<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Adaptive interference-resistant encoding using Barker- like sequences</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleg Riznyk</string-name>
          <email>oleh.y.riznyk@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Kynash</string-name>
          <email>yurii.y.kynash@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuriy Pelekh</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Evgeny Savelov</string-name>
          <email>yevhenii.e.savelov@edu.lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Evgeny Matviychuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Liubomyr Flud</string-name>
          <email>fludlybomir@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Ukrainian National Forestry University</institution>
          ,
          <addr-line>Lviv, 79057</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Interference resistance is one of the most important characteristics of modern data reception/transmission systems. Improving immunity to fixed baud/reception rates is a pressing issue, for example, in drone control. The studied code sequences allow an increase in the power of the received sequences due to the use of mirror interference-resistant code sequences. The increase in immunity to data transmission is achieved by increasing the length and power of the immunity code sequence used to transmit one message. The advantages of these sequences, such as high immunity to narrowband high-power interference, the possibility of dividing subscribers by code sign, transmission secrecy, high resistance to multipath propagation, and high resolution in navigation measurements will have wide practical use in communication and geolocation systems. An improved method for synthesizing interference-resistant code sequences using ideal ring bundles. An improved method for quickly finding such interference-resistant code sequences that can find and correct errors to the greatest extent depending on the length of the received code sequence. The implemented algorithm for quickly finding such interference-resistant code sequences, which can find and correct errors to the greatest extent depending on the length of the received code sequence. A simulation model of interference-resistant coding using ideal ring bundles has been developed. A software implementation of the simulation model of interference-resistant coding was carried out to find and correct errors in the received interference-resistant code sequences. The proposed interference-resistant code sequences have practical value since the obtained code sequence allows us to find up to 50% and correct up to 25% of distorted symbols from the length of the interference-resistant code sequence quite easily and quickly.</p>
      </abstract>
      <kwd-group>
        <kwd>Mirror code sequence</kwd>
        <kwd>ideal ring bundles</kwd>
        <kwd>non-equidistant code sequence</kwd>
        <kwd>non-equidistant combinatorial configuration 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The current state of the problem. In connection with the continuous increase in the amount of
information transmitted by communication channels, the technologies of interference-resistant
coding and decoding of data in real-time are gaining more and more importance. Analysis of active
channels shows that the frequency of occurrence of organized threats is much higher than natural
threats when transmitting data. Therefore, it is necessary to protect information both from
unauthorized access and from its distortion. One of the methods of protection is the encoding of
information by using tamper-resistant codes. The interference-resistant coding of information
should be understood as a form of transformation that allows finding and correcting a certain number
of errors. The increase in immunity to data transmission is achieved by increasing the length of the
code sequence used to transmit one message. The use of interference-resistant coding during data
transmission leads to an increase in data transmission time. At the same time, the energy
consumption for the transmission of one message increases. If the data transmission time is left
unchanged, it will expand the signal spectrum by reducing the duration of one symbol and will lead
to an increase in the frequency band allocated to one data transmission channel. Systems based on
interference-resistant coding are most widely used in relay stations, where the modulated signal is</p>
      <p>(O. Riznyk);
(E. Savelov);</p>
      <p>(Y. Kynash);
(E. Matviychuk);
(Y. Pelekh);
(L. Flud)
© 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
demodulated and, if necessary, decoded. As a result, the signal is "cleaned" of noise and interference,
and each repeater transmits the signal without the accumulation of noise and interference in the
transmission line. Thus, noise and interference are taken into account only between two adjacent
repeaters, which is the basis for long-distance data transmission. Transmitting a modulated signal
without using interference-resistant coding leads to the accumulation of errors, and distortions and
does not ensure the identity of the received signal with the transmitter signal. The urgency of solving
the problem. In this regard, the problem of regular synthesis of interference-resistant codes with
specified characteristics for wireless communication systems is becoming particularly relevant.
Setting the research task. It is necessary to develop an algorithm for quickly finding such
interference-resistant code sequences, which can find and correct errors to the greatest extent,
depending on the length of the received code sequence. The object of research is
interferenceresistant code sequences. The subject of research is the method of synthesis of interference-resistant
code sequences. The purpose of the work is to improve the method of synthesis and development of
a simulation model of interference-resistant coding.</p>
      <p>To achieve the set goal, it is necessary to solve the following research tasks:
• to improve the method of synthesis of interference-resistant code sequences using ideal ring
bundles;
• to develop a simulation model of interference-resistant coding using ideal ring bundles;
• to carry out a practical implementation of the algorithm for finding and correcting errors of
the received interference-resistant code sequences.</p>
      <p>The scientific novelty consists in the development of an improved method of synthesis of
interference-resistant code sequences.</p>
      <p>Practical significance. The proposed interference-resistant code sequences have practical value
since the obtained code sequence allows finding up to 50% and correcting up to 25% of distorted
symbols from the length of the interference-resistant code sequence.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Works</title>
      <p>
        The work [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] shows that the basis of the algorithms for the synthesis of interference-resistant code
sequences is the principle of redundancy, which makes it possible to find and correct errors due to
the peculiarities of the structures of these sequences. As a rule, error-correcting codes are built based
on cyclic code sequences, all combinations of which can be obtained by cyclic shifting of one or more
code combinations. The idea of building such codes is based on the use of polynomials that are not
reduced in the field of binary numbers and are divisible without a remainder only by themselves or
by unity.
      </p>
      <p>
        From the analysis of works [
        <xref ref-type="bibr" rid="ref2 ref3">2-4</xref>
        ], it can be seen that Bose Chaudhuri Hocquenghem codes (BCH
codes) are widely used for interference-resistant coding. For their decoding, the Berlekamp algorithm
and its main modifications are used, which ensure the correction of all weight errors  ≤  0, where
 0 + 1 =  0. However, the complexity of this algorithm is of the order of n2log2n operations and
requires approximately (5. . .20) bits of memory.
      </p>
      <p>Works [5-7] show that the main type of block codes for combating interference are non-binary
Reed-Solomon (RS) codes. The length of the set is determined by the output field 2 , where l defines
the length of the set. The decoding of these codes is also based on the Berlekamp algorithm. Despite
the efforts of many researchers, the complexity of the operations performed by the decoder remains
very high. Thus, when implementing the RS decoder for the code (31, 15), it is necessary to perform
approximately 17 operations for each bit of the decoded message, even if some of the operations are
performed in parallel, and the multiplication in non-binary fields is performed by tabular methods.</p>
      <p>Papers [5-7] consider cascade codes that provide high probability indicators with a fairly high
level of interference and moderate decoding complexity. Work [8] shows that the Viterbi algorithm
is widely used in data transmission technology using convolutional codes, which have better
characteristics compared to block ones. However, the complexity of implementing the Viterbi
algorithm grows exponentially with the length of the code. The works [9-11] consider the classes of
codes for which the complexity of decoding with the increase in their length does not grow
exponentially, but much more slowly, for example, as the square of the length. In works [10, 11], the
issue of synthesis of interference-resistant codes using ideal ring bundles is considered. The
disadvantage of the existing methods and algorithms for synthesizing interference-resistant codes
using ideal ring bundles is the exhaustive coding techniques, which slow down the search for
optimized code sequences.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Improvement of the method of synthesis of interference-resistant code sequences using ideal ring bundles</title>
      <p>The greatest effect of information protection is achieved when all used methods and means are
combined into a single integrated information protection mechanism. It should be said here that
information protection must be carried out in parallel at three levels: hardware (sketch cards, tokens,
cryptographic methods implemented at the software level), software (antivirus software, data
archiving, mandatory identification, encryption) and organizational (by essentially, control of
compliance with all hardware and software methods of protection in full).</p>
      <p>However, most experts are inclined to the opinion of the special place of tamper-resistant coding
(implemented by software or hardware) as perhaps the most reliable method, because the
information itself is protected here, not access to it. The effectiveness of this approach is explained
by the fact that it is not enough for an attacker to get access to information in the form of a sketch
card or a password, he also needs to know how the information he needs is encoded.</p>
      <p>An interference-resistant code sequence consists of a set of zeros and ones, which are used to
convert symbols for further reception-transmission operations. The main features of these
faulttolerant code sequences are improved error detection and correction characteristics. The immunity
of the system primarily depends on such code sequences. With the same lengths, the properties of
the interference-resistant code sequences may differ. Immunity will depend both on the lengths of
these code sequences and on several other characteristics, such as the mutual correlation of the
sequences. That is, the selection of the best interference-resistant code sequence is reduced to the
algorithm for searching for such code sequences.</p>
      <p>Existing methods of converting code sequences do not fully provide an opportunity to improve
coding/decoding systems. Therefore, one of the important tasks is the study of effective models for
improving the coding/decoding of information according to such indicators as data transfer speed,
immunity to code sequences, ease of correction, and error detection. Such models can be
nonequidistant code sequences consisting of integers or sequences of numbers defined as their values
and the values of all consecutive sums of adjacent elements.</p>
      <p>To solve this problem, consider non-equidistant code sequences. By non-equidistant code
sequences, we will consider sequences in which allowed code combinations form sequences with
different distances between ones and zeros.</p>
      <p>These non-equidistant code sequences have some advantages over other interference-tolerant
sequences. This is the simplicity of finding and correcting errors on the side of receiving data because
the appearance of the symbol "1" and/or the symbol "0" in the form of an obstacle indicates an error
since the number of allowed distances has changed.</p>
      <p>An error is not found only when the number of false codes is equal to or greater than the code
distance. If distorted symbols appear in this non-equidistant code sequence, they will be detected,
which contributes to the high immunity of the non-equidistant sequence.</p>
      <p>The task of improving the interference -resistant characteristics of non-equidistant code
sequences should be solved based on the application of ideal ring bundles (IRB).</p>
      <p>We will call an ideal numerical bundles in which the set of all numbers exhausts the values that
are proportional to the elements of a natural series with a given number of repetitions for each
element of this series. A non-equidistant code sequence is a sequence   = ( 1,  2, . . . ,   , . . . ,   ) of
elements, where all possible adjacent elements in the form of circular sums give the values of all
natural numbers 1, 2, ...,   =  2 − ( − 1).</p>
      <p>Based on the definition, we will construct a table of circular sums of the model of the
nonequidistant code sequence   (Table 1).</p>
      <p>The total number of all ring sums of the weights of elements of a non-equidistant code sequence
that have different values:
  =  2 − ( − 1).
(1)</p>
      <p>At the values pj=1, qj=n, and also at the values pj1, qj=pj-1, the ring sums of the weights of the
elements of the non-equidistant code sequence are equal to Sn.</p>
      <p>The number of ring sums on the sequence of element weights is determined by the following
relationship:</p>
      <p>Consider the construction of an interference-resistant code sequence. As an example, let's take a
non-equidistant code sequence built following the weights of the IRB elements of the 8th order of
the 4th multiplicity:</p>
      <p>Since these values of the weights of the elements are the numbers of the 8th order of the 4th
multiplicity, then each of these numbers of the natural series from 1 to n(n-1)/r=15 will be represented
in four different ways, and the number of all ways is equal to the number of received numbers.</p>
      <p>For a non-equidistant code sequence with n number of knitting elements, our algorithm provides
the possibility of coding any numbers from 1 to Sn=n(n-1)/r+1.</p>
      <p>The code combinations of the non-equidistant code sequence 00000100, 00100000, 01000000,
10000000 represent four ways of encoding the number 1. The number 2 is encoded as follows
00001000, 00010000, 01100000, 11000000. The number 3 is encoded as 00000 010, 00001100, 00110000,
11100000, number 4 00000001, 00000110, 00011000, 01110000, etc., number 14 10111111,
11111011, 11011111, 01111111, number 15 11111111.</p>
      <p>Synthesized interference-resistant code sequence based on IRB weights is shown in Table 2. Each
numerical combination of the interference-resistant non-equidistant code sequence corresponds to
a set of ones and zeros, which is built according to the weights of IRB according to the following
rule: 1 is 1, 2 is 10, 3 is 100, 4 is 1000, and so on. The number of different SN(SN-1)/2 code sequences
contain exactly R out of N single symbols in the corresponding digits, which follows from the
properties of the IRB. Other N-R symbols of any two non-equidistant code sequences differ from the
symbols that are represented in the digits of the same name.</p>
      <p>In this way, the minimum code distance of any interference-resistant non-equidistant code
sequence constructed with the help of IRB will be determined in the form of the ratio of the order
and multiplicity of IRB:
 
= 2( −  ).
(3)</p>
      <p>To increase the number of allowed combinations of non-equidistant code sequences with the help
of IRB, we will build a mirror interference-resistant non-equidistant code sequence with IRB weights,
where we change the places of ones and zeros during coding. Code combinations 01111111, 10111111,
11011111, 11111011 correspond to 4 ways of coding number 1. Number 2 corresponds to coding
00111111, 11101111, 11110111.</p>
      <p>Number 3 corresponds to 00011111, 110 01111, 11110011, 11111101, number 4 10001111,
11100111, 11111001, 11111110, etc., the number 14 is 10000000, 01000000, 00100000, 00000100, the
number 15 is 00000000.</p>
      <p>The realized mirror interference-resistant non-equidistant code sequence with IRB weights is
illustrated in the Table 3.</p>
      <p>The number of allowed combinations of the main and mirror interference-resistant code
sequences:</p>
      <p>The number of errors t1, which are detected using the interference-resistant code sequence, is
determined using the minimum code distance   :</p>
      <p>= 2   .
 1 ≤  
− 1.</p>
      <p>(4)
(5)
The number of errors t2 that are corrected using the fault-tolerant code sequence is determined
by the number of errors detected t1:</p>
      <p>2 ≤ ( 1 − 1)/2. (6)</p>
      <p>Let's define the dependence that determines the number of errors that can be detected by t1
interference-resistant code sequence:</p>
      <p>1 ≤ 2( −  ) − 1. (7)</p>
      <p>Let's define the dependence that determines the number of errors that can be corrected by t2
interference-resistant code sequence:</p>
      <p>2 ≤  −  − 1. (8)
We define the minimum code distance for an interference-resistant code sequence as
 1,2 =   − 2( −  ). (9)</p>
      <p>Let's find dependencies to determine the number of errors that can be detected using a
faulttolerant code sequence:</p>
      <p>Let's find the optimal relationship between the values of the parameters n and r from the point of
view of the best corrective ability of the interference-resistant code sequence. The immunity of this
code sequence increases with the increase in the value of the difference  =  −  .</p>
      <p>The largest value of  will be provided:</p>
      <p>Let us give the relationship between the parameters n and r, when the interference-resistant code
sequence maximally detects and corrects the largest number of errors:</p>
      <p>= 2 .</p>
      <p>/2,  − 
 = {( − 1)/2,  − 


.</p>
      <p>Let's find the dependencies to determine the number of errors that can be corrected using a
faulttolerant code sequence:
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)</p>
      <p>The fault-tolerant code sequences obtained based on ideal ring bundles can find up to  − 1 and
correct up to  /2 − 1 errors for even values of  , and find up to n and correct up to ( − 1)/2 errors
for odd values of n provided that the number of allowed combinations of interference-resistant code
sequences based on knitting is theoretically doubled due to the introduction of mirror
interferenceresistant code sequences.</p>
      <p>Let us compare it with the most well-known error-correcting codes
Bose-ChaudhuriHocquenghem (BCH), which detect and correct the maximum number of errors. The calculation of
the relationship between the amount of i information and the number of k correction symbols in a
code combination of length n, capable of correcting at least s errors, is based on the following
expressions:
where d is the minimum code distance.</p>
      <p>To conduct a comparative analysis of BCH codes and test codes, we will use the following
relationships:
 1 ≤ 2( −  ) − 1,    ≥ 4( −  ) ,
 1 ≤   − 2( −  ) − 1,    &lt; 4( −  ).
 2 ≤  −  − 1,    ≥ 4( −  ),
 2 ≤   −2( 2− +1) ,    &lt; 4( −  ).</p>
      <p>=  +  ;
2 ≥  + 1;
2 ≤ 2 ⁄( + 1) ;
 =</p>
      <p>( − 1)⁄2,
 = 2 − 1;
 = 2 − 3;
 = 2 + 1;
 ∗ = 2 + 1;
 ∗ = ( ∗ − 3)⁄4 ;
 ∗ = 2( ∗ + 1),
(25)
where: N and N* are the lengths of code sequences; t and t* are the number of errors to be
corrected; P and P* are the powers of the BCH and IRB code sequences, respectively.</p>
      <p>
        Formulas (20) (22) correspond to the ratio of the BCH code parameters [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], and (23) (25)
correspond to the parameters of the IRB code that provide maximum immunity to the length of the
code sequence [4]. Analysis of the results of comparing these codes based on formulas (20) (25)
shows that for a fixed length of code sequences, the maximum achievable noise immunity of IRB
codes is not inferior to BCH codes of the same sequence length. A certain advantage of the BCH code
is the ability to provide an increase in power (22), but at the expense of loss of immunity to
interference. Unlike BCH codes, the synthesis of IRB codes with a high level of noise immunity does
not require complex calculations, and the length of code sequences is determined by a linear
dependence (23), which makes it possible to construct code sequences with a high level of noise
immunity.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. The simulation model of interference-resistant coding</title>
      <p>The algorithm of the simulation model of interference-resistant coding with the help of
nonequidistant combinatorial configurations, which are clustered on the basis of the concept of the ideal
ring knitting and the representation of the number that we code in ASCII format and the
implemented method of coding using the ideal ring knitting. The algorithm of the simulation model
of interference-resistant coding includes the following stages:
• entering data of the code parameters and choosing the ideal ring bundles;
• selection of a code combination using an ideal ring bundle;
• generation of a tamper-proof code of the selected number.</p>
      <p>The block diagram of the algorithm for developing a simulation model of interference-resistant
coding using non-equidistant combinatorial configurations consists of the following blocks:
• block "Choosing code parameters by IRB" - we choose the ideal ring bundles based on the
values of the code parameters;
• block "Input of information for tamper-resistant coding" - input of the desired parameters of
the tamper-proof code with IRB restrictions;
• block "If the power of the code is greater than the sum of the IRB" - the sum of the elements
of the IRB is compared with the entered value. If the entered value is greater than the sum
of the IRB elements, it is necessary to re-enter the number to select another IRB;
• "Calculation of code positions according to the selected IRB" block - there are corresponding
positions in the IRB and corresponding sums of elements that correspond to the selected
number;
• block "Construction of the table of the interference-resistant code according to the positions
of the IRB" - a table of the found combinations of the IRB is generated;
• block "Generation of code combinations according to IRB values" - a table of code
combinations is generated, where each IRB element corresponds to its own unique code;
• block "Construction of a code combination according to the indices in the code table" - the
result of the generated interference-resistant code is formed due to the connection of two
codes of four bits each;
• block "Cycle Arch. Received code combination" processing cycle of the received
combination. Replacement of groups "0" and "1" with appropriate groups when finding and
correcting errors.
• block "Output of the resulting code combination" - record the results of interference-resistant
coding in a file.</p>
      <p>As an example, let's consider the calculation of the corrective capacity of interference-resistant
codes built using IRB with parameters: 1)  = 6,  = 1; 2)  = 15,  = 7; 3)  = 16,  = 8. Since
the sum of IRB Sn=31, the length of the code combinations and the power of the code in all these
three cases are the same. The maximum number of errors to be detected or corrected during the
implementation of the first of the defined codes is 9 and 4. In each of the other two cases, the IRB
allows you to generate code that can detect up to 15 and correct up to 7 errors. Thus, the last two
results are much better than the previous one. So, in general, any IRB can be used to build a
jamresistant code. However, it is most expedient to use the codes formed by means of IKV, the
parameters of which are connected by relation (15). A simulation model of fault-tolerant coding using
non-equidistant combinatorial configurations is developed in the Delphi programming language
[12]. The developed simulation model works flawlessly using a wide range of Windows operating
systems. For the synthesis of non-equidistant interference-resistant code sequences based on IRB, a
diagram of software components has been developed, which is presented in the form of
interferenceresistant sequence coding modules, random interference generation modules, and
interferenceresistant sequence decoding modules (Fig. 1).</p>
      <p>As can be seen from the diagram of the sequence of actions of the data encoding process, the first
action is the user's selection of a file and the opening of the file reading stream. Next comes the
command to encode the file. While there is no end of the file, we read the data block. Next, we
randomly generate obstacles and record them in the output file stream. Then we close the streams.</p>
      <p>Let us present the diagram of the sequence of actions for the file decoding process, which is shown
in Fig. 2. We will start the data decoding process with the file opening command. After that, send
the command to decode the file. Encoded data from the file will be read in blocks until the end of the
file. Next, the coder checks for errors. If errors are found, the coder corrects them. The next action is
to decode the block data and write it to a file.</p>
      <p>After the decoding is completed, we display statistical information about the result of decoding
actions.</p>
      <p>The program sequence diagrams show the operation process of the jamming-tolerant coding
software product using non-equidistant jamming-tolerant code sequences and illustrate the
possibilities of finding and correcting random jamming.</p>
      <p>The simulation model of interference-resistant coding using non-equidistant combinatorial
configurations has the following features:
• the input data will be the parameters of an interference-resistant non-equidistant code
sequence of order N with multiplicity R;
• provides coding and decoding with finding and correcting errors in the number of up to  2.</p>
      <p>The program has an easy-to-use and intuitive interface. The main elements of the window form
(Fig. 3):
•
•
•
the input data (IRB parameters of order N with multiplicity R);
the number of errors to be corrected (no more than the number specified in the Info window);
the button with the inscription &lt;OpenFile&gt;, allows you to select the necessary file for
encoding, creating random interference generation and decoding with the possibility of error
correction.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Results</title>
      <p>The results of the coding and decoding with the finding and correction of all errors in the number
from one to two using interference-resistant non-equidistant code sequences are shown in Figure 4a
and Figure 4b.</p>
      <p>The following results of the coding and decoding with the finding and correction of all errors in
the number from three to four using interference-resistant non-equidistant code sequences are
shown in Figure 5a and Figure 5b. The results of the coding and decoding with the finding and
correction of not all five-fold errors using interference-resistant non-equidistant code sequences are
shown in Figure 6.</p>
      <p>Analyzing the given experimental data obtained using the developed model, we see that finding
and correcting all errors is presented in Figure 4 and Figure 5. There is a fairly significant number of
errors found in Figure 6, but not corrected, which fully corresponds to the theory of non-equidistant
interference-resistant code sequences.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>It is shown that to eliminate interference during the transmission of code sequences over wireless
communication channels, it is advisable to use interference-resistant coding. The method of
synthesizing interference-resistant code sequences was improved, which, due to the use of ideal ring
bundles, ensured an increase in the interference resistance of the obtained sequences, finding up to
50% and correcting up to 25% of distorted symbols from the length of the interference-resistant code
sequence. A simulation model of interference-resistant coding using non-equidistant combinatorial
configurations was developed in the Delphi programming language, which is focused on low
computing power and works without errors using a wide range of Windows operating systems. It is
shown that the use of ideal ring bundles for the synthesis of interference-resistant code sequences
significantly simplifies the synthesis process and ensures its implementation in real-time. It was
determined that the perspective of further research is the reduction of redundancy, which can be
achieved by using mirror non-equidistant interference-resistant code sequences.
[4] M. Wang, S. Cong and S. Zhang, Pseudo Chirp-Barker-Golay coded excitation in ultrasound
imaging, in: 2018 Chinese Control And Decision Conference (CCDC), Shenyang, 2018, pp.
40354039. doi: 10.1109/CCDC.2018.8407824.
[5] O. Riznyk, O. Povshuk, Y. Kynash, I. Yurchak, Composing method of anti-interference codes
based on non-equidistant structures, in: 2017 XIIIth International Conference on Perspective
Technologies and Methods in MEMS Design (MEMSTECH), Lviv, 2017, pp. 15-17.
[6] O. Riznyk, O. Povshuk, Y. Noga, Y. Kynash, Transformation of Information Based on Noisy
Codes, in: 2018 IEEE Second International Conference on Data Stream Mining &amp; Processing
(DSMP), Lviv, 2018, pp. 162-165. doi: 10.1109/DSMP.2018.8478509.
[7] O. Riznyk, Y. Kynash, O. Povshuk and Y. Noga, The Method of Encoding Information in the
Images Using Numerical Line Bundles, in: 2018 IEEE 13th International Scientific and Technical
Conference on Computer Sciences and Information Technologies (CSIT), Lviv, 2018, pp. 80-83.
doi: 10.1109/STC-CSIT.2018.8526751.
[8] R. Oleg, K. Yurii, P. Oleksandr and B. Bohdan, Information technologies of optimization of
structures of the systems are on the basis of combinatorics methods, in: 2017 12th International
Scientific and Technical Conference on Computer Sciences and Information Technologies
(CSIT), Lviv, 2017, pp. 232-235. doi:10.1109/STC-CSIT.2017.8098776.
[9] S. Wang and P. He, Research on Low Intercepting Radar Waveform Based on LFM and Barker
Code Composite Modulation, in: 2018 International Conference on Sensor Networks and Signal
Processing (SNSP), Xi'an, China, 2018, pp. 297-301. doi: 10.1109/SNSP.2018.00064.
[10] S. Xia, Z. Li, C. Jiang, S. Wang and K. Wang, Application of Pulse Compression Technology in
Electromagnetic Ultrasonic Thickness Measurement, in: 2018 IEEE Far East NDT New
Technology &amp; Application Forum (FENDT), Xiamen, China, 2018, pp. 37-41. doi:
10.1109/FENDT.2018.8681975.
[11] V. Banket and S. Manakov, Composite Walsh-Barker Sequences, in: 2018 9th International
Conference on Ultrawideband and Ultrashort Impulse Signals (UWBUSIS), Odessa, 2018, pp.
343-347. doi: 10.1109/UWBUSIS.2018.8520220.
[12] Embarcadero/Products/Delphi. Native Apps For Any Device From One Codebase With Delphi!
2001. URL: https://www.embarcadero.com/products/Delphi, last accessed 2024/09/05.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>I.</given-names>
            <surname>Tsmots</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rabyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Riznyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kynash</surname>
          </string-name>
          ,
          <article-title>Method of Synthesis and Practical Realization of Quasi-Barker Codes</article-title>
          ,
          <source>in: 2019 IEEE 14th International Conference on Computer Sciences and Information Technologies (CSIT)</source>
          , Lviv, Ukraine,
          <year>2019</year>
          , pp.
          <fpage>76</fpage>
          -
          <lpage>79</lpage>
          . doi:
          <volume>10</volume>
          .1109/STCCSIT.
          <year>2019</year>
          .
          <volume>8929882</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Akula</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mulaveesala</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. K.</given-names>
            <surname>Sardana</surname>
          </string-name>
          ,
          <article-title>Barker-Coded Thermal Wave Imaging for Non-Destructive Testing and Evaluation of Steel Material</article-title>
          ,
          <source>IEEE Sensors Journal</source>
          , vol.
          <volume>19</volume>
          , no.
          <issue>2</issue>
          ,
          <issue>2019</issue>
          , pp.
          <fpage>735</fpage>
          -
          <lpage>742</lpage>
          . doi:
          <volume>10</volume>
          .1109/JSEN.
          <year>2018</year>
          .
          <volume>2877726</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Fu</surname>
          </string-name>
          , G. Ning,
          <article-title>Barker coded excitation using pseudo chirp carrier with pulse compression filter for ultrasound imaging</article-title>
          ,
          <source>in: BIBE 2018; International Conference on Biological Information and Biomedical Engineering</source>
          , Shanghai, China,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>