<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>X (O. Riznyk);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Information in image using ideal ring bundles⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleg Riznyk</string-name>
          <email>oleh.y.riznyk@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Kynash</string-name>
          <email>yurii.y.kynash@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The article presents the use of information coding using the least significant bit of an image using a numerical linear-radial model. The application of technology, where images are used as a container, offers much more possibilities than text documents. Using image formats allows you to hide not only text messages, but also other images and files. For this, the use of technology based on the numerical beam is effective. This technology involves the replacement of some image pixels, which makes it possible to create efficient encoding and decoding algorithms that allow detecting up to 50% and correcting up to 25% of distorted pixels. The results of this work show the effectiveness of the proposed approach, both for graphic files and for text messages.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;ideal ring bundle</kwd>
        <kwd>least meaningful bit</kwd>
        <kwd>non-equidistant code</kwd>
        <kwd>numeric line bundle 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        media;
information;
the increasing use of modern information technologies, the scale and diversity of the
information dissemination process, a significant increase in the number of appropriate
equipment;
information processing methods;
increasing the level of trust and wider involvement of automated management systems and
the involvement of a significant number of people and enterprises in the process of
information activities, the rapid increase of their information needs, the intensification of the
flow of information between the participants of the process;
concentration of large volumes of information with different purposes using electronic
the use of information as a commodity, where there is competition on a market basis in the
provision of information services and industrial espionage is possible;
emergence of various threats and detection of new channels with unauthorized access to
•
a significant increase in the number of skilled computer users who can potentially be
involved in the process of creating malicious software and mathematical operations in
information processing systems;
the presence of market relations in the software development process, including in relation
to means of information protection [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ].
      </p>
      <p>
        Modern requirements acutely raise the issue of preserving the confidentiality of information.
Information security is important in various cyber-physical systems [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4-6</xref>
        ] and when using wireless
sensor networks in smart systems [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Many different methods are used to protect information. A
reliable method of protecting information is to hide part of the information in the image. This is
important, for example, when ensuring reliable storage of patient records on computers in hospitals
and when transferring them over unsecured networks [
        <xref ref-type="bibr" rid="ref8 ref9">8,9</xref>
        ].
      </p>
      <p>
        One of the methods of image protection uses the principle of replacing a certain image color with
a similar color. In the process of this replacement, the program replaces some pixels, and for this you
need to calculate their location. This is a pretty good approach, as it will be difficult to determine the
hiding technology for the text. It is worth noting that this approach can be applied not only to the
textual information on the image, but also to the image itself. To do this, you need to place one image
inside another image [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>The application of the technology of using an image as a container provides significantly more
opportunities compared to processing only text documents. The use of graphic formats makes it
possible to hide, in addition to text messages, other images, as well as files. At the same time, an
important condition is the size of the hidden image, which should not exceed the size of the storage
image. That is why replacing some pixels in the image is an effective solution.</p>
      <p>The rest of this study is structured as follows: in the second section, a literature review was
conducted on studies of the use of Barker and Golay codes, and the issue of image file protection
algorithms is discussed.</p>
      <p>The methods and proposed model used in this paper are presented in the third section. The fourth
chapter presents the results of the research, where there is a comparison of the proposed method
with other known methods. Finally, in the conclusion section, the main results of the study are stated
and the advantages of using the proposed method are indicated.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>
        Coding of information is used in various applied tasks. For example, paper [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] presents a hybrid
coded method for an ultrasonic testing system, which uses a convolution of the Barker code and a
pair of Golay codes. The combination of these two coding methods increases the flexibility of the
code length. The use of a hybrid code for the excitation of directional waves showed a significant
improvement in the signal-to-noise ratio and the peak level of the side lobes. A similar combination
of convolution of Barker and Goley codes as coded excitation signals for low-voltage ultrasonic
control devices was used in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], Barker codes are used in micro-computed tomography
(micro-CT) to obtain micro-CT images and a k-wave toolkit-based micro-CT model is proposed that
can visualize the microstructures of trabecular bone. The issue of effective use of Barker codes is also
considered in the studies of other authors [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ].
      </p>
      <p>This article deals with the problem of information failures caused by the following factors:
•
•
•
•
•
an increase in the number of computer users;
a large volume of information rotation;
a variety of information carriers;
an increase in the value of digital information;
an increase in the types of threats.</p>
      <p>
        The main focus of this article is on graphics files, as they are quite common at the moment. The
rapid development of image compression algorithms led to changes in ideas about the mechanism of
implementation of secret information. In papers [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ], the authors propose to include information
in lower bits to reduce its visibility to an outside observer.
      </p>
      <p>So, the least significant bit (LMB) method. This is one of the simplest methods of digital
steganography. The specified method will be used to hide data with container distortion, where the
peculiarities of human perception are taken into account.</p>
      <p>The main idea of the method is as follows: we take a photo in BMP format, where it is best to use
TrueColor in 24-bit format, and change the smallest color particles so that it remains unnoticed by
the eye. The question arises, why use 24 bits. This is caused by one of the important factors of the
container volume, that is, what can be squeezed into the image so that the image becomes sharp.
From this follows the logical conclusion that the size of the container determines the volume of what
it can contain.</p>
      <p>Therefore, modern 24-bit BMP files are most suitable for these tasks. This format assumes that
three bytes are allocated to each point of the image, each of which contains information about its
red, green and blue components, that is, we have a total of 3x8=24 bits.</p>
      <p>The procedure for adding a secret message looks like this:
•
select a message, perform its preliminary preparation: encrypt and archive. The result of
these actions is the achievement of two goals at once: reducing the size and increasing the
stability of the system;
the next step is to select a container and process the message from the previous point, in its
lower bits, in any convenient way.</p>
      <sec id="sec-2-1">
        <title>The easiest way to implement is:</title>
        <p>•
•
decompose the packed message according to the sequence of bits;
using a certain algorithm, the extra bits of the container are replaced with message bits.</p>
        <p>For the actions specified at this stage, most existing algorithms have a significant error [18, 19].
The degree of reliability of the specified implementation will strongly depend on the nature of the
distribution of the least significant bit in the container, as well as in the message [20, 21]. For the
vast majority of cases, we get different distributions in different grades [22, 23]. In the case of images
built using binary codes, we will get a more or less uniform distribution of "0" and "1" in the lower
bits, and therefore such actions can be noticed even visually by eye.</p>
        <p>The main goal of the work is the pseudo-random distribution of the smallest bit based on ideal
ring bundles. The research objectives are to use ideal ring bundles to encode and decode the smallest
bit with the ability to find and repair damaged pixels. Therefore, an important task is the selection
of the LCM distribution [24-26].</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Improvement of the method</title>
      <p>It is proposed to use the combinatorial numerical model of the ideal ruler bundle (IRB) for the
LMBdecomposition [27].</p>
      <p>The ideal ruler bundle with parameters (  ,  ,  ) – is an algebraic structure formed by a sequence
of  positive integers, the values of which, as well as the values of the sums for adjacent numbers
placed between each other, exhaust the number of natural numbers no more than once ( = 1). The
elements of the IRB are located one after another in the form of a chain, and their sum is equal to  
[28].</p>
      <p>IRB is the maximal combinatorial diversity of a system of integers  1,  2, … ,   subject to the
arithmetic operation of addition with the restriction on the addition rule: only adjacent numbers can
be added. Consider the following structure of a line, where the condition that the numbers are
arranged in a line and characterized by the following numerical set of elements (1) [27] is fulfilled:
 1,  2, … ,   ;
 1 +  3,  2 +  3, … ,   −1 +   ; (1)
 1 +  2 +  3,  2 +  3 +  4, … ,   −2 +   −1 +   ;</p>
      <p>1 +  2 + ⋯ +  .</p>
      <p>Let's consider the main steps of the algorithm for encoding each pixel of an image from ASCII
codes to IKV-based codes. To solve this problem, it is necessary to find an optimal combinatorial
variant of chain powers, in which any natural number can be determined in a unique way [28, 29].
Since an encoding is used for an ASCII code table with 256 codes, but no packets are found for the
sum of 256, then for example the following IRBs (283, 20, 1) should be used [28]. Based on the input
data, you need to create an array of codes. This set consists of an array, where each element has the
following form (0, 0, ..., 0, 0):
•
•
we take the serial number of the symbol from the selected alphabet, if this number is between
the communication elements of the bundle, then “1” will be written into the array element,
at the position of the necessary communication element of the bundle;
if the specified serial number is not in the table, then "1" will be placed on the position of the
package elements that give the required amount. It should be kept in mind that such
summation will be performed according to the rules defined for the IRB.</p>
      <p>The next steps are to read from the symbol file of the source information, then the number of the
symbol to be read in the given alphabet will be determined, the code corresponding to the specific
given number will be determined. This code will be stored in an intermediate file. Next, the code
from the intermediate file will be sequentially added to the low-order RGB bits of the BMP file.</p>
      <p>Consider the proposed coding process using the following example: IRB (11, 4, 1)=(3, 1, 5, 2). The
selected alphabet consists of 11 characters. Hence, the IRB-based code table would look like this:
№1 0 1 0 0 №6 0 1 1 0
№2 0 0 0 1 №7 0 0 1 1
№3 1 0 0 0 №8 0 1 1 1
№4 1 1 0 0 №9 1 1 1 0
№5 0 0 1 0 №11 1 1 1 1</p>
      <p>The characters of the alphabet will be indicated by serial numbers. So, for example, the message
(11 2 4 1) will be encoded as shown below:
1111 0001 1100 0100
This sequence will be in the intermediate file.</p>
      <p>When performing the decoding procedure of such an image, the output values of the least
significant RGB bits in the BMP file will be calculated from the sequence of the least significant RGB
bits in the BMP file, and then it will be necessary to read a sequence of n symbols in the order of n
IRB. To read n characters, we select the IRB code table in which the encoding of the ASCII alphabet
character was performed, and finally get the result file.</p>
      <p>To solve the problem of preventing the loss of digital data, it is necessary to create an effective
interference-resistant code based on an ideal ring beam to ensure reliable protection and recovery of
information [29]. The corresponding software product uses the generated code as a basis in the
procedure of encoding and decoding information [28].</p>
      <p>A set of ideal ring bundles (IRB) is a cyclic sequence of numbers in which all possible cyclic sums
exhaust the values of natural numbers from 1 to   =  ( − 1) [29] (Fig.1).</p>
      <p>The corresponding structure based on ideal ring bundles is shown in Figure 2.
The following values are used here:  = 4,</p>
      <p>= 2.</p>
      <p>Length of the code sequence is determined as follows:</p>
      <sec id="sec-3-1">
        <title>Number of the detected errors is determined as follows:</title>
        <p>Number of the detected errors is determined as follows:
  =
 ( − 1)

sequence, procedures for adding inverse sequences, sequences of zeros and ones, and performing a
bit parity check [29], as shown in Figure 3.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Let's consider the decryption and error correction scheme [30].</title>
        <p>Next, we need to perform a comparison between the input sequence and the encoding alphabet.</p>
      </sec>
      <sec id="sec-3-3">
        <title>The most similar sequence will be correct, as shown in Figure 4.</title>
        <p>We will use the schemes presented in Figure 3 and Figure 4 to test methods of encoding, decoding
and error correction.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Results</title>
      <p>Let's consider the results obtained by our method and compare them with other known methods.
The comparison was made according to each of the methods, which are based on
interferencetolerant coding, taking into account the redundancy, the number of found and corrected damaged
pixels. A comparison with existing solutions [29] is shown in Figure 5. We see a comparison of our
approach with methods BCH, Hemmings and Non-equidistant.</p>
      <sec id="sec-4-1">
        <title>The number of errors, which are being fixed shown in Figure 6.</title>
        <p>The results of the performed numerical calculations with corrected errors are shown in Table 2.
Here, the results of the calculations for our method, as well as for the methods Non-equidistant,
Hemmings and BCH are presented.</p>
        <p>N
3</p>
        <p>Accordingly, the results of the numerical calculation of the power of the code for our method,
Non-equidistant and BCH are shown in Table 3.</p>
        <p>In this way, a software product that simulates error-tolerant code based on IRB has been
implemented. When running the check on the graphics file, the following results were obtained: the
number of errors fixed was 12118, the number of errors introduced was 13465. The maximum
percentage of damage was 20%, and the damage was 15%. When using a text file, the following results
were obtained: the number of errors that were corrected - 541, the number of errors that were
introduced - 570. For the text file, the maximum percentage of damage was within 75%, damage
reached 60%.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>The developed coding method based on ideal ring bundles has high redundancy (the length of the
output code is more than twice the input code) compared to other methods, but this is a price to pay
for the ability to detect up to 50% and correct up to 25% of errors.</p>
      <p>The article provides a comparative analysis of error-tolerant code based on IRB with other known
methods. The main contribution of this work is as follows:
•
•
•
the only previously unreported case of improving non-equidistant codes is presented;
an error-correcting code model is developed based on ideal ring rays, which allows correcting
up to 25% of errors in a code word;
an improved method of an error-correcting code with a non-equidistant structure,
introducing information symbols into the code sequence.</p>
      <p>The advantage of the coding method based on ideal ring rays is high false stability of the code. In
the developed coding method based on ideal ring rays, high redundancy is corrected compared to a
non-equidistant code sequence. Due to its properties, this coding method is able to compete with
wellknown Hamming and BCH code solutions on the market. This solution can be used in many areas,
both for personal use of users and for recording important data with the ability to preserve their
integrity.</p>
      <p>Thus, the possibility of coding information in an image using IRB models was demonstrated,
creating effective coding and decoding algorithms. The study of combinatorial optimization models
and methods expands the scope of practical application of linear rays in computer science problems
and the design of reliable coding systems.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <sec id="sec-6-1">
        <title>The authors have not employed any Generative AI tools.</title>
        <p>[18] O. I. Berngardt, A. L. Voronov, K. V. Grkovich, Optimal signals of Golomb ruler class for spectral
measurements at EKB SuperDARN radar: Theory and experiment, Radio Science 50, no. 6 (2015)
486-500. doi: 10.1002/2014RS005589.
[19] O. Oshiga, S. Severi, G. T. F. de Abreu, Superresolution Multipoint Ranging With Optimized
Sampling via Orthogonally Designed Golomb Rulers, IEEE Transactions on Wireless
Communications 15, no. 1 (2016) 267-282. doi:10.1109/TWC.2015.2470687.
[20] C. A. Martos Ojeda, L. M. Delgado Ordoñez, C. A. Trujillo Solarte, Bh Sets as a Generalization
of Golomb Rulers, IEEE Access 9 (2021) 118042-118050. doi:10.1109/ACCESS.2021.3106617.
[21] D. Kim, I. Kim, H. Cho, H. Choi, H. -Y. Song, Performance Analysis of QC-LDPC codes
constructed by using Golomb rulers, in: 2022 27th Asia Pacific Conference on
Communications (APCC), Jeju Island, Korea, Republic of, 2022, pp. 301-302.
doi:10.1109/APCC55198.2022.9943662.
[22] D. Kim, H. Choi, H. -Y. Song, QC-LDPC codes from various Golomb Rulers, in: 2023 14th
International Conference on Information and Communication Technology Convergence
(ICTC), Jeju Island, Korea, Republic of, 2023, pp. 106-110.
doi:10.1109/ICTC58733.2023.10392287.
[23] S. Priambodo, A. Hambali, B. Pamukti, P. P. Melati, R. F. Putra, Evaluation of Optimum Golomb
Ruler Performance for NG-PON2 Networks, in: 2019 4th International Conference on
Information Technology, Information Systems and Electrical Engineering (ICITISEE),
Indonesia, 2019, pp. 1-5. doi: 10.1109/ICITISEE48480.2019.9003907.
[24] J. Vyas, S. Bansal, K. Sharma, Generation of optimal Golomb rulers for FWM crosstalk
reduction: BB-BC and FA approaches, in: 2016 International Conference on Signal Processing
and Communication (ICSC), Noida, India, 2016, pp. 74-78. doi:
10.1109/ICSPCom.2016.7980551.
[25] C. A. M. Ojeda, D. F. D. Urbano, C. A. T. Solarte, Near-Optimal g-Golomb Rulers, IEEE Access 9
(2021) 65482-65489. doi:10.1109/ACCESS.2021.3075877.
[26] D. F. D. Urbano, C. A. M. Ojeda, C. A. T. Solarte, lmost Difference Sets From Singer Type Golomb</p>
        <p>Rulers, IEEE Access 10 (2022) 1132-1137. doi:10.1109/ACCESS.2021.3137996.
[27] I. Tsmots, O. Riznyk, V. Rabyk, Y. Kynash, N. Kustra, M. Logoida, Implementation of fpga-based
barker’s-like codes, in: V. Lytvynenko, S. Babichev, W. Wójcik, O. Vynokurova, S.
Vyshemyrskaya, S. Radetskaya (Eds), Lecture Notes in Computational Intelligence and Decision
Making (ISDMCI 2019), volume 1020 of Advances in Intelligent Systems and Computing,
Springer, Cham, 2020, pp. 203–214. doi: 10.1007/978-3-030-26474-1_15.
[28] I. Tsmots, V. Rabyk, O. Riznyk, Y. Kynash, Method of Synthesis and Practical Realization of
Quasi-Barker Codes, in: 2019 IEEE 14th International Scientific and Technical Conference on
Computer Sciences and Information Technologies (CSIT), Lviv, Ukraine, 2019, pp. 76-79.
doi:10.1109/STC-CSIT.2019.8929882.
[29] O. Riznyk, N. Kustra, Y. Kynash, R. Vynnychuk, Method of Constructing Barker-Like Sequence
on the Basis of Ideal Ring Bundle Families, in: 2019 IEEE International Scientific-Practical
Conference Problems of Infocommunications, Science and Technology (PIC S&amp;T), Kyiv,
Ukraine, 2019, pp. 207-211. doi:10.1109/PICST47496.2019.9061375.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zou</surname>
          </string-name>
          , G. Liu,
          <article-title>A Low-Complexity Security Scheme for Drone Communication Based on PUF and LDPC</article-title>
          ,
          <source>Drones</source>
          <volume>8</volume>
          (
          <year>2024</year>
          )
          <article-title>472</article-title>
          . doi:
          <volume>10</volume>
          .3390/drones8090472.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>AMN</given-names>
            <surname>Aljalai</surname>
          </string-name>
          , C. Feng, VCM Leung,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ward</surname>
          </string-name>
          ,
          <article-title>Improving the energy efficiency of dft-s-ofdm in uplink massive mimo with barker codes</article-title>
          ,
          <source>in 2020 International Conference on Computing, Networking and Communications (ICNC)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>731</fpage>
          -
          <lpage>735</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICNC47757.
          <year>2020</year>
          .
          <volume>9049829</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Fu</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. Ning.</surname>
          </string-name>
          <article-title>Barker coded excitation using pseudo chirp carrier with pulse compression filter for ultrasound imaging</article-title>
          ,
          <source>in: BIBE 2018 International Conference on Biological Information and Biomedical Engineering</source>
          , Shanghai, China,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Calabro</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Cambiaso</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Cheminod</surname>
            ,
            <given-names>I.C.</given-names>
          </string-name>
          <string-name>
            <surname>Bertolotti</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Durante</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Forestiero</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Lombardi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Manco</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Marchetti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Orlando</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <article-title>Papuzzo, A Methodological Approach to Securing CyberPhysical Systems for Critical Infrastructures</article-title>
          ,
          <source>Future Internet</source>
          <volume>16</volume>
          (
          <year>2024</year>
          )
          <article-title>418</article-title>
          . doi:
          <volume>10</volume>
          .3390/fi16110418.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>T.</given-names>
            <surname>Hovorushchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Baranovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ivanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hnatchuk</surname>
          </string-name>
          ,
          <article-title>Subsystem for monitoring atmospheric air quality in the cyber-physical system "Smart City"</article-title>
          , in: T. Hovorushchenko (Eds),
          <source>Computer Systems and Information Technologies no 1</source>
          (
          <year>2024</year>
          )
          <fpage>17</fpage>
          -
          <lpage>26</lpage>
          . doi:
          <volume>10</volume>
          .31891/csit2024-1-2.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Pinto</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.M.B. Torres</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Lohweg</surname>
          </string-name>
          , Closing Editorial:
          <article-title>Advances and Future Directions in Autonomous Systems for Cyber-Physical Systems</article-title>
          and Smart Industry, Appl. Sci.
          <volume>14</volume>
          (
          <year>2024</year>
          )
          <article-title>10673</article-title>
          . doi:
          <volume>10</volume>
          .3390/app142210673.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Riznyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kynash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kustra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kuharchuk</surname>
          </string-name>
          ,
          <article-title>Construction of security smart systems using wireless sensor networks</article-title>
          ,
          <source>in: 2023 IEEE 18th International Conference on Computer Science and Information Technologies (CSIT)</source>
          , Lviv, Ukraine,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/CSIT61576.
          <year>2023</year>
          .
          <volume>10324230</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cong</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Zhang,</surname>
          </string-name>
          <article-title>Pseudo Chirp-Barker-Golay coded excitation in ultrasound imaging, in: 2018 Chinese Control And Decision Conference (CCDC)</article-title>
          , Shenyang,
          <year>2018</year>
          , pp.
          <fpage>4035</fpage>
          -
          <lpage>4039</lpage>
          . doi:
          <volume>10</volume>
          .1109/CCDC.
          <year>2018</year>
          .
          <volume>8407824</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          , P. He,
          <source>Research on Low Intercepting Radar Waveform Based on LFM and Barker Code Composite Modulation, in: 2018 International Conference on Sensor Networks and Signal Processing (SNSP)</source>
          ,
          <source>Xi'an, China</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>297</fpage>
          -
          <lpage>301</lpage>
          . doi:
          <volume>10</volume>
          .1109/SNSP.
          <year>2018</year>
          .
          <volume>00064</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Xia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Application of Pulse Compression Technology in Electromagnetic Ultrasonic Thickness Measurement</article-title>
          , in: 2018
          <source>IEEE Far East NDT New Technology &amp; Application Forum (FENDT)</source>
          , Xiamen, China,
          <year>2018</year>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>41</lpage>
          . doi:
          <volume>10</volume>
          .1109/FENDT.
          <year>2018</year>
          .
          <volume>8681975</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Niu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Miao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Meng</surname>
          </string-name>
          ,
          <article-title>Hybrid Coded Excitation of the Torsional GuidedWave Mode T(0,1) for Oil and Gas Pipeline Inspection</article-title>
          ,
          <source>Applied Science</source>
          <volume>12</volume>
          (
          <year>2022</year>
          )
          <article-title>777</article-title>
          . doi:
          <volume>10</volume>
          .3390/app12020777.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rudlin</surname>
          </string-name>
          , G. Asfis,
          <string-name>
            <given-names>H.</given-names>
            <surname>Meng</surname>
          </string-name>
          .
          <source>Convolution of Barker and Golay Codes for Low Voltage Ultrasonic Testing Technologies</source>
          <year>2019</year>
          ,
          <volume>7</volume>
          , 72; doi:10.3390/technologies7040072.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. Zhang,</surname>
          </string-name>
          <article-title>Transcranial Ultrasonic Focusing by a Phased Array Based on Micro-CT Images</article-title>
          ,
          <source>Sensors</source>
          <volume>23</volume>
          (
          <year>2023</year>
          )
          <article-title>9702</article-title>
          . doi:0.3390/s23249702.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.C.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.C.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <article-title>An Ultrasonic Object Detection Applying the ID Based on Spread Spectrum Technique for a Vehicle</article-title>
          ,
          <source>Sensors</source>
          <volume>20</volume>
          (
          <year>2020</year>
          )
          <article-title>414</article-title>
          . doi:
          <volume>10</volume>
          .3390/s20020414.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.M.</given-names>
            <surname>Duong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Vesely</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hubacek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Janu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.G.</given-names>
            <surname>Phan</surname>
          </string-name>
          ,
          <article-title>Detection and Parameter Estimation Analysis of Binary Shift Keying Signals in High Noise Environments</article-title>
          ,
          <source>Sensors</source>
          <volume>22</volume>
          (
          <year>2022</year>
          )
          <article-title>3203</article-title>
          . doi:
          <volume>10</volume>
          .3390/s22093203.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yang</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>Photonic Generation of Barker-code Phase-Coded Terahertz Signals</article-title>
          , in: 2021 46th International Conference on Infrared, Millimeter and Terahertz
          <string-name>
            <surname>Waves (IRMMW-THz</surname>
            <given-names>)</given-names>
          </string-name>
          ,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          . doi:
          <volume>10</volume>
          .1109/IRMMWTHz50926.
          <year>2021</year>
          .
          <volume>9567054</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>N.</given-names>
            <surname>Memarsadeghi</surname>
          </string-name>
          ,
          <source>NASA Computational Case Study: Golomb Rulers and Their Applications</source>
          ,
          <source>Computing in Science &amp; Engineering</source>
          <volume>18</volume>
          , no.
          <issue>6</issue>
          (
          <year>2016</year>
          )
          <fpage>58</fpage>
          -
          <lpage>62</lpage>
          . doi:
          <volume>10</volume>
          .1109/
          <string-name>
            <surname>MCSE</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <volume>118</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>