<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A data protection coding method based on information theory and quantum technologies</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rostislav Motsyk</string-name>
          <email>motsyk@kpnu.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Toliupa</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana Pylypiuk</string-name>
          <email>pylypyuk.tetiana@kpnu.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kateryna Heseleva</string-name>
          <email>heseleva@kpnu.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksiy Vovk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Matviichuk-Yudin</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ivan Kozheduba Kharkiv National Air Force University</institution>
          ,
          <addr-line>Sumska Str., 77/79, Kharkiv, 61023</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kamianets-Podilskyi Ivan Ohiienko National University</institution>
          ,
          <addr-line>Ivan Ohiienko Str., 61, Kamianets-Podilskyi, 32301</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”</institution>
          ,
          <addr-line>Beresteyskyi Ave., 37, Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska Str., 60, Kyiv, 03022</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The rapid development of quantum computers presents both new opportunities and challenges for information security. Traditional cryptographic methods may prove inefective against attacks leveraging quantum computing. This paper proposes the use of information theory principles to develop new data protection methods for quantum computing systems. It presents an approach based on the entropic analysis of quantum communication channels and the application of quantum coding to ensure confidentiality, integrity, and availability of data.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;quantum computers</kwd>
        <kwd>information theory</kwd>
        <kwd>entropy</kwd>
        <kwd>quantum coding</kwd>
        <kwd>information security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The rapid advancement of quantum computing opens up new possibilities for solving complex
computational problems. However, it also poses new challenges for information security. Traditional
cryptographic methods, based on the complexity of factorization or discrete logarithms, can be broken
by quantum algorithms such as Shor’s algorithm [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Information theory, as the fundamental basis for
coding, transmission, and processing of data, can be crucial in developing new information protection
methods for quantum computing systems. Concepts such as entropy, mutual information, and quantum
coding can be applied to ensure the confidentiality, integrity, and availability of data.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. The main material presentation</title>
      <p>• Development of continuous-variable-based QKD protocols for better eficiency;
• Integration of QKD into existing fiber-optic networks;
• Satellite-based QKD for secure long-distance communication.</p>
      <sec id="sec-2-1">
        <title>2. Quantum Error Correction (QEC): • Optimization of QEC codes for specific quantum hardware platforms;</title>
        <p>• Fault tolerance in quantum computing architecture;
• Machine learning for decoding QEC codes.
3. Quantum-Resistant Cryptography:
• Dissemination of NIST post-quantum cryptography standardization;
• Hybrid classical-quantum homomorphic encryption schemes.
4. Quantum Random Number Generation (QRNG):
• Device-independent QRNG protocols;
• Integration of QRNG into consumer devices and cloud services;
• Continuous-variable QRNG for further increasing the generation rates.
5. Quantum Secure Direct Communication (QSDC):
• Experimental demonstrations of the diferent QSDC protocols;
• A study on practical feasibility and limitations concerning QSDC.</p>
      </sec>
      <sec id="sec-2-2">
        <title>6. Quantum Homomorphic Encryption (QHE):</title>
        <p>• Development of more eficient QHE schemes;
• Hybrid approaches toward homomorphic encryption-classical and quantum.</p>
      </sec>
      <sec id="sec-2-3">
        <title>7. Quantum Information Scrambling:</title>
        <p>• Experimental demonstration of information scrambling in quantum systems.</p>
        <p>Consider theoretical relations to black hole physics and holography. These research areas aim to
develop practical and eficient data protection methods for quantum computing systems, combining
knowledge from quantum physics, computer science, and information theory.</p>
        <p>This paper proposes an approach based on the entropic analysis of quantum communication channels
and the application of quantum coding for data protection in quantum computing systems. The key
aspects discussed include:
1. Entropic analysis of quantum communication channels.
2. Quantum coding for ensuring data confidentiality.
3. Application of quantum coding for ensuring data integrity and availability.</p>
        <p>If consider entropic analysis of quantum communication channels we can ascertain that entropy is a
fundamental concept in information theory that characterizes the uncertainty or amount of information
contained in a message or system. In classical information theory, entropy is defined as:
() = − ∑︁ () log (),</p>
        <p>() = − ( log ),
(|) = () − ( ),
where  is a random variable and () is the probability of .</p>
        <p>In the quantum case, entropy is defined through the density matrix  of the system:
where   (•) denotes the trace of the matrix.</p>
        <p>
          For a quantum communication channel, the Holevo entropy [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] is defined as:
where  is the joint state of systems  and , and  is the state of system .
(1)
(2)
(3)
        </p>
        <p>Entropic analysis of quantum channels allows us to estimate the amount of information leaking
through the channel and identify potential vulnerabilities in the system. This is crucial for developing
data protection methods.</p>
        <p>Why is entropy important for quantum channel analysis? From diferent researches we can say as
answer for this question:
1) the greater the entropy, the more information the system contains;
2) entropy is used to characterize the degree of entanglement of quantum systems;
3) an increase in noise in a channel leads to an increase in entropy, which can indicate a loss of
information;
4) malicious activities can afect the entropy of the system, which allows them to be detected.</p>
        <p>Consider a quantum channel that converts the input state  into the output state ′ . Entropy analysis
allows you to estimate how much information is lost during transmission through a channel.</p>
        <p>As to mutual information that it shows how much information about the input state is contained in
the output.</p>
        <p>(, ′) = () + (′) − ( ⊗ ′),
(4)
where ⊗ is the tensor product.</p>
        <p>Conditional entropy describes the uncertainty about the initial state if the input is known.
(′|) = ( ⊗ ′) − ().
(5)</p>
      </sec>
      <sec id="sec-2-4">
        <title>Graphic interpretation is presented in Figure1 [1].</title>
        <p>It can be seen that with an increase in noise, the mutual information decreases, indicating a loss of
information.</p>
        <p>
          Let’s consider quantum coding for ensuring data confidentiality. To ensure data confidentiality in
quantum computing systems, quantum coding methods can be applied. One approach is to use quantum
cryptographic protocols. Particularly the quantum cryptographic protocol BB84 [
          <xref ref-type="bibr" rid="ref3 ref4 ref5">3, 4, 5</xref>
          ]:
|⟩ = (|0⟩ +  |1⟩)/√2,
(6)
where  is a random phase, is enable to establish for two parties a secure key that can subsequently be
used for data encryption. Leveraging the principles of quantum mechanics, these protocols provide a
robust level of security.
        </p>
        <p>Key steps in the BB84 protocol:
1. The sender sends random bits encoded in one of two possible bases (standard or diagonal).
2. The receiver randomly chooses a basis for measuring each received bit.</p>
        <p>3. Sender and receiver communicate to compare the bases used for each bit (but not the bits
themselves).</p>
        <p>4. Secret key creation. They keep only those bits where the bases match, forming a secret key.</p>
        <p>A dependence of the probability of receiver correct bit detection on the number of measurement
attempts is shown in Figure 2. This represents how using random bases afects the accuracy of the
generated key.</p>
        <p>In addition to the BB84 protocol, there are several other protocols in quantum cryptography that
provide secure key distribution or other forms of information protection. Here are some of them:
1. Protocol B92. A simplified version of BB84 that uses only two quantum states instead of four. It is
less resistant to some attacks, but may be easier to implement.</p>
        <p>2. E91 protocol (Eckert scheme). This protocol is based on the principle of entangled states and uses
pairs of entangled photons, and the security is based on the Einstein-Podolsky-Rosen (EPR) paradox
and Bell’s inequalities. The protocol makes it possible to verify whether a third party was present trying
to intercept the key, thanks to quantum entanglement.</p>
        <p>3. Skiddington Protocol (SARG04). An improved protocol similar to BB84, but with greater resistance
to certain types of attacks such as photon splitters. Uses the same states as BB84, but changes the way
information is exchanged for better stability.</p>
        <p>4. Quantum protocols with a cross base includes schemes where transferred states are used in bases
that are dificult to predict. These techniques help detect entanglement due to changes in the properties
of quantum states.</p>
        <p>5. Protocols based on entangled states. In addition to the E91 protocol, there are other methods that
use quantum entanglement to distribute keys or authenticate data transmissions. For example, methods
based on cluster states or multilateral entangled systems.</p>
        <p>6. Continuous-variable QKD (CV-QKD) uses quantum properties of light (many possible values of
variables) instead of individual photons. This approach allows the use of standard telecommunications
equipment, which simplifies integration with existing systems.</p>
        <p>7. DPS (Diferential Phase Shift) protocol based on the use of a phase shift between successive light
pulses. The protocol is less vulnerable to some photon-based attacks and provides efective protection
in various data transmission conditions.</p>
        <p>8. Confluence Protocol (Device-independent QKD). This type of protocol is independent of the
specific hardware used and provides security even in the presence of potentially untrusted devices.
Based on a test of Bell’s inequalities.</p>
        <p>9. Twin-Field QKD is a new protocol that allows you to significantly increase the distance of data
transmission in quantum cryptography. Uses interference field techniques to increase safety and range.</p>
        <p>These protocols extend the capabilities of quantum cryptography by adapting it to diferent scenarios
and security requirements. Each of them has its own characteristics, advantages and limitations, which
are important to consider when choosing for a specific application.</p>
        <p>Quantum cryptographic protocols enable the establishment of a secret key between two parties,
which can then be used to encrypt data. A key advantage is that unauthorized access to the quantum
channel can be detected due to the fundamental laws of quantum mechanics.</p>
        <p>In addition to ensuring confidentiality, quantum coding can be used to ensure data integrity and
availability in quantum computing systems.</p>
        <p>
          For ensuring data integrity, quantum error-correcting codes such as the Steane code [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] can be
applied:
|⟩ = (|0⟩ + |1⟩)/
√
2 → | ⟩ = (|000⟩ + |111⟩)/√2.
(7)
        </p>
        <p>These codes allow the detection and correction of errors that may occur during the transmission or
storage of data in quantum systems.</p>
        <p>To ensure data availability in distributed quantum computing systems, methods like quantum
errorcorrecting codes are used to increase data resilience. One of the most well-known approaches is Shor’s
code, which encodes quantum states to protect against noise and data loss.</p>
        <p>
          Key steps for ensuring data availability using Shor’s code [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]:
        </p>
        <p>Step 1. Quantum State Encoding: an input qubit (primary data unit) is duplicated into a superposition
across nine qubits, which increases its resilience to errors.</p>
        <p>This can be formally represented as:
|⟩ = |0⟩ + |1⟩) → |⟩ = |0
⟩ + |1⟩),
(8)
where |0⟩ and |1⟩ represent logical qubits encoded for error protection.</p>
        <p>Step 2. Error detection. If a random error occurs, quantum operations can detect and correct one of
the possible errors (e.g., bit-flip or phase-flip).</p>
        <p>In classical computing, errors can be detected and corrected using redundancy. For instance, a single
bit of information can be encoded into three bits, and if one of these bits flips, the majority vote can
correct the error.</p>
        <p>Quantum computing, however, faces a unique challenge: the delicate nature of quantum states. Noise
and decoherence can easily disrupt these states, leading to errors.</p>
        <p>A simple quantum error correction code is the bit-flip code. It can detect and correct a single bit-flip
error. To encode a single qubit, we use three qubits:
1. Q0=0; Q1=0; Q2=0.
2. Q0=1; Q1=1; Q2=1.</p>
        <p>For error detection and correction let’s say a bit-flip error occurs on Q1. The state becomes: Q0=0;
Q1=1; Q2=0.</p>
        <p>To detect and correct this error, we apply a series of quantum gates. For parity check we apply a
controlled-NOT (CNOT) gate between Q0 and Q1, and another CNOT gate between Q1 and Q2. This
creates a parity check, where the parity of the three qubits should always be even.</p>
        <p>If the parity check fails, for error correction we can identify the error location by measuring the
parity of Q0 and Q2. If the parity of Q0 and Q2 is odd, the error is on Q1. We can then apply a NOT
gate to Q1 to correct the error.</p>
        <p>While a full mathematical treatment involves density matrices and quantum operations, a simplified
representation can be given using Dirac notation.</p>
        <p>Original state: |⟩ = |0⟩ + |1⟩.</p>
        <p>Encoded state: |⟩ = |000⟩ + |111⟩.</p>
        <p>Bit-flip error on Q1: |⟩ → |010⟩ + |101⟩.</p>
        <p>As error correction is applying appropriate gates to recover the original state, beyond bit-flip codes.</p>
        <p>Step 3. Data Recovery. Using specific quantum operations, the original state can be recovered even
after some qubits are damaged, thus maintaining overall data availability.</p>
        <p>Below is a graph (Figure 3) that illustrates the probability of data availability in a system using
quantum error correction, as a function of the number of qubits. The graph shows that as more qubits
are added to the error-correcting process, data availability improves.</p>
        <p>As the number of qubits involved in error correction increases, the probability of maintaining data
availability also rises, highlighting the efectiveness of quantum error correction for data resilience in
noisy environments.</p>
        <p>
          Quantum teleportation allows the transfer of an arbitrary quantum state between two parties using a
classical communication channel and a pre-established quantum channel. This can be applied to ensure
data availability in distributed quantum computing systems [
          <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
          ].
        </p>
        <p>
          More complex quantum error correction codes, such as the Shor code and the surface code, can
detect and correct multiple errors, including phase-flip errors and combinations of both. These codes
are essential for building large-scale, fault-tolerant quantum computers [
          <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
          ].
        </p>
        <p>While quantum error correction is a complex field, understanding the basic principles of error
detection and correction is crucial for appreciating the potential and challenges of quantum computing.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusions</title>
      <p>The novelty of our study is to investigate data protection methods for quantum computing systems.
We consider the entropy analysis of quantum communication channels to estimate the amount of
information, the possibility of identifying potential vulnerabilities in the system of key steps to ensure
data availability using the Shor code.</p>
      <p>1. It is substantiated that methods of data coding based on information theory for quantum
computing systems are focused on such key areas as: quantum key distribution (QKD); quantum error
correction (QEC); quantum random number generation (QRNG); quantum coding of information.
2. It has been argued that in order to ensure data availability in distributed quantum computing
systems, techniques such as quantum error-correcting codes are used to improve data robustness.
The focus is on one of the most well-known approaches, the Shor code, which encodes quantum
states to protect against noise and data loss, because these more sophisticated quantum
errorcorrection codes, such as the Shor code and the surface code, can detect and correct numerous
errors and are necessary to create large-scale, fault-tolerant quantum computers.
3. An approach based on the entropy analysis of quantum communication channels and the
application of quantum coding for data protection in quantum computing systems is proposed, since
for the entropy analysis of quantum communication channels, entropy is a fundamental concept
that makes it possible to estimate the amount of information flowing through the channel, and
identify potential vulnerabilities in the system, which is important for developing data protection
methods.
4. Quantum coding ensures that any attempt to change or afect the transmitted data will be
impossible without disrupting the quantum states, which automatically reports the tampering
attempt.
5. Although quantum systems have not yet become widespread, research in this field already allows
the creation of highly attack-resistant network protocols that provide a high level of availability
thanks to the use of the unique physical properties of quantum particles.
6. The combination of classical and quantum methods of protection, which is based on the concepts
of entropy and mutual information, made it possible to significantly increase the level of data
protection. The use of quantum coding opens up new opportunities for creating more reliable
and secure communication systems.</p>
    </sec>
    <sec id="sec-4">
      <title>Declaration on Generative AI</title>
      <sec id="sec-4-1">
        <title>The authors have not employed any Generative AI tools.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P.</given-names>
            <surname>Shor</surname>
          </string-name>
          ,
          <article-title>Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer</article-title>
          ,
          <source>SIAM Journal on Computing</source>
          <volume>26</volume>
          (
          <year>1997</year>
          )
          <fpage>1484</fpage>
          -
          <lpage>1509</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Holevo</surname>
          </string-name>
          , Quantum Systems, Channels, Information: A Mathematical Introduction, Studies in Mathematical Physics, De Gruyter,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Nielsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. L.</given-names>
            <surname>Chuang</surname>
          </string-name>
          ,
          <source>Quantum Computation and Quantum Information</source>
          , volume
          <volume>710</volume>
          , Cambridge University Press,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Okhrimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tynymbayev</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Iavich, High-speed and secure prng for cryptographic applications</article-title>
          ,
          <source>International Journal of Computer Network and Information Security</source>
          <volume>12</volume>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijcnis.
          <year>2020</year>
          .
          <volume>03</volume>
          .01.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Baseri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Chouhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hafid</surname>
          </string-name>
          ,
          <article-title>Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols</article-title>
          ,
          <source>Computers and Security</source>
          <volume>142</volume>
          (
          <year>2024</year>
          )
          <fpage>103883</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lytvinenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Okladnoy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Suprun</surname>
          </string-name>
          ,
          <article-title>Description of the ofdm symbol with the help of mathematical laws. analysis of technologies that were used in this case</article-title>
          ,
          <source>in: Proceedings of the 2nd International Conference on Advanced Information and Communication Technologies (AICT)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>183</fpage>
          -
          <lpage>187</lpage>
          . doi:
          <volume>10</volume>
          .1109/AIACT.
          <year>2017</year>
          .
          <volume>8020095</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Fustii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Parkhomenko</surname>
          </string-name>
          ,
          <article-title>Evaluation of efectiveness of masking methods of aerial photographs</article-title>
          ,
          <source>in: Proceedings of the 3rd International Conference on Advanced Information and Communications Technologies (AICT)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>415</fpage>
          -
          <lpage>418</lpage>
          . doi:
          <volume>10</volume>
          .1109/AIACT.
          <year>2019</year>
          .
          <volume>8847820</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hahanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Slobodyanyuk</surname>
          </string-name>
          ,
          <article-title>Architectural presentation of isotopic levels of relief of images</article-title>
          ,
          <source>in: Experience of Designing and Application of CAD Systems in Microelectronics - Proceedings of the 10th International Conference (CADSM)</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>385</fpage>
          -
          <lpage>387</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shiryaev</surname>
          </string-name>
          ,
          <article-title>Quadrature compression of images in polyadic space</article-title>
          , in: Modern Problems of Radio Engineering, Telecommunications and Computer Science -
          <source>Proceedings of the 11th International Conference (TCSET)</source>
          ,
          <year>2012</year>
          , p.
          <fpage>422</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kharchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. O.</given-names>
            <surname>Shadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Musienko</surname>
          </string-name>
          ,
          <article-title>A method to control bit rate while compressing predicted frames</article-title>
          ,
          <source>in: Proceedings of the 13th International Conference on the Experience of Designing and Application of CAD Systems in Microelectronics (CADSM)</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>38</lpage>
          . doi:
          <volume>10</volume>
          .1109/CADSM.
          <year>2015</year>
          .
          <volume>723078</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>