<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Algorithm and Data Encoding/decoding Devices Based on Two- dimensional Modular Correction Codes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Yatskiv</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Taras Tsavolyk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliya Yatskiv</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Koval</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stepan Ivasiev</string-name>
          <email>stepan.ivasiev@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>West Ukrainian National University</institution>
          ,
          <addr-line>11 Lvivska str., Ternopil, 46009</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In the paper, an error detection and correction algorithm was developed on the basis of modular correcting codes and a two-dimensional scheme. The developed algorithm provides effective correction of error packets, is characterized by high corrective ability and low complexity of decoding device implementation, and accordingly can be applied to increase the reliability of data transmission in wireless sensor networks. Check symbols are calculated separately for rows and columns of the data matrix. Due to the fact that the same mutually prime coefficients are used to calculate checksums along the rows and columns of the matrix, it allows for detecting and correcting error packets that are in the same row or column. The developed algorithm provides correction of error packets of maximum length  = 3 − 2 ( − number of information symbols) when they are placed in two columns and one row or two rows and one column. Possible examples of placing the maximum number of distorted symbols in a data block and methods of their correction are given. The work of the coder for calculating check symbols and forming a data packet is described in the Verilog language and implemented on an FPGA by Altera. The structure of the decoder, which performs error detection based on the error correction syndrome check based on the solution of the system of modular equations, has been developed.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Wireless sensor networks</kwd>
        <kwd>modular corrective codes</kwd>
        <kwd>residual number system</kwd>
        <kwd>modular arithmetic</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>With the constant development and wide implementation of wireless technologies, improving the
reliability of data transmission in wireless sensor networks (WSN) remains an important and urgent
task [1]. In order to ensure the necessary level of reliability of data transmission in WSN, unlike
wireless computer networks, it is necessary to take into account the limitations imposed by the low
computing resources of nodes and the use of autonomous power [2, 3, 4]. In addition, additional
complications are caused by the packet relay mode used in most WSN applications. Since WSN often
uses methods of reducing traffic redundancy by compressing data and filtering correlated data, the
requirements for the reliability of each packet transmission are increasing accordingly. Therefore, for
the effective operation of WSN, it is necessary to ensure high reliability and energy efficiency of data
transmission in different modes of network operation [16].</p>
      <p>The main mechanism for improving the reliability of data transmission in WSN is the use of error
control schemes. Their task is to ensure reliable communication in a wireless channel in which errors
•
•
•
occur due to interference, fading, and loss of bit synchronization. This leads to channel errors that
affect the integrity of the packets forming the sensor nodes. The low power of WSN transmitters,
which is connected with the use of autonomous power, also leads to an increase in errors [4, 5, 6].</p>
      <p>Thus, in addition to methods of improving reliability at the physical level, which guarantees the
reliability of transmission at the bit level, WSN also requires the application of error control schemes
at the channel level to ensure reliability at the level of packet transmission.</p>
      <sec id="sec-1-1">
        <title>The following requirements are put forward for correcting codes in WSN [7, 8, 9, 10]:</title>
        <p>the low complexity of encoding/decoding algorithms;
low hardware requirements for the implementation of algorithms (microcontroller bit rate and
clock frequency, memory volume);</p>
        <p>adaptive change in the number of check symbols when changing the channel parameters.</p>
        <p>The conducted analysis showed that many studies prove the advantages of using Reed–Solomon
codes in WSN [11, 12, 13]. However, the use of Reed-Solomon codes makes it impossible to use
adaptive error control schemes. Because when increasing/decreasing the number of check characters,
it is necessary to list all check characters. To choose an effective error control scheme and the type of
correction code, it is also necessary to take into account the permissible error probability for a given</p>
      </sec>
      <sec id="sec-1-2">
        <title>WSN and the characteristics of the communication channel.</title>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
    </sec>
    <sec id="sec-3">
      <title>2.1. Modular corrective codes</title>
      <p>Nowadays, there is considerable interest in the application of the residual number system (RNS)
in new areas, such as increasing the reliability and security of cloud storage, homomorphic
encryption, post-quantum cryptography, and others [14, 15, 20].</p>
      <p>The residual number system belongs to the non-positional counting systems and is based on the
concept of a remainder and the Chinese theorem on remainders. Any positive integer in RNS is
presented as a set of the smallest positive remainders from dividing this number by the selected
system of mutually prime numbers (modules)  1,  2, … ,   [14, 16, 21].</p>
      <p>Data processing and transmission in RNS has a number of advantages due to independence, low
bit rate and equality of balances, and the possibility of parallel execution of arithmetic operations. In
addition to the above-mentioned advantages of RNS for data processing, effective RNS correction
codes have also been developed that are capable of detecting and correcting error packets [17, 18,</p>
      <p>Modular correcting codes developed in [22, 23] belong to symbol codes characterized by low
redundancy and allow efficient detection and correction of single symbol errors.</p>
      <p>In modular correction codes, the data packet in the binary code to be transmitted is divided into
 blocks of the same length (tetrads or bytes) [24]:
  1 …  31 21
 11
 01,   2 …  32 22
 12
 02,    …  3</p>
      <p>2
 1
 0, … ,  


 …  3</p>
      <p>2</p>
      <p>1</p>
      <p>0 ,
where   – bit of data in binary code,  = 4,8.</p>
      <p>At the same time, the value of the control bit is equal to
system, moreover
where   – coefficients, mutually prime with  ;   – byte of data in a binary or decimal calculation
  =  7 …  3



2

1
 
 0 =  7 ∙ 27 + ⋯ +  3 ∙ 23 +  2 ∙ 22 +  1 ∙ 21 +  0 ∙ 20.</p>
      <p>
        Suppose that an error occurred in one of the data blocks during the transmission (from 1 to 8
  +1 = | 1 ∙  1 +  2 ∙  2 + ⋯ +   ∙   + ⋯ +   ∙   | ,
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
binary digits were distorted) and instead of a number  was received  ′.
      </p>
      <p>′ = ( 1,  2, … ,  ′, … ,   ,   +1).</p>
      <sec id="sec-3-1">
        <title>The value of the control bit according to the received data is</title>
      </sec>
      <sec id="sec-3-2">
        <title>The minimum code distance of the modular correction code is</title>
        <p>′ +1 = | 1 ∙  1 +  2 ∙  2 + ⋯ +   ∙  ′ + ⋯ +   ∙   | .</p>
        <p />
        <p>=  −  + 1
where  – total code length,  – the number of information blocks. Accordingly, this correcting
code detects  or a smaller number of errors under the condition that</p>
      </sec>
      <sec id="sec-3-3">
        <title>In [25] the possibility of constructing two-dimensional correction</title>
        <p>≥  + 1.</p>
        <p>codes based on modular
arithmetic is shown, which allows for detecting and correcting errors in two or more information
symbols. However, the proposed method of correcting errors in two symbols based on the extended
Euclid algorithm has a high time complexity, which depends on the value of the module 
increases with the gain in the number and bit rate of information symbols, as it requires finding all
and
solutions of the Diophantine equation. Algorithms for correcting error packets also require additional
research. Therefore, the development of a two-dimensional coding method based on a modular
correcting code and error packet correction algorithms is an urgent scientific task.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. Proposed solutions 3.1. Two-dimensional code based on modular corrective codes</title>
      <p>Moreover, the codes may be the same  1 =  2, and different  1 ≠  2.</p>
      <sec id="sec-4-1">
        <title>In the modular corrective codes, the check symbols are calculated:</title>
        <p>either  2.</p>
        <sec id="sec-4-1-1">
          <title>A two-dimensional code</title>
          <p>=  1 ×  2 two codes  1
and  2 name of code, code words which are all
two-dimensional tables with rows and which are code words  1 and columns which are code words
For building a two-dimensional code was chosen, modular corrective codes  1 and  2 [24, 25].</p>
          <p>k
fjk(x) = ∑i=1 xijvi modP
encoded with the  1 and then each  column is encoded with the  2.
where    – information symbols,   ,   – coefficients (prime numbers),  – module (prime number).</p>
          <p>The formation of the two-dimensional modular code is shown in Table 1. At the first, each  row is</p>
          <p>
            The coding process is as follows (Figure 1): data for  symbols are sent to the internal encoder  1,
where the verification symbols are calculated line by line according to formula (
            <xref ref-type="bibr" rid="ref2">2</xref>
            ) (Table 1). From the
output of the internal coder  1 the code words enter the buffer. From the buffer, the code words are
read column by column and enter the external encoder  2, where the check symbols are calculated
          </p>
          <p>Error detection is based on syndrome analysis, which is calculated as the difference between check
symbols calculated in the encoder and decoder [26-30].</p>
          <p>Syndrome calculation by rows:</p>
          <p>1′ ( ) −  1 ( )  
⎛  2′ ( ) −  2 ( )    ⎞</p>
          <p>⋯ ⋯ ⋯ ⎟.
  = ⎜⎜
⎜   ′ ( ) −    ( )    ⎟⎟</p>
          <p>⋯ ⋯ ⋯
⎝   ′ ( ) −    ( )   ⎠</p>
          <p>′1( ) −   1( )   
Syndrome calculation by columns:</p>
          <p>If   = 0,   = 0 – errors do not exist. Else if   ≠ 0,   ≠ 0 – an error exists.</p>
          <p>The position of the distorted symbol is determined by the value of the syndromes, which are not
equal to zero at the intersection of the row and the column.</p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>To correct an error in one symbol, it is necessary to solve the equation:</title>
        <p>
          ( ′ −   ) =   (   ). (
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
        </p>
        <p>If syndromes   ≠ 0,   ≠ 0 are not equal to zero in two or more rows or columns, this means that
errors occurred in two or more characters. Moreover, if the syndrome   ≠ 0 in two columns – it
means that two characters in the string are garbled. The positions of non-zero characters correspond to
non-zero syndrome values in the column.</p>
        <p>Error correction in two information symbols. Analysis of the syndrome by rows and columns
allows you to identify the positions of the distorted characters. It is necessary to solve the equation to
correct them:</p>
        <p>+     = (   ′ +    ′ −    )(   ),
where  , t – position of garbled symbols.</p>
        <sec id="sec-4-2-1">
          <title>Let’s change the right side on с:</title>
          <p>
            +     = с(   ). (
            <xref ref-type="bibr" rid="ref6">6</xref>
            )
          </p>
          <p>
            It is known if gcd(  ,   ) = 1, that is   and   mutually prime numbers, then equation (
            <xref ref-type="bibr" rid="ref6">6</xref>
            ) has a
solution in integers.
          </p>
        </sec>
        <sec id="sec-4-2-2">
          <title>Let's solve equation (6) with respect to one of the unknowns. Let's express   via   :</title>
          <p>
            =  −    (   ). (
            <xref ref-type="bibr" rid="ref7">7</xref>
            )
          </p>
          <p>
            As 0 ≤   &lt; 2  0 ≤   &lt; 2 then by substituting in equation (
            <xref ref-type="bibr" rid="ref7">7</xref>
            )   value from 0 to 2 we
find a set of solutions   , which only one of the solutions found will be an integer.
          </p>
          <p>
            With the minimum code distance of codes  1 and  1 equal  1 and  2 in accordance then the
minimum code distance of a two-dimensional code  equal  1 ×  2. It follows that if codes  1 and  1
  ( ′ −   ) +   ( ′ −   ) =    (
   ′ −     +    ′ −     =    (
−    −     = (   −    ′ −    ′)(
  );
  );
  );
(
            <xref ref-type="bibr" rid="ref5">5</xref>
            )
          </p>
          <p>However, this code will not be able to correct a package of errors of six characters, which are
located at the intersection of three rows and three columns (Figure 3).
*
*
*</p>
          <p>A two-dimensional code based on modular correcting codes has been developed, which provides
effective correction of error packets of maximum length  = 3 − 2 symbols, provided that the
distorted characters are placed in two rows and one column, or in two columns and one row.
3.2. An algorithm for the detection and correction of error packages based
on modular correction codes</p>
          <p>Based on the method of correcting error packets, an algorithm for detecting and correcting error
packages using modular correcting codes and a two-dimensional scheme has been developed.</p>
          <p>
            The algorithm works as follows (Figure 4): in block 1, we enter mutually simple coefficients   ,
the value of the module P, and information symbols   . Then, in block 2 and block 3, syndromes are
calculated by rows and columns by formulas (
            <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
            ).
          </p>
          <p>If the value of the syndrome (block 4)   = 0,   = 0, then no error is detected, and if
  ≠ 0,   ≠ 0 or if in at least one of the syndromes   = 0,   ≠ 0, then the error is detected and we
proceed to its correction.</p>
        </sec>
      </sec>
      <sec id="sec-4-3">
        <title>To correct the error (block 5) in one symbol for each line, we solve the equation</title>
        <p>( ′ −   ) =   (   ),
where   – mutually prime coefficients,  ′ – received message and   – the message that was already
sent.</p>
        <p>
          After finding the solutions of this equation for all rows, we check the value of the syndrome (block
6) when:   ≠ 0,   = 0 – there are errors in the columns, which we correct according to the formula
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) (block 8), and in block 9, we substitute the values of the solutions into the matrix; when
  = 0,   ≠ 0 – there are errors in the lines, which are corrected according to the formula (
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
(block 7).
        </p>
        <p>Start
m, P, vi
i=1
k

 =1
  = 0,
  = 0</p>
        <p>A
 1
10
13
11
5
3
7
  ( ′ −   ) =   (</p>
        <p>)</p>
        <p>In block 10, we check, if the value of the syndrome   = 0,   = 0 , then the errors are corrected,
and if the value of the syndrome   ≠ 0,   ≠ 0 – more errors than the algorithm can correct</p>
        <p>Let’s see the example. Let's start to build a two-dimensional code based on a modular correction
 1 = 17,  2 = 19,  3 = 23,  4 = 29,  15 = 31,  6 = 37,  7 = 43,  8 = 47 (Table2).
code with  = 8,  = 8, bit rate of information symbols 
= 4, module  = 1019, and coefficients:
A two-dimensional modular code at the output of the transmitter
1
2
3
B</p>
        <p>5
 3
13
11
6
9
4
12</p>
        <p>Consider the error correction algorithm for the maximum number of distorted symbols (Table 3).
12*
10*
6
9
4
12
13
15
539
12*
11*
13*
3*
5*
928
11*
7*
10
9
7
5
0
1
253
845
36
983
71
55
4
901
72
 8
4*
9*
15
13
0
5
9
3
655</p>
        <p>Check
symbols
calculated
by rows
275
846
181
51
690
845
845
718
Check symbols
calculated by</p>
        <p>columns
* – distorted symbols.</p>
        <p>2. By substituting the calculated values in Table 3, we will get a new table of syndromes
(Table 6).</p>
        <p>
          After analyzing Table 6 it shows that there are errors in all columns but only in two rows. That is,
all symbols in the first and second lines are distorted. Correction of errors in two symbols is carried
out using equation (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ).
        </p>
        <p>
          To correct errors in the symbols placed in the first column, if we substitute numerical values in
equation (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ), we will get:
17(2 −  1) + 19(11 −  2) = 845(  1019);
        </p>
        <p>
          17 1 + 19 2 = 417(  1019); (
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
        </p>
        <p>
          After solving equation (
          <xref ref-type="bibr" rid="ref8">8</xref>
          ) for each column of the matrix, we find the correct values of the
information symbols (Table 7).
        </p>
        <p>
          As can we can see from Table 7, the found solutions of equation (
          <xref ref-type="bibr" rid="ref8">8</xref>
          ) unambiguously ensure the
correction of errors in 22 symbols of the incoming message. Therefore, the developed algorithm
allows correcting error packages with a maximum length of  = 3 − 2 symbols, when the distorted
characters are placed in two rows and one column, or in two columns and one row. At the same time,
it provides the speed of the code  1 =  1 = 0.62, at  = 8,  1 = 4, Р = 1021,  1 =  ∗  ∗  1 =
 1
256,  1 = 2 ∗  ∗ ]  2 [ = 160,  1 =  1 +  1 = 416 and  2 =  22 = 0.67 at  2 = 8 ,  2 = 512,
 2 = 768. The approximate redundancy of the code is equal to:  = (1 −  1) ∗ 100% = 38 %.
        </p>
        <p>An algorithm for detecting and correcting random single errors and error packets with a maximum
length of  = 3 − 2, at a code speed of  = 0.67, has been developed.</p>
        <p>Considering the low complexity of the decoding algorithm implementation, this code is planned to
be used to increase the reliability of data transmission in wireless sensor networks.
3.3. An interference-resistant data encoding/decoding device based on
two-dimensional modular correction codes</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>3.3.1. Encoder implementation</title>
      <p>The coding process is as follows (Figure 5). A message with k symbols is received at the encoder
input. The coder calculates the check symbol and writes the message with the check symbol to the
buffer. The process is repeated until  messages are received. A data array is formed from the
received messages, from which verification symbols are calculated by the columns of the array.</p>
      <sec id="sec-5-1">
        <title>Array</title>
      </sec>
      <sec id="sec-5-2">
        <title>Formation</title>
      </sec>
      <sec id="sec-5-3">
        <title>Output message generating block</title>
      </sec>
      <sec id="sec-5-4">
        <title>Block of calculation of corrective symbols for rows</title>
      </sec>
      <sec id="sec-5-5">
        <title>Block of calculation of corrective symbols for columns</title>
        <p>+
  +</p>
        <p>After the encoder completes the calculation of check symbols by columns, a new array of the
received message with calculated check symbols by rows and columns is formed at the output. The
structure of the message at the output of the encoder is presented in Figure 6.</p>
        <p>An example of interference-resistant coding based on modular codes and a two-dimensional
scheme. Incoming messages formed in the form of a two-dimensional array are shown in Table 8.</p>
        <p>To implement the coder, we will choose mutually simple coefficients   :  1 = 211,  2 =
257,  3 = 263,  4 = 269,  5 = 271,  6 = 277,  7 = 283,  8 = 288 and module  = 131297.
x5
2
205
204
15
133
161
254
33
10678</p>
        <p>
          We calculate the verification symbols by rows according to formula (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) and by columns according
to formula (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) (Table 9).
        </p>
        <p>The operation of the coder is described in the Verilog language and synthesized on a FPGA by</p>
      </sec>
      <sec id="sec-5-6">
        <title>Altera. The functional diagram of the encoder is presented in Figure 7.</title>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>3.3.2. Decoder implementation</title>
      <p>The decoder calculates check symbols on the received data and compares them with those that
were calculated by the encoder and sent. To correct errors in the data packet, a table of syndromes is
formed in the decoder by rows and columns.</p>
      <p>The correction of single errors is based on the comparison of the calculated syndrome with the
table of syndromes, if the values match, the error has been detected and can be corrected. After that,
the table of syndromes is calculated by rows and columns, if the value of the syndrome is zero, then
the errors have been corrected.</p>
      <p>
        If the values in the table of syndromes are not equal to zero, it means that errors have been
detected and they are placed in two lines. To correct such errors, equation (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) must be solved for each
row/column (multiple error correction block) (Figure 8).
      </p>
      <p>The developed device of interference-resistant data decoding based on two-dimensional modular
correction codes makes it possible to detect and correct a large number of errors in a data packet.</p>
    </sec>
    <sec id="sec-7">
      <title>4. Conclusion</title>
      <p>A two-dimensional approach to error correction based on modular correction codes is proposed,
which provides effective correction of error packets, is characterized by high correction ability and
low complexity of decoding algorithm implementation, and accordingly can be applied to increase the
reliability of data transmission in wireless sensor networks.</p>
      <p>An algorithm for detecting and correcting error packets based on modular correcting codes and a
two-dimensional scheme has been developed. This algorithm provides detection and correction of
packets with the  length of errors that are in one row or column of the data matrix of size  ×  , or
2 ∙  errors that are in two rows or two columns of the data matrix. Moreover, the algorithm provides
correction of the maximum length of error packets that can be  = 3 − 2 at speed of code  = 0.67,
if the distorted characters are in two rows and one column or in two columns and one row.</p>
      <p>A structure was developed and an encoder for calculating check symbols and forming a data
packet based on two-dimensional modular correction codes was developed and implemented on an
FPGA. To be more precise, the limitations of the conducted research should be attributed to the low
bit rate message size of only 8 bits, as well as the fact that only an 8x8 matrix size was considered.</p>
      <p>Further research is required on algorithms for finding mutually prime coefficients   with a
minimum value of the check module  for encoding messages with a bit depth of 8-16.</p>
    </sec>
    <sec id="sec-8">
      <title>5. References</title>
      <p>
        [15] D. Schoinianakis. Residue arithmetic systems in cryptography: a survey on modern security
applications. Journal of Cryptographic Engineering, 10(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), 2020, pp. 249-267.
doi:10.1007/s13389020-00231-w.
[16] Yi Huang, Chunhua Zhao, Baoping Tang, Yaowen Yang, Hao Fu, "Sparse Random Reconstruction
of Data Loss With Low Redundancy in Wireless Sensor Networks for Mechanical Vibration
Monitoring", IEEE Sensors Journal, vol.22, no.21, (2022): 20328-20335.
doi:10.1109/JSEN.2022.3209330.
[17] R. Ye, A. Boukerche, H. Wang, X. Zhou, and B. Yan. RESIDENT: a reliable residue number
systembased data transmission mechanism for wireless sensor networks. Wireless Networks, 24, 2018, pp.
597-610. doi:10.1007/s11276-016-1357-1.
[18] PAN Agbedemnab, EY Baagyere, MI Daabo. Single and multiple error detection and correction
using redundant residue number system for cryptographic and stenographic schemes. Asian Journal
of Research in Computer Science. 4(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ), 2020, pp. 1-14. doi:10.9734/ajrcos/2019/v4i430123.
[19] V. Krasnobaev, V.Popenko, T. Kuznetsova, K. Kuznetsova, "Examples of Usage of Method of Data
Errors Correction which are Presented by the Residual Classes", 2019 IEEE International Conference
on Advanced Trends in Information Theory (ATIT), 2019, pp.45-50.
doi:110.1109/ATIT49449.2019.9030512.
[20] Yaw Afriyie, "A Novel Exploitation of Errors in RRNS Architecture", 2019 International Conference
on Mechatronics, Remote Sensing, Information Systems and Industrial Information Technologies
(ICMRSISIIT), vol.1, (2019): 1-8. doi:10.1109/ICMRSISIIT46373.2020.9405850.
[21] Eswar Deep Pitchika, Shivang Bharadwaj, "Fast Base Extension using Single Redundant Modulus in
a Residue Number System", 2019 International Conference on Power Electronics, Control and
Automation (ICPECA), (2019): 1-5. doi:10.1109/ICPECA47973.2019.8975450.
[22] J. Chen, V. Yatskiv, A. Sachenko, and J. Su. Wireless sensor networks based on modular arithmetic.
      </p>
      <p>
        Radioelectronics And Communications Systems, 60 (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ), 2017, рр. 215-224.
doi:10.3103/S073527271705003X.
[23] V. Yatskiv, T. Tsavolyk. Improvement of Data Transmission Reliability in Wireless Sensor Networks
on The Basis of Residue Number System Correcting Codes Using the Special Module System.
Conference Proceedings, IEEE First Ukraine Conference on Electrical and Computer Engineering
(UKRCON) Igor Sikorsky Kyiv Polytechnic Institute, Kyiv, Ukraine, (2017): 890-893.
doi:10.1109/UKRCON.2017.8100376.
[24] V. Yatskiv, A. Sachenko, N. Yatskiv, P. Bykovyy, and A. Segin. Compression and Transfer of
Images in Wireless Sensor Networks Using the Transformation of Residue Number System. In 2019
10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing
Systems: Technology and Applications (IDAACS) (Vol. 2). (2019): 1111-1114.
doi:10.1109/IDAACS.2019.8924372.
[25] V. Yatskiv, T. Tsavolyk, N. Yatskiv. Burst error-correcting codes based on modular correcting codes.
      </p>
      <p>Conference Proceedings of 14 th International Conference Advanced Trends in Radioelectronics,
Telecommunications and Computer Engineering (TCSET-2018) (Lviv-Slavske, Ukraine February
20-24 2018). Lviv. 2018, pp. 389-392. doi:10.1109/TCSET.2018.8336388.
[26] Chen, Z.; Zhao, Y.; Lu, J.; Liang, B.; Chen, X.; Li, C. TECED: A Two-Dimensional Error-Correction
Codes Based Energy-Efficiency SRAM Design. Electronics 2022, 11, 1638.
https://doi.org/10.3390/electronics11101638
[27] Sergii Lysenko, Kira Bobrovnikova, Roman Shchuka, Oleg Savenko. A Cyberattacks Detection
Technique Based on Evolutionary Algorithms. 11th International Conference on Dependable</p>
      <sec id="sec-8-1">
        <title>Systems, Services and Technologies (DESSERT), 2020. Vol.1. pp. 127-132.</title>
        <p>[28] Antony, B.; Divya, S. Modified Hamming Codes with Double Adjacent Error Correction along with</p>
        <p>Enhanced Adjacent Error Detection. Int. J. Innov. Res. Comput. Commun. Eng. 2015, 3, 7706–7713.
[29] Chen, X.; Lu, Z.; Lei, Y.; Wang, Y.; Chen, S. Multi-bit transient fault control for NoC links using 2D
fault coding method. In Proceedings of the 2016 Tenth IEEE/ACM International Symposium on</p>
      </sec>
      <sec id="sec-8-2">
        <title>Networks-on-Chip (NOCS), Nara, Japan, 31 August–2 September 2016; pp. 1–8.</title>
        <p>[30] Rostand, N.; Hubert, G.; Martinie, S. SEU Prediction for Very Integrated Circuits based on Advanced
Physical Considerations. In Proceedings of the 2019 19th European Conference on Radiation and Its
Effects on Components and Systems (RADECS), Montpellier, France, 16–20 September 2019; pp. 1–</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bettayeb</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ghunaim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Mohamed</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Nasir</surname>
          </string-name>
          . “
          <article-title>Error correction codes in wireless sensor networks: a systematic literature review”</article-title>
          .
          <source>In 2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA)</source>
          . IEEE. (
          <year>2019</year>
          ):
          <fpage>1</fpage>
          -6 doi: 10.1109/ICCSPA.
          <year>2019</year>
          .
          <volume>8713725</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Yakubu</given-names>
            <surname>Abdul-Wahab</surname>
          </string-name>
          <string-name>
            <surname>Nawusu</surname>
          </string-name>
          , Alhassan Abdul-Barik,
          <article-title>Salifu Abdul-Mumin. Residue Number System-Based Approach to Minimise Energy Consumption in Wireless Sensor Networks</article-title>
          .
          <source>Asian Journal of Research in Computer Science</source>
          .
          <volume>14</volume>
          (
          <issue>4</issue>
          ),
          <year>2022</year>
          ,
          <fpage>46</fpage>
          -
          <lpage>65</lpage>
          . doi:
          <volume>10</volume>
          .9734/ajrcos/2022/v14i4291
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Chowdhury</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hossain</surname>
          </string-name>
          .
          <article-title>Different energy saving schemes in wireless sensor networks: A survey</article-title>
          .
          <source>Wireless Personal Communications</source>
          ,
          <volume>114</volume>
          (
          <issue>3</issue>
          ),
          <year>2020</year>
          , pp.
          <fpage>2043</fpage>
          -
          <lpage>2062</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11277-020- 07461-5.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>I.</given-names>
            <surname>Daanoune</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Baghdad</surname>
          </string-name>
          .
          <article-title>Reliable and energy-efficient transmission scheme based on error correction codes and clustered routing protocol for WSN</article-title>
          .
          <source>In 2022 8th International Conference on Optimization and Applications (ICOA)</source>
          .
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . IEEE. doi:
          <volume>10</volume>
          .1109/ICOA55659.
          <year>2022</year>
          .
          <volume>9934530</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Jana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tripathi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Samanta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bhaumik</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Barman</surname>
          </string-name>
          .
          <article-title>An Approach to Reduce Power Consumption and Delay of Single Error Correction Codes in WSNs for IoT Applications</article-title>
          .
          <source>In Computers and Devices for Communication: Proceedings of CODEC</source>
          <year>2019</year>
          , pp.
          <fpage>196</fpage>
          -
          <lpage>203</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-15-8366-7_
          <fpage>27</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kaur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. B.</given-names>
            <surname>Kuttan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Mittal</surname>
          </string-name>
          .
          <article-title>An Energy-saving Approach for Error control Codes in Wireless Sensor Networks</article-title>
          .
          <source>In 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC)</source>
          (
          <year>2021</year>
          ):
          <fpage>313</fpage>
          -
          <lpage>316</lpage>
          . IEEE. doi:
          <volume>10</volume>
          .1109/ICOSEC51865.
          <year>2021</year>
          .
          <volume>9591677</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kadel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Paudel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. B.</given-names>
            <surname>Guruge</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Halder</surname>
          </string-name>
          .
          <article-title>Opportunities and challenges for error control schemes for wireless sensor networks: a review</article-title>
          .
          <source>Electronics</source>
          ,
          <volume>9</volume>
          (
          <issue>3</issue>
          ), (
          <year>2020</year>
          ):
          <fpage>504</fpage>
          . doi:
          <volume>10</volume>
          .3390/electronics9030504.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Magzoub</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Abd</given-names>
            <surname>Aziz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Salem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. Ab</given-names>
            <surname>Ghani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Aziz</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Mahmud</surname>
          </string-name>
          .
          <article-title>Physical layer security and energy efficiency over different error correcting codes in wireless sensor networks</article-title>
          .
          <source>International Journal of Electrical and Computer Engineering (IJECE)</source>
          ,
          <volume>10</volume>
          (
          <issue>6</issue>
          ),
          <year>2020</year>
          , pp.
          <fpage>6673</fpage>
          -
          <lpage>6681</lpage>
          . doi:
          <volume>10</volume>
          .11591/ijece.v10i6.
          <fpage>pp6673</fpage>
          -
          <lpage>6681</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Razali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Mamat</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N. S. K.</given-names>
            <surname>Bashah</surname>
          </string-name>
          .
          <article-title>Multiple error correction towards optimisation of energy in sensor network</article-title>
          .
          <source>Indonesian Journal of Electrical Engineering and Computer Science</source>
          ,
          <volume>13</volume>
          (
          <issue>3</issue>
          ),
          <year>2019</year>
          , pp.
          <fpage>1208</fpage>
          -
          <lpage>1220</lpage>
          . doi:
          <volume>10</volume>
          .11591/ijeecs.v13.
          <year>i3</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Tripathi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Samanta</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Bhaumik</surname>
          </string-name>
          .
          <article-title>Fast and power efficient sec-ded and sec-ded-daec codes in IoT based wireless sensor networks</article-title>
          .
          <source>In TENCON 2019-2019 IEEE Region 10 Conference (TENCON)</source>
          (
          <year>2019</year>
          ):
          <fpage>540</fpage>
          -
          <lpage>545</lpage>
          . IEEE. doi:
          <volume>10</volume>
          .1109/TENCON.
          <year>2019</year>
          .
          <volume>8929354</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ma</surname>
          </string-name>
          , L. Xing, and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>Performance Analysis of Reed-Solomon Codes for Effective Use in Survivable Wireless Sensor Networks</article-title>
          .
          <source>International Journal of Mathematical, Engineering and Management Sciences</source>
          ,
          <volume>5</volume>
          (
          <issue>1</issue>
          ), (
          <year>2020</year>
          ):
          <fpage>13</fpage>
          . doi:
          <volume>10</volume>
          .33889/IJMEMS.
          <year>2020</year>
          .
          <volume>5</volume>
          .1.002.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Eric</surname>
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Olsen</surname>
          </string-name>
          ,
          <article-title>"Continuous Error Detection and Correction of Arithmetic in a Complement RRNS"</article-title>
          ,
          <year>2020</year>
          10th
          <string-name>
            <given-names>Annual</given-names>
            <surname>Computing</surname>
          </string-name>
          and Communication Workshop and Conference (CCWC),
          <year>2020</year>
          , pp.
          <fpage>0009</fpage>
          -
          <lpage>0017</lpage>
          . doi:
          <volume>10</volume>
          .1109/CCWC47524.
          <year>2020</year>
          .
          <volume>9031218</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Yigit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Boluk</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V. C.</given-names>
            <surname>Gungor</surname>
          </string-name>
          .
          <article-title>A new efficient error control algorithm for wireless sensor networks in smart grid</article-title>
          .
          <source>Computer standards &amp; interfaces, 63</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>27</fpage>
          -
          <lpage>42</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.csi.
          <year>2018</year>
          .
          <volume>11</volume>
          .006.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>T.</given-names>
            <surname>Plantard</surname>
          </string-name>
          .
          <article-title>Efficient word size modular arithmetic</article-title>
          .
          <source>IEEE Transactions on Emerging Topics in Computing</source>
          ,
          <volume>9</volume>
          (
          <issue>3</issue>
          ),
          <year>2021</year>
          , pp.
          <fpage>1506</fpage>
          -
          <lpage>1518</lpage>
          . doi:
          <volume>10</volume>
          .1109/TETC.
          <year>2021</year>
          .
          <volume>3073475</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>