<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>X (O. Riznyk);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Method of adaptive Barker-like protection, coding and data transmission⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleg Riznyk</string-name>
          <email>oleh.y.riznyk@lpnu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Kynash</string-name>
          <email>yurii.y.kynash@lpnu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Evgeny Savelov</string-name>
          <email>yevhenii.e.savelov@edu.lpnu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Evgeny Matviychuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Abdel-</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Badeeh M. Salem</string-name>
          <email>abmsalem@yahoo.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ain Shams University</institution>
          ,
          <addr-line>El-Khalyfa El-Mamoun Street Abbasya, Cairo</addr-line>
          ,
          <country country="EG">Egypt</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1918</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>To remotely control the movement of mobile robotic platforms, an important problem is to ensure reliable communication between such platforms and the remote control center, providing an appropriate level of cryptographic protection and noise immunity while reducing the weight, size, power consumption, and cost of their implementation. Ensuring high noise immunity and secrecy of data transmission can be achieved by using barker-like codes and means of adapting their bit depth to the noise value. The aim of the study is to develop adaptive barker-like coding and data transmission with high technical and operational parameters. An improved method for synthesizing barker-like codes is presented and an adaptive barker-like coding/decoding method is developed, which, taking into account the signal-to-noise ratio, provides high noise immunity and reduces data transmission time. The synthesis of a barker-like code thod of adaptive barker-like coding/decoding ensures the creation of the main components of the data protection and transmission system with high technical and operational parameters.</p>
      </abstract>
      <kwd-group>
        <kwd>Adaptive data encoding and decoding</kwd>
        <kwd>Barker-like code</kwd>
        <kwd>ideal ring bundles</kwd>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Relevance of the problem. When remotely controlling mobile robotic platforms, one of the key
tasks is to ensure a stable and secure communication channel between the platforms and the control
point. To achieve the required level of cryptographic protection and interference immunity, it is
necessary to develop mobile onboard encryption systems that combine high resistance to
interference with excellent technical and economic characteristics. This requires the introduction of
a modern component base, as well as the creation of new methods, algorithms and structures that
ensure effective software and hardware implementation of the processes of encryption, decryption,
encoding and decoding of information. A significant increase in the reliability and confidentiality of
data transmission can be achieved by using Barker codes with adaptation of their bit depth to the
level of interference. In this regard, the task of creating a data encoding and transmission system
based on the use of Barker codes, which combines high technical and operational performance, is of
particular relevance [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>The study proposed the creation of an adaptive coding system based on Barker-like codes to
organize reliable information transmission with increased technical and operational performance.</p>
      <p>To achieve this goal, it is necessary to solve the following key tasks:
•
•
•
•
•
•
analysis of recent research and publications;
selection of the approach and principles for developing a Barker-type coding and data
transmission system;
development of the design of fixed and movable parts of the Barker-type coding and data
transmission system;
software implementation of components of the Barker-type coding and data transmission
system;
development of hardware for the Barker-type coding and data transmission system;
testing and evaluation of the parameters of the developed components.</p>
      <p>The object of research are information processes related to encryption and decryption based on
the use of Barker-like codes, as well as the procedure for encoding, decoding and transmitting data.</p>
      <p>Subject of study covers the structural organization of the information encoding and transmission
system using Barker-like codes, as well as approaches, algorithmic solutions and technical means of
implementing its main functional elements. The scientific novelty of the study is:
•
•
an improved method for synthesizing barker-like code;
the developed adaptive method of Barker-like coding/decoding, which, taking into account
the signal-to-noise ratio, provides high resistance to interference and reduces the data
transmission time.</p>
      <p>The practical significance of the obtained results of using the developed method of adaptive
barker-like coding/decoding ensures the creation of the main components of the data protection and
transmission system with high technical and operational parameters.</p>
      <p>
        Ensuring a high level of information security is important in various cyber-physical systems [
        <xref ref-type="bibr" rid="ref3 ref4">3,
4</xref>
        ] and in the application of wireless sensor networks for intelligent systems [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Many different
methods are used to protect information, but given the rapid spread of unauthorized access to
confidential information, improving information security methods is extremely important [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ].
      </p>
      <p>The creation of mobile onboard cryptographic protection and interference-resistant coding with
high technical and economic performance requires the widespread use of a modern component base,
the development of new methods, algorithms and structures aimed at the efficient software and
hardware implementation of encryption-decryption and data encoding-decoding algorithms.</p>
      <p>Achieving high resistance to interference and confidentiality of data transmission is possible
through the use of Barker-type codes and methods of adapting their bit depth to the magnitude of
interference. In this context, the problem of developing a system for encoding and transmitting data
based on a barker-like coding system characterized by high technical and operational parameters
becomes particularly relevant.</p>
      <p>The aim of the study is to develop an adaptive barker-like coding and data transmission system
with high technical and operational parameters.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>
        In general, cyber-physical systems are closely related to Internet of Things (IoT) systems. The rapid
evolution of cyber-physical systems is expanding the range of services and applications for people
in various fields, including smart homes, e-health, e-commerce, etc. The Internet of Medical Things
(IoMT) is being used to ensure the reliability and efficiency of healthcare operations to respond to
patient needs efficiently and effectively. However, various issues and challenges, such as lack of
security and privacy measures, require the implementation of appropriate security measures to
increase the resilience of the IoMT to cyber-attacks. Such security measures for IoMT should provide
a trade-off between security and system performance. In paper [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] proposes a security solution to
detect, prevent attacks, and mitigate or remediate the damage from such attacks in order to preserve
patient privacy. The interconnection of the cyber and physical worlds requires reliable means of
information security. Therefore, it is important to use appropriate technologies, applications and
standards. Vulnerabilities, threats and security attacks on cyber-physical systems require the use of
appropriate security measures [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Trends in the development of embedded cryptographic systems for mobile platforms indicate a
growing interest in specialized encryption and decryption algorithms [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. Some studies [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]
indicate that existing approaches are not designed for use in the context of creating autonomous
onboard cryptographic complexes.
      </p>
      <p>
        Analysis of publications [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ] shows that existing cryptographic protection methods are not
oriented towards their use in building on-board systems for cryptographic protection of information
for mobile devices.
      </p>
      <p>Papers [16, 17] consider methods for synthesizing Barker-type sequences and
interferenceresistant encoding/decoding algorithms using Barker-type codes. The disadvantage of the considered
methods is the inability to adapt the bit depth of Barker-type codes to the size of the interference
[18].</p>
      <p>The key problem in building embedded systems is the choice of a noise-resistant coding method
for secure data transmission and reception [19]. Barker codes allow for the practical implementation
of secure data reception/transmission, but the length of Barker codes is limited to 13. Therefore, a
relevant scientific problem is to find and build Barker-like codes with a length greater than 13 with
characteristics close to Barker codes.</p>
      <p>Taking into account the intensive increase in the number of users of embedded systems, the
problem of finding Barker-like codes of different lengths with the ability to adapt to the number of
errors found and corrected arises. And this is problematic, since at present there are no regular
methods for building Barker-like codes [20].</p>
    </sec>
    <sec id="sec-3">
      <title>3. Main results of the study</title>
      <sec id="sec-3-1">
        <title>3.1. Development of the architecture of the Barker-like coding and data transmission system.</title>
        <p>Choosing an approach and development principles. The creation of a hardware-software complex
for encoding and transmitting data between a remote-control center and a mobile platform should
be based on an integrated approach that includes:
•
•
•
formalization of cryptographic principles of encryption/decryption;
modeling and development of flexible coding structures with adaptation to Barker-like codes;
formation of new algorithms for constructing Barker-like codes with cryptographic
functionality.</p>
        <p>The aim of the work is to develop hardware and software for a data encoding and transmission
system between a remote control center and a mobile robotic platform, using the following
principles:
•
•
•
•
•
platform based on variable hardware architecture with a processor core and modular
expandability;
structural modularity, which involves separate implementation of each functional block of
the system;
use of open source programs focused on scalability and support of standard software;
full adaptation of the software and hardware part to the specifics of encoding/decoding
algorithms;
the ability to change the length of the Barker-like code programmatically.</p>
        <p>The efficiency of using methods based on barker-like codes is closely related to the chosen form
of implementation.</p>
        <p>Software implementation involves the use of microprocessor or microcontroller platforms. In this
case, the computational processes are distributed in time and require intensive exchange between
RAM and executive elements. The use of flexible software tools allows you to optimize the execution
speed and code volume, while maintaining control over accuracy.</p>
        <p>Hardware implementation, in turn, provides the implementation of parallel calculations in space
and time without the need for a large amount of intermediate exchange. This simplifies the control
logic and improves system performance.</p>
        <p>A combined approach, where computational cores are supplemented with configurable logical
blocks, turns out to be the most practical for implementing systems based on Barker codes.</p>
        <p>It is worth emphasizing that exclusively software or purely hardware implementation of encoding
and decoding algorithms based on Barker-like sequences is rarely found in practice. Typically, the
implementation of such algorithms is carried out using a processor core, which functions in
combination with hardware modules, in particular configurable logical devices [21].</p>
        <p>Development of the structure of the fixed part of the Barker-like coding and data transmission
system. The main task of designing an encoding system based on Barker-like codes, which should
provide high technical and operational characteristics, is to reduce the cost of equipment while
simultaneously meeting the established requirements and technical limitations [22].</p>
        <p>The construction of an encoding and information transmission system based on the principles of
using Barker-like codes involves the presence of two components: a stationary module - a remote
control center, and a mobile node integrated into the robotic platform.</p>
        <p>The scheme of constructing a stationary block of the encoding and data transmission system
using Barker-like codes is shown in Fig. 1.</p>
        <p>The control center is based on a personal computer using the Intel IA-64 processor architecture.
Some of the interface solutions are implemented in the form of software components that provide
interaction with the operator to transmit control signals to the object. The received commands and
information undergo a decryption stage and are transmitted to the mobile module of the data
protection and transmission system, which operates on the basis of principles similar to barker-like
codes. The transmitter is responsible for the physical transmission of encrypted messages via a radio
channel. It is connected to the computing core using standard interface means and is under the
control of a microcontroller.</p>
        <p>Development of a mobile structure for a Barker-like coding and data transmission system. The
mobile module of the system for encoding and transmitting information based on Barker-like codes
is implemented using a processor core, which can be supplemented with specialized hardware or
Transceiver</p>
        <p>Transceiver
interface
Replaceable modules</p>
        <p>Processor core</p>
        <p>Data
encodingdecoding</p>
        <p>Tools for
synthesizing
Barkerlike codes
e
g
a
s
s
e
software if necessary. The architectural basis of this processor core is a modern microcomputer that
provides the necessary performance and flexibility.</p>
        <p>The block diagram of the mobile part of the system, which provides encoding and transmitting
data based on Barker-like codes, is shown in Fig. 2.
(1)
(2)
(3)</p>
        <p>The main elements of the mobile unit of the data transmission and encoding system, which
operates on the basis of Barker-like codes, include: a radio receiver, an interface for interaction with
the receiver, modules for generating Barker-like codes, as well as devices for encoding and decoding
information [23, 24].</p>
        <p>The implementation of the mobile part is carried out on the basis of modern microcomputer and
microcontroller platforms using a combination of universal solutions and highly specialized
technologies - both hardware and software. This approach ensures that the system meets the
requirements for dimensions, weight characteristics and energy efficiency.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Improvement of the adaptive Barker-like data encoding/decoding method.</title>
        <p>The formation of Barker-like code sequences is carried out due to the unique characteristics of "ideal
ring bundles" (IRBs) - these are sequences of integers with a cyclic structure, in which all n numbers,
including the sums of adjacent elements, cover the set of natural numbers R times [25, 26]. Such a
multi-position code sequence, resistant to interference and built on the basis of IRBs, is called a
Barker-like code. To create a Barker-like code of length   using IKV, you need to select a line with
  , number the positions of the one-dimensional array, assign ones to those positions whose indices
match the numbers xj, and fill the rest with zeros. The code positions corresponding to the number
xj are determined as follows:
  − 1 ≡ ∑   (</p>
        <p>(  ), j = 1,2 … n,

 =1
  = 
( − 1)</p>
        <p>+ 1,</p>
        <p>= 2( −  ).
where  
i-th element of the IRB; n, R</p>
        <p>parameters of the IRB.</p>
        <p>The resulting sequence of binary symbols is a combination that forms a code sequence, otherwise
  − 1 code sequences are created by cyclic shifting, where the code distance:</p>
        <p>Using this Barker-like code sequence, which depends on the parameters n and R, allows finding
the following number of errors:</p>
        <p>Depending on the parameters n and R of this Barker-like code sequence, it is possible to correct</p>
        <p>Using formulas (1) and (2), a Barker-like code sequence is synthesized, which is used for data
encoding [27, 28]. For the encoding and decoding processes using Barker-like codes, a method has
been developed that allows adapting the code length to the level of noise interference.</p>
        <p>The encoding and decoding procedure using this method consists of the following steps:</p>
        <p>information.
1.</p>
        <p>Determining the length m and selecting the type of Barker-like code for encoding
2. Performing element-by-element encoding of the number, starting from the most significant
bit: if the i-th bit of the number is equal to logical 0, the Barker-like code is transmitted; if the
i-th bit is equal to logical 1, the inversion of the Barker-like code is sent.</p>
        <p>Transmitting the i-th bit in the form of an m-bit Barker-like code.</p>
        <p>Setting the selected Barker-like code of length m for further decoding.</p>
        <p>Receiving the i-th bit encoded with an m-bit Barker-like code.</p>
        <p>Applying the logical operation XOR (exclusive OR) between the given m-bit Barker-like code
and the obtained m-bit value of the i-th encoded bit.
7. Formation of the result of the XOR operation: (exclusive OR) logical 0 means the same values
at the inputs, logical 1 means different values.
sum</p>
        <p>ExOR.</p>
        <p>decoded -th to discharge according to the formula:
8. Summing m results of the execution of the logical operation Exclusive OR and obtaining the</p>
        <p>Comparison of the calculated amount</p>
        <p>with meaning (m+1)/2 and formation of the</p>
        <p>2 ≤  −  − 1.
  = {
0, 
1, 
С 
С 
&lt; ( + 1)/2
≥ ( + 1)/2
.
10. Determining the number of digits kerr, which are with errors by the following formula:
11. Analysis kerr and the choice of reducing or increasing the length of the Barker-like code.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Implementation of basic components of a Barker-like coding and data transmission system.</title>
        <p>Dependence of the number of corrected errors kerr on the code length   is shown in Fig. 3. This
figure shows a graph for the 27 values of   shown on the right of the figure. From the figure, we
can see that at first there is a rapid increase in the value of kerr, and then there is a smooth change
with a gradual reaching of an almost constant value of kerr.</p>
        <p>The use of this developed method provides high immunity to interference and reduces data
transmission time.</p>
        <p>An important stage is the proper software implementation of the main components of the Barker
code-based coding and data transmission system. The software implementation of the components
of the Barker code-based coding and data transmission system involves the use of computing
resources of all processor cores. The system modules are written in the high-level C++ language,
which ensures software compatibility of both stationary and mobile parts, as they are designed for
different hardware platforms.
(4)
(5)
(6)
(7)</p>
        <p>This approach makes it possible to create, debug and improve software using a computer, as well
as to modify modules of mobile devices based on microcomputers [29].</p>
        <p>The debugging of the developed modules, their objective testing, detection and elimination of
errors were performed autonomously. After that, the ready and tested software components were
integrated into a single complex that provides the performance of the tasks of encoding (decoding)
and data transmission using Barker codes.</p>
        <p>The software complex of the Barker-like code-based encoding, decoding and data transmission
system includes the following main components: an encoder based on Barker-like codes, a decoder
with a similar approach and a Barker-like code synthesis module. These software components are
implemented on an open source basis, which allows them to be expanded and debugged
independently of each other [29].</p>
        <p>The research results have practical applications for embedded smart systems with wireless
control. The noise-resistant Barker-like code allows for reliable wireless data reception/transmission
with error detection and correction for embedded smart systems [29, 30].</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>It is proposed to create a data encoding and transmission system using the Barker code method,
which is characterized by high technical and operational indicators. For this purpose, a
comprehensive approach is used, which includes: research and development of theoretical
foundations of cryptographic encryption and decryption of data based on the Barker-like code
method, as well as the study and development of theoretical foundations of the synthesis of
Barkerlike codes of the type and methods of encoding/decoding information.</p>
      <p>The method of data encryption and decryption using Barker-like coding has been improved,
which, due to the parallelization of the process, provides a significant reduction in the
encoding/decoding time for a software solution.</p>
      <p>An adaptive encoding/decoding method based on Barker-like codes has been developed, which,
taking into account the signal/noise ratio, guarantees high resistance to interference and reduces
data transmission time.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools.
[16] M. Wang, S. Cong and S. Zhang, Pseudo Chirp-Barker-Golay coded excitation in ultrasound
imaging, in: 2018 Chinese Control And Decision Conference (CCDC), Shenyang, 2018, pp.
40354039. doi: 10.1109/CCDC.2018.8407824.
[17] S. Wang and P. He, Research on Low Intercepting Radar Waveform Based on LFM and Barker
Code Composite Modulation, in: 2018 International Conference on Sensor Networks and Signal
Processing (SNSP), Xi'an, China, 2018, pp. 297-301. doi: 10.1109/SNSP.2018.00064.
[18] S. Xia, Z. Li, C. Jiang, S. Wang and K. Wang, Application of Pulse Compression Technology in
Electromagnetic Ultrasonic Thickness Measurement, in: 2018 IEEE Far East NDT New
Technology &amp; Application Forum (FENDT), Xiamen, China, 2018, pp. 37-41. doi:
10.1109/FENDT.2018.8681975.
[19] V. Banket and S. Manakov, Composite Walsh-Barker Sequences, in: 2018 9th International
Conference on Ultrawideband and Ultrashort Impulse Signals (UWBUSIS), Odessa, 2018, pp.
343-347. doi: 10.1109/UWBUSIS.2018.8520220.
[20] C. A. Martos Ojeda, L. M. Delgado Ordoñez, C. A. Trujillo Solarte, Bh Sets as a Generalization
of Golomb Rulers, IEEE Access 9 (2021) 118042-118050. doi:10.1109/ACCESS.2021.3106617.
[21] D. Kim, I. Kim, H. Cho, H. Choi, H. -Y. Song, Performance Analysis of QC-LDPC codes
constructed by using Golomb rulers, in: 2022 27th Asia Pacific Conference on Communications
(APCC), Jeju Island, Korea, Republic of, 2022, pp. 301-302. doi:10.1109/APCC55198.2022.9943662.
[22] D. Kim, H. Choi, H. -Y. Song, QC-LDPC codes from various Golomb Rulers, in: 2023 14th
International Conference on Information and Communication Technology Convergence
(ICTC), Jeju Island, Republic of Korea, 2023, pp. 106-110. doi:10.1109/ICTC58733.2023.10392287.
[23] S. Priambodo, A. Hambali, B. Pamukti, P. P. Melati, R. F. Putra, Evaluation of Optimum Golomb
Ruler Performance for NG-PON2 Networks, in: 2019 4th International Conference on
Information Technology, Information Systems and Electrical Engineering (ICITISEE), Indonesia,
2019, pp. 1-5. doi: 10.1109/ICITISEE48480.2019.9003907.
[24] C. A. M. Ojeda, D. F. D. Urbano, C. A. T. Solarte, Near-Optimal g-Golomb Rulers, IEEE Access 9
(2021) 65482-65489. doi:10.1109/ACCESS.2021.3075877.
[25] D. F. D. Urbano, C. A. M. Ojeda, C. A. T. Solarte, lmost Difference Sets From Singer Type Golomb</p>
      <p>Rulers, IEEE Access 10 (2022) 1132-1137. doi:10.1109/ACCESS.2021.3137996.
[26] O. Riznyk, O. Povshuk, Y. Noga and Y. Kynash, Transformation of Information Based on Noisy
Codes, in: 2018 IEEE Second International Conference on Data Stream Mining &amp; Processing
(DSMP), Lviv, 2018, pp. 162-165. doi: 10.1109/DSMP.2018.8478509.
[27] O. Riznyk, N. Kustra, Y. Kynash, R. Vynnychuk, Method of Constructing Barker-Like Sequence
on the Basis of Ideal Ring Bundle Families, in: 2019 IEEE International Scientific-Practical
Conference Problems of Infocommunications, Science and Technology (PIC S&amp;T), Kyiv,
Ukraine, 2019, pp. 207-211. doi:10.1109/PICST47496.2019.9061375.
[28] L. Lopacinski et al., A Study of Barker Spreading Codes for High-Speed PSSS Wireless
Systems, in: 2021 Joint European Conference on Networks and Communications &amp; 6G Summit
(EuCNC/6G Summit), Porto, Portugal, 2021, pp. 112-117. doi:
10.1109/EuCNC/6GSummit51104.2021.9482541.
[29] I. Tsmots, O. Riznyk, V. Rabyk, Y. Kynash, N. Kustra, M. Logoida, Implementation of fpga-based
-like codes, in: V. Lytvynenko, S. Babichev, W. Wójcik, O. Vynokurova, S.
Vyshemyrskaya, S. Radetskaya (Eds), Lecture Notes in Computational Intelligence and Decision
Making (ISDMCI 2019), volume 1020 of Advances in Intelligent Systems and Computing,
Springer, Cham, 2020, pp. 203 214. doi: 10.1007/978-3-030-26474-1_15.
[30] H. Kamel, M. G. Shehata and S. E. Eldin Ali, A Hybrid Adaptive Technique for Barker Code
Matched Filter Sidelobe Cancellation, in: 2024 International Telecommunications Conference
(ITC-Egypt), Cairo, Egypt, 2024, pp. 332-337. doi: 10.1109/ITC-Egypt61547.2024.10620493.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>AMN</given-names>
            <surname>Aljalai</surname>
          </string-name>
          , C. Feng, VCM Leung,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ward</surname>
          </string-name>
          ,
          <article-title>Improving the energy efficiency of dft-s-ofdm in uplink massive mimo with barker codes</article-title>
          ,
          <source>in 2020 International Conference on Computing, Networking and Communications (ICNC)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>731</fpage>
          <lpage>735</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zou</surname>
          </string-name>
          , G. Liu,
          <article-title>A Low-Complexity Security Scheme for Drone Communication Based on PUF and LDPC</article-title>
          ,
          <source>Drones</source>
          <volume>8</volume>
          (
          <year>2024</year>
          )
          <article-title>472</article-title>
          . doi:
          <volume>10</volume>
          .3390/drones8090472.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T.</given-names>
            <surname>Hovorushchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Baranovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ivanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hnatchuk</surname>
          </string-name>
          ,
          <article-title>Subsystem for monitoring atmospheric air quality in the cyber-physical system "Smart City"</article-title>
          , in: T. Hovorushchenko (Eds),
          <source>Computer Systems and Information Technologies no 1</source>
          (
          <year>2024</year>
          )
          <fpage>17</fpage>
          -
          <lpage>26</lpage>
          . doi:
          <volume>10</volume>
          .31891/csit-2024
          <source>-1-2.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Calabro</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Cambiaso</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Cheminod</surname>
            ,
            <given-names>I.C.</given-names>
          </string-name>
          <string-name>
            <surname>Bertolotti</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Durante</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Forestieo</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Lombardi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Manco</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Marchetti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Orlando</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <article-title>Papuzzo, A Methodological Approach to Securing CyberPhysical Systems for Critical Infrastructures</article-title>
          ,
          <source>Future Internet</source>
          <volume>16</volume>
          (
          <year>2024</year>
          )
          <fpage>418</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Pinto</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.M.B. Torres</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Lohweg</surname>
          </string-name>
          , Closing Editorial:
          <article-title>Advances and Future Directions in Autonomous Systems for Cyber Physical Systems</article-title>
          and Smart Industry, Appl. Sci.
          <volume>14</volume>
          (
          <year>2024</year>
          )
          <article-title>10673</article-title>
          . doi:
          <volume>10</volume>
          .3390/app142210673.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>I.</given-names>
            <surname>Tsmots</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rabyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Riznyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kynash</surname>
          </string-name>
          ,
          <article-title>Method of Synthesis and Practical Realization of Quasi-Barker Codes</article-title>
          ,
          <source>in: 2019 IEEE 14th International Conference on Computer Science and Information Technologies (CSIT)</source>
          , Lviv, Ukraine,
          <year>2019</year>
          , pp.
          <fpage>76</fpage>
          -
          <lpage>79</lpage>
          . doi:
          <volume>10</volume>
          .1109/STCCSIT.
          <year>2019</year>
          .
          <volume>8929882</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>García-Valls</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dubey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Botti</surname>
          </string-name>
          ,
          <article-title>Introducing the new paradigm of Social Dispersed Computing: Applications, Technologies and Challenges</article-title>
          , in: M.
          <string-name>
            <surname>García-Valls</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . Dubey (Eds),
          <source>Adaptive Middleware for Smart Systems</source>
          , volume
          <volume>91</volume>
          <source>of Journal of Systems Architecture</source>
          , Springer, Cham,
          <year>2018</year>
          ,
          <fpage>83</fpage>
          -
          <lpage>102</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.sysarc.
          <year>2018</year>
          .
          <volume>05</volume>
          .007.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.-P. A.</given-names>
            <surname>Yaacouba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nouraa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. N.</given-names>
            <surname>Nouraa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Salman</surname>
          </string-name>
          , E. Yaacoub,
          <string-name>
            <given-names>R.</given-names>
            <surname>Couturier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chehabb</surname>
          </string-name>
          ,
          <article-title>Securing internet of medical things systems: Limitations, issues and recommendations</article-title>
          ,
          <source>in Future Generation Computer Systems</source>
          <volume>105</volume>
          (
          <year>2020</year>
          )
          <fpage>581</fpage>
          -
          <lpage>606</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.micpro.
          <year>2020</year>
          .
          <volume>103201</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.-P. A.</given-names>
            <surname>Yaacouba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Salman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. N.</given-names>
            <surname>Nouraa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kaanichec</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chehabb</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Malli</surname>
          </string-name>
          , Cyber-physical -
          <source>Physical Systems and Internet of Things</source>
          , volume
          <volume>77</volume>
          of Microprocessors and Microsystems, Springer, Cham,
          <year>2020</year>
          ,
          <volume>103201</volume>
          . doi:
          <volume>10</volume>
          .1016/j.future.
          <year>2019</year>
          .
          <volume>12</volume>
          .028.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Niu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Miao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Meng</surname>
          </string-name>
          ,
          <article-title>Hybrid Coded Excitation of the Torsional GuidedWave Mode T(0,1) for Oil and Gas Pipeline Inspection</article-title>
          , Appl. Sci.
          <volume>12</volume>
          (
          <year>2022</year>
          )
          <article-title>777</article-title>
          . doi:
          <volume>10</volume>
          .3390/app12020777
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rudlin</surname>
          </string-name>
          , G. Asfis,
          <string-name>
            <given-names>H.</given-names>
            <surname>Meng</surname>
          </string-name>
          ,
          <article-title>Convolution of Barker and Golay Codes for Low Voltage Ultrasonic Testing</article-title>
          ,
          <year>Technologies 2019</year>
          ,
          <volume>7</volume>
          , 72. doi:
          <volume>10</volume>
          .3390/technologies7040072.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Akula</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mulaveesala</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. K.</given-names>
            <surname>Sardana</surname>
          </string-name>
          ,
          <article-title>Barker-Coded Thermal Wave Imaging for Non-Destructive Testing and Evaluation of Steel Material</article-title>
          ,
          <source>in IEEE Sensors Journal</source>
          , vol.
          <volume>19</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>735</fpage>
          -
          <lpage>742</lpage>
          , 15 Jan.
          <volume>15</volume>
          ,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .1109/JSEN.
          <year>2018</year>
          .
          <volume>2877726</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.C.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.C.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <article-title>An Ultrasonic Object Detection Applying the ID Based on Spread Spectrum Technique for a Vehicle</article-title>
          ,
          <source>Sensors</source>
          <volume>20</volume>
          (
          <year>2020</year>
          )
          <article-title>414</article-title>
          . doi:
          <volume>10</volume>
          .3390/s20020414.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>V.M.</given-names>
            <surname>Duong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Vesely</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hubacek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Janu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.G.</given-names>
            <surname>Phan</surname>
          </string-name>
          ,
          <article-title>Detection and Parameter Estimation Analysis of Binary Shift Keying Signals in High Noise Environments</article-title>
          ,
          <source>Sensors</source>
          <volume>22</volume>
          (
          <year>2022</year>
          )
          <article-title>3203</article-title>
          . doi:
          <volume>10</volume>
          .3390/s22093203.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.</given-names>
            <surname>Fu</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Ning</surname>
          </string-name>
          ,
          <article-title>Barker coded excitation using pseudo chirp carrier with pulse compression filter for ultrasound imaging</article-title>
          ,
          <source>in: BIBE 2018; International Conference on Biological Information and Biomedical Engineering</source>
          , Shanghai, China,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>