrimenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename></persName>
		</author>
		<idno type="DOI">10.1155/2014/863617</idno>
	</analytic>
	<monogr>
		<title level="j">Mathematical Problems in Engineering</title>
		<imprint>
			<biblScope unit="page">863617</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>Cited 21 times</note>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Security key indicators assessment for modern cellular networks</title>
		<author>
			<persName><forename type="first">R</forename><surname>Odarchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Abakumova</surname></persName>
		</author>
		<idno type="DOI">10.1109/SAIC.2018.8516889</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 1st International Conference on System Analysis and Intelligent Computing</title>
		<title level="s">-Proceedings</title>
		<meeting><address><addrLine>SAIC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page">8516889</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
