<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>A. Baikenov);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Research of the effectiveness of frame synchronization methods for creating markerless telecommunication systems for exchanging short packets</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alimzhan Baikenov</string-name>
          <email>a.baikenov@aues.kz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Emil Faure</string-name>
          <email>e.faure@chdtu.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sakhybay Tynymbayev</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olga Abramkina</string-name>
          <email>olga.manank@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artem Skutskyi</string-name>
          <email>a.b.skutskyi.asp21@chdtu.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Almaty University of Power Engineering and Telecommunications name after Gumarbek Daukeev</institution>
          ,
          <addr-line>Baitursynov 126/1, 050013, Almaty</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Cherkasy State Technological University</institution>
          ,
          <addr-line>Shevchenko Blvd. 460, 18006, Cherkasy</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>International Information Technology University</institution>
          ,
          <addr-line>34/1 Manas St., Almaty, 050000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2046</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>This paper investigates synchronization techniques for developing markerless telecommunication systems. In such systems, explicit markers are eliminated, which minimizes the amount of overhead. Markerless systems outperform traditional systems in tasks requiring high response speed and low latency. One of the key components of such systems is frame synchronization, which ensures correct identification and decoding of data packets at the receiving end without using explicit markers indicating the beginning or end of a packet. The study focuses on the effectiveness of frame synchronization techniques, since the accuracy and reliability of these techniques significantly affect the overall performance and stability of the system. Traditional synchronization techniques such as time synchronization, block counters, and checksums are analyzed. In addition, a new factorial coding technique is proposed that eliminates the need for explicit markers, thereby reducing the overhead and improving the channel efficiency. The results show that factorial coding improves synchronization accuracy, reduces latency, and provides better resilience to interference, making it a promising approach for next-generation markerless telecommunication systems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Markerless telecommunication systems</kwd>
        <kwd>frame synchronization</kwd>
        <kwd>efficiency</kwd>
        <kwd>bit error rate</kwd>
        <kwd>factorial coding</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Modern telecommunication systems are characterized by growing requirements for data transfer
speed, reliability and efficiency of network resource use. In the context of increasing traffic volumes
and the diversity of transmitted data, the task of developing methods that ensure fast and reliable
information transfer with minimal delays is becoming especially urgent [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1,2,3</xref>
        ].
      </p>
      <p>
        These methods are a combination of various technologies and approaches aimed at optimizing
data transfer processes in telecommunication systems [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4,5,6</xref>
        ].
      </p>
      <p>
        The main methods that are most often used include frame synchronization [
        <xref ref-type="bibr" rid="ref7 ref8">7,8,9</xref>
        ], adaptive coding
and modulation [10, 11, 12], error correction methods [13,14], protocols with low response time
[15,16,17]. When comparing these methods for ensuring fast and reliable data transmission with
minimal delays in telecommunication systems, it becomes clear that each of them has its own unique
advantages and disadvantages that affect their effectiveness in different usage scenarios [18]. Frame
synchronization minimizes the amount of service information, which allows for an increase in the
data transfer rate, but it can be sensitive to interference, which makes it difficult to operate in
unstable networks. Adaptive coding and modulation, on the contrary, flexibly adapt to channel
conditions, providing a balance between speed and reliability, but require more complex control
algorithms and can cause delays due to constant monitoring of the channel state. Foreground error
correction (FEC) methods increase the reliability of data transmission due to the ability to detect and
correct errors at the receiving end, but at the same time increase the amount of transmitted data by
adding redundancy, which reduces the efficiency of bandwidth use. Low response time (RTT)
protocols, on the other hand, are optimized for fast exchange of short messages, which minimizes
response time and improves real-time performance, but may be less effective in high-noise
environments than other methods that provide greater immunity to distortion.
      </p>
      <p>It is worth noting that these methods are based on the principle of using explicit markers to
indicate the beginning and end of packets, error correction and other mechanisms that are most often
used in traditional telecommunication systems. These systems were developed to ensure reliable and
predictable data transmission in conditions of limited bandwidth and exposure of communication
channels to various types of interference. Particular attention is paid to frame synchronization, since
in traditional systems it ensures correct recognition of data packet boundaries. This is especially
important for preventing errors associated with the loss or distortion of markers, which could lead to
misinterpretation of data on the receiving side. Frame synchronization also helps traditional systems
cope with noise and interference in the communication channel. Frame-level synchronization allows
the system to quickly restore synchronization after errors occur, which improves the overall
reliability of data transmission [19,20,21]. Many standardized communication protocols, such as
Ethernet, GSM or Wi-Fi, use frame synchronization methods to ensure compatibility and reliability.
These protocols are designed to operate in a variety of conditions and include time-tested methods
such as the use of markers and checksums [22]. Frame synchronization in traditional systems is
usually well documented and supported by a wide range of hardware and software. This simplifies
the development and implementation of telecommunications systems, and ensures compatibility
between different devices and networks.</p>
      <p>However, if we consider traditional systems, there is a high probability of errors, interference and
data loss.</p>
      <p>The article proposes to study code synchronization methods for creating markerless systems.
Such systems do not have explicit markers, which allows minimizing the amount of service
information. Markerless systems outperform traditional ones in tasks that require high efficiency and
low delays. One of the key components of such systems is frame synchronization, which ensures
correct recognition and decoding of data packets on the receiving side without using explicit markers
indicating the beginning and end of the packet.</p>
      <p>The study of the efficiency of frame synchronization methods plays an important role in the
creation of markerless telecommunication systems, since the overall performance and stability of the
system depend on the accuracy and reliability of these methods. In this paper, the frame
synchronization efficiency indicator is considered. Frame synchronization efficiency is understood as
the ability of the system to correctly recognize the beginning and end of data frames in the
information flow. Traditional frame synchronization methods, such as time synchronization, block
counters and the use of checksums, are studied. A method with factorial coding is proposed that does
not require explicit markers, which will reduce the amount of service information and increase the
efficiency of channel use.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Methodology</title>
      <p>The study of the efficiency of frame synchronization methods for markerless telecommunication
systems was carried out in several stages. The main attention was paid to the comparative analysis of
traditional frame synchronization methods, such as time synchronization, block counters and the use
of checksums and the factorial coding method.</p>
      <p>At the first stage, key performance indicators of frame synchronization methods were determined,
such as the noise level in the communication channel, bandwidth, and delays. The ability to
dynamically change these parameters during experiments was also implemented to assess the
stability of the methods to various transmission conditions.</p>
      <p>At the second stage, modeling and data collection were carried out according to the selected
parameters. The experimental setup includes software for modeling a telecommunication system and
physical equipment, including computers and network devices connected through a configured
switch. The software imitated data transmission between network nodes using the developed frame
synchronization algorithm and factorial coding in the MATHLAB environment.</p>
      <p>The third stage includes the analysis of data transmission results and the construction of an
efficiency graph for each method.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Experimentation</title>
      <sec id="sec-3-1">
        <title>3.1. Time synchronization</title>
        <p>Time synchronization ensures that time is coordinated between network nodes so that all
participants in the data transfer process have the same time scale. The choice of parameters is shown
in Figure 1, which includes the number of sending data blocks, the size of each data block, and the
time interval between data blocks per second.</p>
        <p>The principle of the method is important for preventing data transmission collisions and reducing
errors. In simulation, this method shows high efficiency under stable network conditions, but its
performance noticeably decreased with increasing time delays in the communication channel (Figure
2).</p>
        <sec id="sec-3-1-1">
          <title>The bit error dependence is shown in Figure 3.</title>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Block counters</title>
        <p>The "block counters" method allows tracking the serial numbers of transmitted data blocks. This
approach ensures reliable synchronization even in conditions of significant interference, but requires
complex algorithms for processing erroneous or lost blocks.</p>
        <p>Here, the main parameters for data generation are set: the number of blocks (numBlocks) and the
size of each block in elements (blockSize). These parameters determine the volume and structure of
data for the experiment (Figure 4).</p>
        <p>The generated data block with a counter is added to the general array “allDataWithCounters”. After
generating and adding all data blocks to the general array, the data is sorted by the first column,
which contains the block counters, using the “sortrows” function (Figure 5).</p>
        <p>This allows the original sequence of blocks to be restored, even if they were “received” in a
different order.</p>
        <p>The code then outputs the sorted data blocks, showing their counters and contents, allowing the
synchronization result to be visually seen (Figure 6).</p>
        <sec id="sec-3-2-1">
          <title>The bit error dependence is shown in Figure 7.</title>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Using checksums</title>
        <p>In the synchronization method, "checksums" are used to confirm the integrity of blocks and their
correct order [22,23]. The choice of parameters is shown in Figure 8.</p>
        <p>This method showed high efficiency in detecting and correcting errors, but its performance depended
on the checksum calculation algorithm. Initialization of the array for storing data blocks with
checksums is shown in Figure 9.</p>
        <p>Displaying all generated data blocks together with their checksums, simulating the process of
their “sending” (Figure 10).</p>
        <p>When diagnosing network or file problems, checksums can help determine whether an error
occurred during data transmission or not (Figure 11).</p>
        <sec id="sec-3-3-1">
          <title>The bit error dependence is shown in Figure 12.</title>
        </sec>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Frame synchronization of inseparable factorial code</title>
        <p>Inseparable factorial coding telecommunication systems [24] use non-standard and redundant frame
structures that do not provide a separate SFD field and can perform a transport function for
transmitting short packets [25]. Since the lengths of all code words in an inseparable factorial code
are equal, frame synchronization methods use a permutation of elements  and M. The method
proposed in [24] complements the processing of binary symbols obtained from the communication
channel using a majority gate or n -bit majority scheme with correlation processing [26].
numbers in a set
each element in this set with bits</p>
        <p>In this paper, the frame synchronization system uses a permutation , which is a sequence of
. A fixed-length binary code is used to encode
,
as shown in Table I[24].</p>
        <sec id="sec-3-4-1">
          <title>Decimal notation</title>
        </sec>
        <sec id="sec-3-4-2">
          <title>Binary notation</title>
        </sec>
        <sec id="sec-3-4-3">
          <title>Decimal notation Binary notation 0 1</title>
          <p>2
3
4
5
6
7
0000
0001
0010
0011
0100
0101
0110
0111
8
9
10
11
12
12
14
15</p>
          <p>According to [24], the criterion for choosing a synchronization word is the maximum value of the
minimum Hamming distance between the binary representation of the permutation and each of its
circular shifts. The correct synchronization probability [24] is:</p>
        </sec>
        <sec id="sec-3-4-4">
          <title>The probability of false synchronization [26] is:</title>
          <p>The method of frame synchronization of an inseparable factorial code with a bit error probability
close to 0.5 uses a comprehensive approach, including both theoretical modeling and practical
implementation in the MATHLAB programming language. The initial data of the experiment are
presented in Figure 13.</p>
          <p>The probability of bit error (“P_e”) is set at 0.49 to get closer to the critical value of 0.5.</p>
          <p>These parameters were chosen based on the need to clearly demonstrate the operation of the
developed methods under high noise conditions (Figure 14).</p>
          <p>For each data block, a checksum is calculated, which includes the sum of the values of the data
block bits and their ordinal numbers, taken modulo 256. This allows for increased reliability of error
detection by taking into account not only the states of the bits, but also their positions in the block.</p>
          <p>The checksums are compared for the original and received data blocks. A discrepancy between the
checksums indicates the presence of errors, after which the counter of detected errors
“errorsDetected” is incremented (Figure 15).</p>
          <p>At the end, the total number of detected errors relative to the total number of sent data blocks is
output. This gives an idea of the effectiveness of the used checksum method under high probability
conditions.</p>
          <p>Assuming that there is noise in the communication channel, which affects the probability of an
error in the transmission of individual bits, we set the task of determining the probability of
successful synchronization of data blocks for different noise levels.</p>
          <p>The key parameters for the simulation were:
The probability of a bit error in the channel (P_e), varied from 0 to 0.5;
The size of the data block (S), equal to 256 bits;
The number of data blocks (N), equal to 1000.</p>
          <p>Based on the results obtained, it was found that with an increase in the probability of a bit error,
the probability of successful synchronization of a data block decreases significantly. The graph
generated by the code (Figure 16) demonstrated an inversely proportional dependence of the
probability of successful synchronization on the probability of a bit error.</p>
          <p>In particular, when “P_e” was equal to 0.1, the probability of successful synchronization was quite
high, but when “P_e” approached 0.5, the probability of successful synchronization tended to zero.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Analysis of results</title>
      <p>After performing a series of experiments for each synchronization method, a comparison of their
efficiency was carried out (Figure 18).</p>
      <p>In this paper, efficiency is considered as the probabilities of correct and false synchronization.</p>
      <p>It was found that the checksum method showed the highest performance under conditions with a
bit error probability of up to 0.3. However, with a further increase in "P_e", its performance decreased
faster than that of the block counter method.</p>
      <p>The time synchronization method turned out to be the least effective due to its high sensitivity to
changes in data transmission delays, which was especially noticeable at high "P_e".</p>
      <p>Block counters demonstrated the best overall error tolerance under conditions of high error
probability, maintaining relatively high performance even at "P_e" close to 0.5.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>In this paper, several frame synchronization methods for creating markerless telecommunication
systems were investigated and analyzed. Traditional methods, such as time synchronization, block
counters and the use of checksums, have demonstrated their reliability in conditions with a moderate
level of interference and errors.</p>
      <p>The experiments and their analysis not only revealed the most effective synchronization methods
under conditions of high bit error probability, but also opened the way for future research aimed at
further improving the efficiency and reliability of data transmission.</p>
      <p>In the context of modern tasks that require high efficiency and minimal delays, traditional frame
synchronization methods may not be effective enough. Markerless systems, which do not use explicit
markers, offer significant advantages in these conditions.</p>
      <p>The main contribution of this work is the development and proposal of a factorial coding method
for frame synchronization in markerless systems. This method allows minimizing the amount of
service information, reducing redundancy, and allows transmitting more useful data, which is
especially important for high-speed communication systems. Thus, the proposed factorial coding
method is promising for tokenless communication systems and can significantly improve their
performance, especially in scenarios requiring high data rate and low latency.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgements</title>
      <p>This research has been/was/is funded by the Science Committee of the Ministry of Education and
Science of the Republic of Kazakhstan "AP23489168 Methods and protocols for secure information
exchange based on factorial coding of data and transformations in finite matrix fields."</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <sec id="sec-7-1">
        <title>The authors have not employed any Generative AI tools.</title>
        <p>[9] J. Hamkins, Frame synchronization without attached sync markers, in 2011 Aerospace</p>
        <p>Conference, pp. 1-7, 2011. doi: 10.1109/AERO.2011.5747327.
[10] D. Tarchi, G. Corazza, A. Vanelli‐Coralli, Adaptive coding and modulation techniques for next
generation hand-held mobile satellite communications, IEEE International Conference on
Communications (ICC), 9 June 2013. doi:10.1109/ICC.2013.6655277.
[11] S. Salih, M.M.A. Suliman, Implementation of adaptive modulation and coding techniques using</p>
        <p>Matlab, Proceedings ELMAR-2011, pp. 137-139, 2011.
[12] L. Srividya, P.N. Sudha, Adaptive Channel Coding to Enhance the Performance in Rayleigh
Channel, Int. J. of Adv. Comput. Sci. and Appl., vol. 15, no. 6, pp. 504–511, 2024. doi:
10.14569/IJACSA.2024.0150652.
[13] S. Kumari, L. Gahalod, S.Changlani, Study of Different Types of Error Detection and Correction
Code in Wireless Communication, Int. J. of Scientific Res. in Sci., Eng. and Tech., pp. 448-455,
2022. doi: 10.32628/IJSRSET2293138.
[14] P. Santini, M. Battaglioni, M. Baldi, and F.Chiaraluce, Analysis of the error correctioncapability
of LDPC and MDPC codes under parallelbit-flipping decoding and application tocryptography,
IEEE Trans. Communication, vol.68, no. 8, pp. 4648_4660, 2020.
[15] K. Pearson, On the criterion that a given system of deviations from the probable in the case of a
correlated system of variables is such that it can be reasonably supposed to have arisen from
random sampling, Philosophical Magazine, Series 5, vol. 50, no. 302, pp. 157–175, 1900.
[16] M.Z. Yakubova, O.A. Manankova, K.A. Tashev, K.A., G.S.Sadikova, Methodology of the
determining for Pearson's criterion based on researching the value of delays in the transmitting
of information over a multiservice network, 2020 International Conference on Information
Science and Communications Technologies, ICISCT 2020, 2020. doi:
10.1109/ICISCT50599.2020.9351419.
[17] B. Lee, S. Park, D. J. Love, H. Ji, and B. Shim, Packet Structure and Receiver Design for Low
Latency Wireless Communications With Ultra-Short Packets, in IEEE Transactions on
Communications, vol. 66, no. 2, pp. 796-807, Feb. 2018, doi: 10.1109/TCOMM.2017.2755012.
[18] E. Faure, A. Shcherba, B. Stupka, Permutation-based frame synchronisation method for short
packet communication systems, In: Proc. 11th IEEE Intl. Conf. on Intelligent Data Acquisition
and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland,
22-25 Sept., p. 1073–1077.
[19] E. Faure, V. Shvydkyi, A. Shcherba, O. Kharin, B. Stupka, Method of cyclic synchronization based
on permutations, Bull. Cherkasy State Technol. Uni., vol. 4, November 2020, pp. 67–76. doi:
10.24025/2306-4412.4.2020.222439.
[20] J. Al-Azzeh, E. Faure, A. Shcherba and B. Stupka, Permutation-based frame synchronization
method for data transmission systems with short packets, Egypt. Inform. J., vol. 23, no. 3,
September 2022, pp. 529–545. doi: 10.1016/j.eij.2022.05.005.
[21] E. Faure, A. Shcherba, Y. Vasiliu, and A. Fesenko, Cryptographic key exchange method for data
factorial coding, in CEUR Workshop Proceedings, vol. 2654, pp. 643-653, 2020.
[22] E. Faure, A. Shcherba, A. Kharin, Factorial code with a given number of inversions, Radio</p>
        <p>Electron. Comput. Sci. Control, vol. 2, no. 2, pp. 143–53, 2018.
[23] E. Faure, V. Shvydkyi, A. Lavdanskyi, O. Kharin, Methods of factorial coding of speech signals,</p>
        <p>Radio Electron. Comput. Sci. Control, vol.4, no. 4, pp.186–98, 2019.
[24] J.S. Al-Azzeh, B. Ayyoub, E. Faure, V. Shvydkyi, O. Kharin, A. Lavdanskyi, Telecommunication
Systems with Multiple Access Based on Data Factorial Coding, in International Journal on
Communications Antenna and Propagation (IRECAP), vol. 10, no. 2, pp. 102-113, 2020, doi:
10.15866/irecap.v10i2.17216.
[25] G. Durisi, T. Koch, and P. Popovski, Toward Massive, Ultrareliable, and Low-Latency Wireless</p>
        <p>Communication with Short Packets, Proceedings of the IEEE, vol. 104, no. 9, pp. 1711-1726, 2016.
[26] K.-U. Schmidt, Low-correlation sequences, Des. Codes Cryptog., vol. 78, no. 1, pp. 237–267, 2016.
doi: 10.1007/s10623-015-0154-7.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L.</given-names>
            <surname>Jun</surname>
          </string-name>
          , L. Feng, A. 
          <article-title>Nirwan, Monitoring and analyzing big traffic data of a large-scale cellular network with hadoop</article-title>
          , IEEE Netw., vol.
          <volume>28</volume>
          , no.
          <issue>4</issue>
          ,
          <issue>2014</issue>
          , pp. 
          <fpage>32</fpage>
          -
          <lpage>39</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Uthayasankar, K. M. Mustafa, I. Zahir, W. Vishanth,
          <article-title>Critical analysis of big data challenges and analytical methods</article-title>
          ,
          <source>J. Bus. Res., </source>
          vol.
          <volume>70</volume>
          ,
          <year>2017</year>
          , pp. 
          <fpage>263</fpage>
          -
          <lpage>286</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jbusres.
          <year>2016</year>
          .
          <volume>08</volume>
          .001
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ayan</surname>
          </string-name>
          , B.
          <string-name>
            <surname>Alimzhan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Olga</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Timur</surname>
          </string-name>
          , and Z.Toktalyk,
          <article-title>Quality of service management in telecommunication network using machine learning technique</article-title>
          ,
          <source>Indonesian J. of Electr. Eng. and Comput. Sci.</source>
          , vol.
          <volume>32</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>1022</fpage>
          -
          <lpage>1030</lpage>
          ,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .11591/ijeecs.v32.
          <year>i2</year>
          .
          <fpage>pp1022</fpage>
          -
          <lpage>1030</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ram</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Currim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Dantas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.A.</given-names>
            <surname>Sabóia</surname>
          </string-name>
          ,
          <article-title>A big data approach for smart transportation management on bus network</article-title>
          .
          <source>In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2)</source>
          , Trento, Italy,
          <fpage>12</fpage>
          -
          <lpage>15</lpage>
          September 2016; pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.B.</given-names>
            <surname>Mukhanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Aldanazar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.M.</given-names>
            <surname>Uatbayeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ye</surname>
          </string-name>
          . Alimbekov,
          <string-name>
            <given-names>G.S.</given-names>
            <surname>Marat</surname>
          </string-name>
          ,
          <article-title>Competitive learning in neural networks</article-title>
          ,
          <source> Int. J. of Inf.and Commun. Tech</source>
          . vol.
          <volume>1</volume>
          , no.
          <issue>3</issue>
          ,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .54309/ijict.
          <year>2020</year>
          .
          <volume>3</volume>
          .3.011.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>T.</given-names>
            <surname>Velyamov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Manankova</surname>
          </string-name>
          ,
          <article-title>Modification of the Danzig-Wolf Decomposition Method for Building Hierarchical Intelligent Systems</article-title>
          ,
          <source>Int. J. of Adv. Comput. Sci. and Appl</source>
          .,  vol.
          <volume>15</volume>
          , no.
          <issue>7</issue>
          , pp.
          <fpage>1160</fpage>
          -
          <lpage>1167</lpage>
          ,
          <year>2024</year>
          . Doi:
          <volume>10</volume>
          .14569/IJACSA.
          <year>2024</year>
          .
          <volume>01507113</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.F.</given-names>
            <surname>Bregman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Kvashennikov</surname>
          </string-name>
          ,
          <article-title>Method of code frame synchronization of messages</article-title>
          ,
          <source>RF. Patent</source>
          <volume>2</volume>
          459
          <fpage>366</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bloessl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dressler</surname>
          </string-name>
          , mSync:
          <article-title>Physical Layer Frame Synchronization without Preamble Symbols</article-title>
          ,
          <source>in IEEE Transactions on Mobile Computing</source>
          , vol.
          <volume>17</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>2321</fpage>
          -
          <lpage>2333</lpage>
          ,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1109/TMC.
          <year>2018</year>
          .
          <volume>2808968</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>