<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Theoretical and Experimental Investigation of Error Detecting and Error Correcting Ability of Rank Codes</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Viacheslav</forename><surname>Kovtun</surname></persName>
							<email>kovtun_v_v@vntu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Vinnytsia National Technical University</orgName>
								<address>
									<postCode>21021</postCode>
									<settlement>Vinnytsia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mykola</forename><surname>Bykov</surname></persName>
							<email>nkbykov@vntu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Vinnytsia National Technical University</orgName>
								<address>
									<postCode>21021</postCode>
									<settlement>Vinnytsia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tetiana</forename><surname>Gryshchuk</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Vinnytsia National Technical University</orgName>
								<address>
									<postCode>21021</postCode>
									<settlement>Vinnytsia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olha</forename><surname>Bykova</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Europian colledge</orgName>
								<address>
									<addrLine>Campus Bruges, Djiver 11</addrLine>
									<postCode>800</postCode>
									<settlement>Bruges</settlement>
									<country key="BE">Belgium</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Theoretical and Experimental Investigation of Error Detecting and Error Correcting Ability of Rank Codes</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">5D1F08C97178AEEC10EA761C9BC51B97</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T20:00+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Methods of unified information description</term>
					<term>modeling</term>
					<term>rank configurations</term>
					<term>DRP-code</term>
					<term>encoding</term>
					<term>decoding</term>
					<term>error detection and correction</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The paper presents the results of theoretical and experimental studies of the ability of the rank codes, proposed by the authors, to detect and correct errors introduced by information transmission channels. The introduction discusses the principles of rank codes building and their application in decision-making systems. In the main part of the presented work, aspects of research related to the theoretical and experimental evaluation of their ability to detect and correct errors introduced by the transmission channel are highlighted. Algorithms for finding and correcting errors are presented.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Today, the problem of developing theoretical foundations and practical means of unified presentation of information about the states of control objects, its coding and transmission in control systems during decision-making is quite relevant. It is known that decisions regarding the management of objects of various nature in control systems are made on the basis of information about the distance between the current and target states of the object <ref type="bibr" target="#b0">[1]</ref>. These distances in different parametric spaces (deterministic, probabilistic, approximate, fuzzy, etc.) are described differently, which requires for each case the development of separate methods and algorithms for presenting information and making decisions <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>. In order to unify the methods and algorithms of presenting and processing information for decision-making in control systems, the authors proposed to describe the states of the systems by rank configurations, and the rank configurations themselves by potential codes (or DRP codescodes that preserve the ranks of the distances between states). The proposed codes were called potential by analogy with the electric field. In them, the rank value of the distance between code words is defined as the difference between their values, just as the field strength between electric charges is defined as the difference in their potentials. Such codes make it possible to reduce information processing algorithms in various parametric descriptions to performing a single logical operation on them <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>. To determine the type of this operation and the characteristics of the codes themselves, a number of models of rank configurations, including their interval model, have been developed <ref type="bibr" target="#b5">[6]</ref>.</p><p>Unfortunately, there is a small number of works in the direction of applying such an approach to the description, processing and transmission of information in decision-making systems. As an example, we can note works <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref> in which difference codes are proposed for description and pattern recognition. In <ref type="bibr" target="#b9">[10]</ref>, we showed the advantages of our approach compared to the one proposed in <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>, which makes further research in this area relevant</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Analysis of the state of the issue</head><p>The codes proposed by us can be used to increase the efficiency of the decision-making process in systems of various purposes <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12]</ref> and to increase the immunity of the information transmission process in communication channels. For example, in the proposed hierarchical parallel-serial pattern recognition strategy <ref type="bibr" target="#b10">[11]</ref>, it is convenient to use the description of these objects in a rank scale for the classification of objects at the upper level of the described strategy, since their clusters in the feature space do not intersect.</p><p>The authors also developed a system for transmitting rank information through communication channels, proposed schemes for encoding and decoding information in this system without taking into account the influence of interferences on the communication channel <ref type="bibr" target="#b13">[13]</ref>. In real network communication channels of computer-integrated control systems, there are intense interference signals that generate errors in code words. Therefore, in this work the task of conducting theoretical and experimental studies is set for the purpose of developing algorithms of localization and correcting asymmetric and symmetric errors introduced by the communication channel in DRP codes.</p><p>For a better understanding of the carried out in this work research we present a number of necessary theoretical provisions regarding the models of rank configurations and rank codes (DRP-codes), presented by the authors in the work <ref type="bibr" target="#b5">[6]</ref>.</p><p>For a better understanding of the research carried out in this work, we will present a number of necessary theoretical provisions regarding the models of rank configurations and rank codes (DRP codes), presented by the authors in the work <ref type="bibr" target="#b5">[6]</ref>.</p><p>The rank configuration of the space of objects described in some parametric space is called a set of elemental subsets, the elements of these subsets are the ranks of distances incident to the same object <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b8">9]</ref>.</p><p>It is convenient to compactly present the rank configuration in algebraic form. For example, the rank configuration in Fig. <ref type="figure" target="#fig_1">1</ref> can be written in algebraic form as .</p><p>(1) The geometric (Fig. <ref type="figure" target="#fig_1">1</ref>) and combinatorial (Fig. <ref type="figure" target="#fig_2">2</ref>) models of rank configurations are the most relevant for the task of determining the interference resistance and corrective capabilities of the proposed rank codes.  <ref type="figure" target="#fig_2">2a</ref>) that this code is by its nature a constant-weight code (CWC), and its bit rate n is equal to the number of ranks in the rank configuration and is determined by the formula:</p><formula xml:id="formula_0">2 ) 1 ( − = m m n , (<label>2</label></formula><formula xml:id="formula_1">)</formula><p>where m is the number of coded elements (graph vertices). In the following sections of the work, we will perform theoretical and experimental studies necessary to determine the ability of the proposed rank codes to detect and correct errors introduced by the information transmission channel, and based on them we will develop algorithms for localization and correction of these errors.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Theoretical investigation of problem</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Theoretical evaluation of error correcting ability of rank codes</head><p>Since the transmission channels of industrial networks, in which the proposed rank code should be used, are subject to the influence of interference capable of generating both symmetric and asymmetric errors, the use of error localization and correction methods used for standard CWC codes is impossible. Accordingly, the theoretical evaluation of the effectiveness of these methods should be carried out taking into account the principles of construction of these codes. According to the characteristics of rank codes, when the number of coded states of systems m increases, the bit rate n of the code increases according to the expression (2), and the number of units in the code word also increases and is equal to m-1.</p><p>To obtain a theoretical estimate, we will first prove the theorem: for a rank configuration of dimension m, the Hamming distance d x between words of the rank code is equal to d x =2(m-1)-2.</p><p>Proof: The two code words of the rank code, between which the Hamming distance is calculated, contain 2(m-1) single digits, and the single digits match only in one digit, one from each word, in total 2. Therefore, the number of digits in which the ones do not match, is equal to 2(m-1)-2, and the logical XOR operation on these words, by which the Hamming distance is calculated, will give 2(m-1)-2 units, which is what we needed to prove.</p><p>It follows from the proven theorem according to <ref type="bibr" target="#b14">[14]</ref> that the theoretical estimate of the possibility of detecting errors by the multiplicity g d is determined by the formula</p><formula xml:id="formula_2">3 ) 1 ( 2 1 − − = − ≤ m d g x d ,</formula><p>(3) and correction of errors by the g c multiplicity -according to the formula:</p><formula xml:id="formula_3">2 ) 3 ) 1 ( 2 ( 2 ) 1 ( − − = − ≤ m d g x c . (<label>4</label></formula><formula xml:id="formula_4">)</formula><p>The identification of the model was performed experimentally on the examples of specific rank configurations of dimensions m=4 and m=5 using models of rank configurations in the form of incidence matrices, the rows of which form the DRP-codes of the vertices of the rank simplex. </p><formula xml:id="formula_5">d X (A,B)=0001111000 ⊕ 0010001110=6 d X (A,C)=0001111000 ⊕ 1000100101=6 d X (A,D)=0001111000 ⊕ 0100010011=6 d X (A,E)=0001111000 ⊕ 1111000000=6 d X (B,C)= 0010001110 ⊕ 1000100101=6 d X (B,D)= 0010001110 ⊕ 0100010011=6 d X (B,E)= 0010001110 ⊕ 1111000000=6 d X (C,D)= 1000100101 ⊕ 0100010011=6 d X (C,E)= 1000100101 ⊕ 1111000000=6 d X (D,E)= 0100010011 ⊕ 1111000000=6 error detecting 5 1 6 1 = − = − ≤ x d d g , error correction 2 2 5 2 ) 1 ( = = − ≤ x c d g .</formula><p>According to the law of induction, it is easy to show numerical values of the multiplicity of detected and corrected errors for rank configurations of higher dimensions m=6..11. For configurations with a dimension higher than 11, it is inefficient to use potential codes, since their bit rate exceeds the bit rate of modern PC n≥64, and computational operations on the codes become complex and inefficient.</p><formula xml:id="formula_6">d X (A,B)=000111 ⊕ 011001=4 d X (A,C)=000111 ⊕ 101010=4 d X (A,D)=000111 ⊕ 110100=4 d X (B,C)= 011001 ⊕ 101010=4 d X (B,D)= 011001 ⊕ 110100=4 d X (C,D)= 101010 ⊕ 110100=4 error detecting 3 1 4 1 = − = − ≤ x d d g , error correction 1 2 3 2 ) 1 ( = = − ≤ x c d g .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Theoretical substantiation of the noise immunity of the rank codes</head><p>Before proceeding to experimental studies on the assessment of the ability of the rank code to detect and correct errors introduced by the channel, we will perform a theoretical assessment of the dependence of the DRP code's reliability on the properties of the transmission channel itself. This will make it possible to focus attention in the experiment on methods of localization and correction of those errors that are most likely to occur in the channel.</p><p>The enhanced noise immunity of the proposed DRP-code is based on the fact that it is inherently a constant-weight code (CWC) in which each single bit is placed in the same positions simultaneously in two codewords. The probability of not detecting one error in the code word (the combined probability of converting one zero point into one unit and one unit point into zero) for the CWC, and therefore the DRP-code, is equal to <ref type="bibr" target="#b14">[14]</ref>:</p><formula xml:id="formula_7">m n m n m m n p p C p p C P − + − − − − − = ) 1 ( ) 1 ( 1 1 2 1 1 , (<label>5</label></formula><formula xml:id="formula_8">)</formula><p>where m is the number of code words, p -the probability of one error for a symmetric channel, n -code bit rate. For example, for a rank configuration of four states the number of coded symbols (Fig. <ref type="figure" target="#fig_7">1,a</ref>) 4 m = , and the number of ranks of the distances between states (code bit rate) is defined as</p><formula xml:id="formula_9">( 1) 4 3 6. 2 2 m m n − ⋅ = = =</formula><p>The number of units point in the code word of this configuration is (m-1)=3. From the expression (5) we obtain for the DRP-code:</p><formula xml:id="formula_10">4 2 2 1 3 2 1 3 ) 1 ( 9 ) 1 ( ) 1 ( p p p p C p p C P nDRP − = − − = . (6)</formula><p>Let's determine this characteristic for the MTA-3 standard CWC and compare it with <ref type="bibr" target="#b5">(6)</ref>. For CWC MTA-3, which contains in the code word 3 ones point and 4 zeros point (m=3, n=7) from formula (3) we have:</p><formula xml:id="formula_11">6 2 3 1 4 2 1 3 ) 1 ( 12 ) 1 ( ) 1 ( p p p p C p p C P nCWC − = − − = . (<label>7</label></formula><formula xml:id="formula_12">)</formula><p>Taking the value of </p><p>From expression <ref type="bibr" target="#b7">(8)</ref> we can see that the reliability of the transmission of rank information using the DRP-code is several orders of magnitude higher than with the standard CWC code. Standard CWC allows only to detect the presence of asymmetric errors, but does not allow to detect symmetric errors, and even more so, to perform their correction. This fact makes it necessary to retransmit information, which slows down the speed of the transmission device.</p><p>The conducted theoretical assessment of the DRP code immunity to the influence of symmetric channel interference showed that the probability of introducing a single symmetric error into the DRP code by the channel is quite small, but higher than the probability of multiple type errors. Therefore, in experimental studies, it is necessary to first of all focus efforts on finding methods for building algorithms for localization and correction of single errors.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Experimental investigation of error correcting ability of DRP codes</head><p>According to the standard classification, CWC belongs to block nonlinear codes. The analysis of mathematical models of the rank code shows that it is a set of m multivalued logical functions of significance n, the values of the arguments of which are obtained by mapping the ordered distances between the elements of the original space to an ordered set of ranks using the logical operation "AND". Since the "AND" operation on a set of code words is not a group one, standard methods are not suitable for correcting DRP code transmission errors, and the development of original algorithms for localization and error correction based on the study of heuristic patterns is required. Since asymmetric errors in code words (erasure of "1" to "0" or insertion of a "1" instead of "0") are detected in the CWC by a standard algorithm for counting the number of units in a code word, the main attention will be paid to the study of symmetric errors,, i.e. pairwise replacement in certain digits of code words 0" to "1" and vice versa. For research, we will choose the rank configurations of the three-dimensional simplex shown in Fig. <ref type="figure" target="#fig_7">1 a</ref>) and DRP-codes, representing by incidence matrix in Fig. <ref type="figure" target="#fig_2">2 a</ref>) respectively.</p><p>For asymmetric errors in code words, when an additional "1" is introduced, or one "1" is erased to "0", the localization and correction algorithm is simple:</p><p>The number of p units in the code word is counted, and if p &gt; m-1, then the algorithm erases the extra unit in the bit that corresponds to the column of the matrix with the number "1" greater than 2; if p &lt; m-1, then the algorithm inserts a "1" into the bit that corresponds to the column of the MKOD matrix, in which there is only one "1". An example of a DRP code with an additional error introduced by an asymmetric channel in the form of an additional "1" is shown in Table <ref type="table">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>Asymmetric error in the form of an additional "1" in code word C</p><p>In Table <ref type="table">1</ref> an additional "1" is entered in the code of symbol C in the 5th digit (this is an asymmetric error). This code word is localized as erroneous by the number of units p=4 &gt;3, and since there are more than two units in the 5th column of the matrix, the localization algorithm and the correction should erase it.</p><p>An example of a DRP code with an additional error introduced by an asymmetric channel in the form of an erased "1" is shown in Table <ref type="table">2</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2</head><p>Asymmetric error in the form of an erased "1" in code word A In Table <ref type="table">2</ref>, in the 6th digit of the code of symbol A, value "1" is replaced by "0". This code word is localized as false by the number of units p= &lt; 3, and since there are less than two units in the 6th column of the matrix, the correction algorithm must write a unit in the 6th digit.</p><p>The study of symmetric errors will consist in the analysis of the appearance of the DRP code after entering the selected code word with an even error. The number of different variants Ev of such errors can be determined by the formula:</p><formula xml:id="formula_14">1 1 1 ( 1) ( ), v m n m E m C C − − + =<label>(9)</label></formula><p>ranks symbols</p><formula xml:id="formula_15">6 5 4 3 2 1 A 1 0 1 0 0 1 B 0 1 1 0 1 0 C 1 1 0 1 1 0 D 0 1 0 1 0 1 ranks symbols 6 5 4 3 2 1 A 0 0 1 0 0 1 B 0 1 1 0 1 0 C 1 0 0 1 1 0 D 0 1 0 1 0 1</formula><p>where m is the number of coded symbols (system states), 1   1 m C − -the number of possible errors in units digits, 1 ( 1) ) n m C − + -the number of possible variants of errors in zero digits. For the DRP-code of the configurations selected for the study (Fig. <ref type="figure" target="#fig_1">1</ref> and Fig. <ref type="figure" target="#fig_2">2</ref>, m=4, n=6), the number of error variants for the study is equal to: The analysis of the results of the research for these options showed that in order to build a heuristic algorithm, in addition to the erroneous code words themselves, it is also necessary to analyze the verification matrix G[n,n] of the rank distances between all pairs of code words. As an example, we determine the distance d(AD) between the code words of symbols A and D in the table of Fig. <ref type="figure" target="#fig_2">2a</ref>), for which we use the expression:</p><formula xml:id="formula_16">000001 010101 101001 ) ( = ∧ = ∧ = D A x x AD d</formula><p>, where ∧ is the logical operation AND, and We will consider those shown in tables 1 and 2, as well as in fig. <ref type="figure">5a</ref>), 6a) and 7a) DRP codes of words A, B, C and D in the interpretation of some code matrix MKOD. Then symbol A will correspond to the row index i=1, symbol B -i=2, symbol C -i=3, symbol D -i=4. Ranks 1, 2, 3, 4, 5, 6 will correspond to the significant index j of the column of the code matrix j=1, j-2, j=3, j=4, j=5 and j=6, respectively.</p><p>Distances d(i,j) between code words (for example, d(AB) is d(1,2); d(АС) is d(1,3); d(ВС) is d(2,3), etc.) in the verification matrix G[n,n] are determined by the logical operation "AND". This is because in the codeword encoding some vertex of the rank simplex, the fact which rank edge touches it is fixed with the help of "1". For example, edges with ranks 1, 4, 6 touch vertex A, so in code word A there are "1" in code digits 1, 4, 6.</p><p>Therefore, in the matrix of MKOD codes for an undamaged code, in each column there are two "1" in the codes of their symbols (vertices of the simplex), which are the incident edge with the rank corresponding to the number of this column, and in the corresponding columns of the verification matrix there is only one "1", and there is also one "1" in each row of this matrix. These are signs of error-free code.</p><p>For the code damaged by a symmetric error in Fig. <ref type="figure">7</ref> (where the "1" from the 5th digit moved to the 1st digit, and a "0" was entered in its place), we have in the code matrix MKOD three "1" in the column of the 1st digit and one "1" in the column of the 5th discharge. This is a sign of code damage, since there are still three "1" left in the code words (rows of the MKOD matrix). That is, the code by the number of "1" in the word remains a code with a constant weight of CWC=3, and the number of "1" and the number of "1" in the row of the MKOD matrix is not a feature of introducing a symmetric error into the code word.</p><p>In the verification matrix G[n,n] for this case (Fig. <ref type="figure">7</ref>), we can see that there is no "1" in the 5th digit column (this is a sign to which digit of the damaged word should be returned "1"), and in the 1st digit column there are as many as three " 1" (this is a sign in which digit of the damaged word should be returned "0"). Now it remains to determine the index of the damaged word (the row number in the MKOD matrix, in which a single symmetric error is introduced). For this case of the values of the verification matrix G[n,n], the sign is simple -there are two "1"s only in the distance with index 2 (d(АВ)=d(1,2)), for rows with other indices, the number of "1" s is correct (one "1") . That is, for this case, we determine by this sign that an error was made in the code word B (the second row of the matrix MKOD, i=2) and it is necessary to write "0" in the 1st digit, and in 5th digit "1".</p><p>For the code damaged by a single symmetric error in Fig. <ref type="figure">6</ref> case for the verification matrix G[n,n] is more complicated. Again, by the number of "1" in its digit columns, we can see that it is necessary to transfer "1" from the 6th digit to the 5th digit of the damaged word, and the indicator for detecting the number of the damaged word will be the priority of the index in the lines with which the incorrect number of "1" (&gt; one).</p><p>Since in the rows of the matrix for d(AB), d(BC) (respectively d(1,2), d(2,3)) there are two "1" each, and in the row d(BD) (respectively d(2,4 )) are all "0", then the sign here is the presence of the index 2 more than once in these distances (number i=2 row of the MKOD matrix). Therefore, the number of the damaged code word in the MKOD matrix is = 2 (symbol code B), and in it "1" must be transferred from the 6th digit to the 5th.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Development of algorithm of error correction in DRP-code 4.1 Verbal description of the error correction algorithm in the rank code</head><p>According to the regularities found in the previous sections, the heuristic algorithm for localization and correction of single asymmetric and symmetric errors in the DRP code can have the following verbal description.</p><p>In the first step, a two-dimensional array of n m × size of m code words received from channel is formed in the decoder memory, where n is the bit rate of the code. Under the condition of error-free transmission, this array will correspond to the incidence matrix of the transmitted rank configuration of system states, and each raw of the array will correspond to the correct DRP code word.</p><p>In the second step, by counting units in each line of the array, code words with asymmetric errors are localized in the case of t≠m-1, where t is the number of units point in the word. Correction of asymmetric errors is carried out according to the procedure: if the number of units t&gt;m in some word, then the columns of the array of code words are scanned and in the found erroneous word units are replaced with zeros point in those digits whose columns contain more than 2 units point; if the number of units point in some word is t&lt;m-1, then the columns of the array of code words are scanned and in the found erroneous word, zeros point are replaced by units point in those bits whose columns contain less than 2 units point.</p><p>In the third step, the columns of the array are scanned and the presence of symmetric even errors is detected in the case of columns with units point, in which the number of units is not equal to 2. Localization of the erroneous code word is carried out using the verification matrix</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>[ , ]</head><p>R G n n according to the following procedure: those rows of the matrix that contain two units point are marked. If there is more than one such code word, then the one whose index is contained in the indices of pairs of distances twice is chosen as false.</p><p>In the fourth step, the numbers of damaged bits are located and corrected. For asymmetric errors, they are determined by the presence or absence of the necessary units point in the words, and for symmetric errors, as a rule: the column with zeros in the verification matrix of the codeword distances, obtained by the logical operation "AND" over all pairs of codewords, shows a bit with a replacement of 1→ 0, and the column with three units point is a bit with 0→1 replacement.</p><p>By the pseudocode 1, with the selected code vatrix MKOD and verification distance matrix G[n,n], the algorithm for localization and correction of asymmetric and symmetric errors is shown. To implement the algorithm, a Python program was developed, which is a commercial product and can be provided upon separate request.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Results and discussions</head><p>It is rather difficult to investigate with the help of a machine experiment all variants of errors that can be introduced into DRP codes during their transmission over a communication channel, since the number of these variants is quite large. For example, it follows from expression <ref type="bibr" target="#b9">(10)</ref> that only for the code that transmits information about only one rank configuration, the number of variants of introduced errors is E v =36. And since for a rank simplex of dimension m=4, the number of different rank configurations M c =30 <ref type="bibr" target="#b5">[6]</ref>, the total of such different variants of errors is equal to E v *M c = 36*30=1080. For m&gt;4, the number of options for processing by a person is unthinkable, and the mechanism of computer generation of various error options in the DRP code at this stage of research has not yet been developed by the authors. Therefore, to check the adequacy of the developed algorithm on the ability to detect and correct errors in rank codes, software testing was conducted, part of the results of which are presented below. The results show that the developed algorithm correctly localizes and corrects both asymmetric and symmetric errors in codes. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Start of asymmetric errors check</head><formula xml:id="formula_17">: input matrix: [[0 0 1 0 0 1] [0 1 1 0 1 0] [1 0 0 1 1 0] [0 1 0 1 0 1]] sum of rows = [2 3 3 3] index of corrupted word = 1 code of corrupted word = [0 0 1 0 0 1] corrupted bit = 6 fixed matrix: [[1 0 1 0 0 1] [0 1 1 0 1 0] [1 0 0 1 1 0] [0 1 0 1 0 1]] End Fixed! Start of asymmetric errors check: input matrix: [[1 0 1 0 0 1] [0 1 1 0 1 0] [1 1 0 1 1 0] [0 1 0 1 0 1]] sum of rows = [3 3 4 3] index of corrupted word = 3 code of corrupted word = [1 1 0 1 1 0] corrupted bit = 5 fixed matrix: [[1 0 1 0 0 1] [0 1 1 0 1 0] [1 0 0 1 1 0] [0 1 0 1 0 1]] End Fixed! Start of symmetric errors check: input matrix [[1 0 1 0 0 1] [1 0 1 0 1 0] [1 0 0 1 1 0] [0 1 0 1 0 1]] check matrix: [[1 0 1 0 0 0] [1 0 0 0 0 0] [0 0 0 0 0 1] [1 0 0 0 1 0] [0 0 0 0 0 0] [0 0 0 1 0 0]] index of</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>The theoretical and experimental studies carried out in the work on the evaluation of the interference resistance and corrective ability of the rank codes proposed by the authors showed that these codes are highly resistant to communication channel interference and make it possible to localize asymmetric and symmetric errors in them with the help of simple algorithms. The work theoretically proved that the Hamming distance dx between the codewords of the DRP code is equal to 2(m-1)-2, which provides the possibility of localizing errors with a multiplicity of 2(m-1)-3 and correcting errors with a multiplicity (2(m-1) -3)/2. The corrective ability of the proposed rank code increases with an increase in the number of code words m that describe the given rank configuration of coded elements in the feature space. The conducted experimental studies of error variants in the DRP code made it possible to develop a heuristic algorithm for their localization and correction using an auxiliary verification matrix. Testing of the algorithm on a code with a bit rate of n=6 confirmed the adequacy of the developed algorithm for localization and correction errors of multiplicity 1. Assessment of the correctness of the algorithm's operation on codes of a higher bit rate and with errors of a higher multiplicity requires additional research.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>4 {{1, 4 ,</head><label>44</label><figDesc>6},{2, 4,5},{2,3, 6},{1,3,5}} K =</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Geometrical models of rank configurations: a) -three-dimensional simplex, b)complete regular graph</figDesc><graphic coords="2,140.35,518.30,328.50,140.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Combinatorial representation of the rank configuration: a) -incidence matrix of the graph in fig. 1,b); b) -rank adjacency matrix of simplex in fig.1,a)</figDesc><graphic coords="3,86.20,160.45,435.85,107.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :Figure 4 :</head><label>34</label><figDesc>Figure 3: Evaluation of error detecting and error correction for rank configuration of dimension m=4</figDesc><graphic coords="4,86.20,72.00,448.05,132.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>-code. Since for the DRP-code the unit must not be detected simultaneously in two codewords, then</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 5 :Figure 6 :Figure 7 :</head><label>567</label><figDesc>are DRP-codes of vertices A and D. Examples of the correct DRP code and the verification matrix G nn for them are shown in Fig.5, and the wrong DRP codes and the verification matrices G nn for them are shown in Fig. 6The correct DRP code of the rank configuration (a) and the verification matrix G[n,n] of rank distances for it (b) DRP code of the rank configuration (a) with an error in code word B ("1" from digit 5 moved to digit 6, and "0" became in its place) and the check matrix of rank distances for it (b) DRP code of the rank configuration (a) with an error in code word B ("1" from bit 5 moved to bit 1, and in its place became "0") and the check matrix G[n,n] of rank distances for it (b)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Algorithm 1 :</head><label>1</label><figDesc>detection and correction of errors in DRP-code function ASSYMETRIC_ERRORS_CHECK (MKOD) (M , N) ← MKOD.shape ▷ dimentions of code matrix sum_of_rows ← P ∑ MKOD ▷ get list of sums of rows</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head></head><label></label><figDesc>index of corrupted word = 3 code of corrupted word = [1 0 1 0 1 0] corrupted bits = [4, 3] fixed matrix: [index of corrupted word = 1 code of corrupted word = [0 0 1 1 0 1] corrupted bits = [6, 3] fixed matrix: [</figDesc></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgements</head><p>The authors are grateful to all colleagues and institutions that contributed to the research and made it possible to publish its results.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Fast identification and stabilization of unknown linear system</title>
		<author>
			<persName><forename type="first">D</forename><surname>Gramlich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ebenbauer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IFAC PaperOnline</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="6241" to="6246" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Multi-attribte decision-making based on comprehensive hesistant fuzzy entropy</title>
		<author>
			<persName><forename type="first">G</forename><surname>Xin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ying</surname></persName>
		</author>
		<idno type="DOI">10.1016/i.esva.2023.121459</idno>
	</analytic>
	<monogr>
		<title level="j">Expert Systems with Applicatons</title>
		<imprint>
			<biblScope unit="volume">237</biblScope>
			<biblScope unit="page">121459</biblScope>
			<date type="published" when="2024-03">Mar. 2024</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Responsible algorithmic decision-making</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">F</forename><surname>Breidbach</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.orgdyn.2024.101031</idno>
	</analytic>
	<monogr>
		<title level="m">Organization Dynamics</title>
				<imprint>
			<publisher>Elsevier BV</publisher>
			<date type="published" when="2024-01">Jan. 2024</date>
			<biblScope unit="page">101031</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A probabilitybased fuzzy algorithm for multi-attribute decision-analysis with application to aviation disaster decision-making</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Agraval</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Soni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Keshta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Savithri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Abdinadievna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Singh</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.dajour.2023.100310</idno>
	</analytic>
	<monogr>
		<title level="j">Decisin Analytis Journal</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page">100310</biblScope>
			<date type="published" when="2023-09">Sep. 2023</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">An artificial intelligence algorithmic approach to etical decision-making in human resource management processes</title>
		<author>
			<persName><forename type="first">W</forename><surname>Rogers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Murray</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Stefanidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">Y</forename><surname>Degbey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">Y</forename><surname>Tarba</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.hrmr.2022.100925</idno>
	</analytic>
	<monogr>
		<title level="j">Humane Resource Management Review</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">100925</biblScope>
			<date type="published" when="2023-03">Mar. 2023</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Unified method of knowledge representation in the evolutionary artificial intelligence systems</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">M</forename><surname>Bykov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">N</forename><surname>Bykova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of SPIE</title>
				<meeting>SPIE</meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="volume">5098</biblScope>
			<biblScope unit="page" from="244" to="253" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Evaluation of the adequacy of interval model of control systems ranked configurations</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mykola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Waldemar</forename><surname>Bykov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Wójcik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Laura</forename><forename type="middle">M</forename><surname>Raimy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Saule</forename><surname>Yesmakhanova</surname></persName>
		</author>
		<author>
			<persName><surname>Smailova</surname></persName>
		</author>
		<idno type="DOI">10.1117/12.2229344</idno>
	</analytic>
	<monogr>
		<title level="m">Proc. SPIE</title>
				<meeting>SPIE</meeting>
		<imprint>
			<date type="published" when="2015-12">9816. 2015. December 18, 2015</date>
			<biblScope unit="page">981623</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Evasive subspaces, generalized rank weights and near MRD codes</title>
		<author>
			<persName><forename type="first">G</forename><surname>Marino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Neri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tromberti</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.disc.2023.113605</idno>
	</analytic>
	<monogr>
		<title level="j">Discrete Mathematics</title>
		<imprint>
			<biblScope unit="volume">346</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page">113605</biblScope>
			<date type="published" when="2023-12">Dec. 2023</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Extending two families of maximum rank distance codes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Neri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Santonastaso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Zullo</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ffa.2022.102045</idno>
	</analytic>
	<monogr>
		<title level="j">Finite Fields and Their Applications</title>
		<imprint>
			<biblScope unit="volume">81</biblScope>
			<biblScope unit="page">102045</biblScope>
			<date type="published" when="2022-08">Aug. 2022</date>
			<publisher>Elsevier BV</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Research of neural network classifier in speaker recognition module for automated system of critical use</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mykola</surname></persName>
		</author>
		<author>
			<persName><surname>Bykov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Viacheslav</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrzej</forename><surname>Kovtun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mukhtar</forename><surname>Smolarz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Aliya</forename><surname>Junisbekov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maksabek</forename><surname>Targeusizova</surname></persName>
		</author>
		<author>
			<persName><surname>Satymbekov</surname></persName>
		</author>
		<idno type="DOI">10.1117/12.2280930</idno>
	</analytic>
	<monogr>
		<title level="m">Proc. SPIE 10445</title>
				<meeting>SPIE 10445</meeting>
		<imprint>
			<date type="published" when="2017-08-07">2017. August 7, 2017</date>
			<biblScope unit="page">1044521</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Development of effective strategy of pattern recognition</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">M</forename><surname>Bykov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">V</forename><surname>Kuzmin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Yakovenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of SPIE</title>
				<meeting>SPIE</meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="volume">4425</biblScope>
			<biblScope unit="page" from="75" to="82" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">M</forename><surname>Mykola</surname></persName>
		</author>
		<author>
			<persName><surname>Bykov</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Neural network modelling by rank configurations</title>
		<author>
			<persName><forename type="first">V</forename><surname>Viacheslav</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Abdourahmane</forename><surname>Kovtun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Konrad</forename><surname>Raimy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Saule</forename><surname>Gromaszek</surname></persName>
		</author>
		<author>
			<persName><surname>Smailova</surname></persName>
		</author>
		<idno type="DOI">10.1117/12.2501521.full</idno>
		<imprint>
			<date type="published" when="2018-10">October 2018</date>
			<biblScope unit="page">1080821</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">The Basis of Code Theory</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Zheng</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-981-19-0920-7_2</idno>
	</analytic>
	<monogr>
		<title level="m">Financial Mathematics and Fintech</title>
				<meeting><address><addrLine>Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
	<note>Modern Cryptography Volume 1</note>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Chapter 2 -Information theory, error correction, and detection theory</title>
		<author>
			<persName><forename type="first">Ivan</forename><forename type="middle">B</forename><surname>Djordjevic</surname></persName>
		</author>
		<idno type="DOI">10.1016/c2019-0-05028-5</idno>
	</analytic>
	<monogr>
		<title level="m">Quantum Communication, Quantum Networks, and Quantum Sensing</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="31" to="87" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
