Next Article in Journal
Two-Step Joint Optimization with Auxiliary Loss Function for Noise-Robust Speech Recognition
Next Article in Special Issue
High-Speed Path Probing Method for Large-Scale Network
Previous Article in Journal
Deep Learning Empowered Structural Health Monitoring and Damage Diagnostics for Structures with Weldment via Decoding Ultrasonic Guided Wave
Previous Article in Special Issue
Direct Spread Spectrum Technology for Data Hiding in Audio
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Permutation-Based Block Code for Short Packet Communication Systems

1
Faculty of Information Technology and Systems, Cherkasy State Technological University, 18006 Cherkasy, Ukraine
2
State Scientific and Research Institute of Cybersecurity Technologies and Information Protection, 03142 Kyiv, Ukraine
3
GoodLabs Studio Inc., Toronto, ON M5H 3E5, Canada
4
Department of Computer Science and Automatics, University of Bielsko-Biala, 43-309 Bielsko-Biala, Poland
*
Authors to whom correspondence should be addressed.
Sensors 2022, 22(14), 5391; https://doi.org/10.3390/s22145391
Submission received: 23 June 2022 / Revised: 14 July 2022 / Accepted: 17 July 2022 / Published: 19 July 2022

Abstract

:
This paper presents an approach to the construction of block error-correcting code for data transmission systems with short packets. The need for this is driven by the necessity of information interaction between objects of machine-type communication network with a dynamically changing structure and unique system of commands or alerts for each network object. The codewords of a code are permutations with a given minimum pairwise Hamming distance. The purpose of the study is to develop a statistical method for constructing a code, in contrast to known algebraic methods, and to investigate the code size. An algorithm for generating codewords has been developed. It can be implemented both by enumeration of the full set of permutations, and by enumeration of a given number of randomly selected permutations. We have experimentally determined the dependencies of the average and the maximum values of the code size on the size of a subset of permutations used for constructing the code. A technique for computing approximation quadratic polynomials for the determined code size dependencies has been developed. These polynomials and their corresponding curves estimate the size of a code generated from a subset of random permutations of such a size that a statistically significant experiment cannot be performed. The results of implementing the developed technique for constructing a code based on permutations of lengths 7 and 11 have been presented. The prediction relative error of the code size did not exceed the value of 0.72% for permutation length 11, code distance 9, random permutation subset size 50,000, and permutation statistical study range limited by 5040.

1. Introduction

The volume of information transfer including confidential information is continuously growing. According to the Statista Research Department report [1], over the next years up to 2025, global data creation is projected to grow to more than 180 zettabytes. A competitive environment has been created for designing and improving both attack systems and information security systems. These circumstances lead to an increase in the mathematical and logical complexity and degree of intellectualization of the used algorithms, processes, and technical means. As a result, the effectiveness and dependability [2] (reliability and security) of telecommunication systems and networks, as well as their components that implement data protection functions need to be improved.
Integrating methods of channel coding and cryptographic protection, or secure channel coding schemes, is one of the ways to increase the efficiency of information-processing tools, as well as to ensure data protection during its storage and transmission in telecommunication systems and networks.
Note that short packet transmission [3] is a key feature of modern wireless systems, ultra-reliable networks, sensor networks, massive machine-type communications (MTC), and IoT applications [4]. The prevalence of such systems and networks in the modern world requires the creation of new and the adaptation of existing approaches, to ensure the transmitted information integrity and confidentiality. In particular, the resources performance necessary for channel coding and cryptographic protection as well as the resources speed can play a decisive role.
This study considers an information interaction of MTC objects in a network with a dynamically changing structure. Each object of such a network, for example, a dynamic wireless sensor network [5], has its own unique system of commands or alerts. This system of commands or alerts forms an ensemble of messages to be agreed between the object of information interaction and other network participants.

1.1. Related Literature

Currently known secure-channel coding schemes are based on the McEliece cryptosystem [6,7,8,9], universal stochastic coding [10,11], ‘golden’ cryptography [12,13], perfect algebraic constructions [14,15], and the use of permutations [16,17].
This study develops an approach using permutations.
The methodology of integrated-information security based on non-separable factorial coding [18,19] uses a subset of the set of permutations π of numbers { 0 ; 1 ; ; M 1 } as codewords. Each number { 0 ; 1 ; ; M 1 } is encoded by a binary code with a fixed length of l r = log 2 M bits. Such information conversion allows getting a non-standard and redundant frame structure that does not require a separate field for the syncword, allows maintaining frame synchronization on the data signal, and allows the non-separable factorial code being used as a transport mechanism in short packet communications [20,21,22,23,24,25,26,27]. The cost of including syncwords is not negligible in such systems [28,29,30]. Using a non-separable factorial code makes it possible to effectively search for frame boundaries even with a bit error rate close to 0.5, which is important for information transmission under the conditions of strong noise [31,32]. In addition, non-separable factorial coding may be a suitable tool to implement a cross-layer integrated approach to security and achieve secure short-packet communication from the perspective of both cryptography and physical layer security [26,27].
Previous studies [33,34] investigate the ability of a non-separable factorial code to detect and correct communication channel errors. The efficiency of the code has been proven, which is achieved, among other factors, due to its synchronization properties [31,32]. The studies [33,34] use the binary Hamming distance between codewords.
In this paper, similarly to the error-correcting Reed-Solomon coding [35], we will consider symbols as elements of a codeword. This approach is of interest to ensure reliable transmission of permutations, in particular, for a three-pass cryptographic protocol based on permutations [36].
We introduce the following definition to distinguish between the binary Hamming distance used in previous studies [33,34] and the Hamming distance between permutations of symbols { 0 ; 1 ; ; M 1 } .
Definition 1.
The symbol Hamming distance D i j between two permutations π i and π j is the number of symbol positions in which permutations π i and π j are different.
It is obvious that D i j = D j i and 0 D i j M . In addition, D i j = 0 if and only if π i = π j .
Definition 2.
A block code ( M , D m i n ) is a code generated with a subset of permutations of length M with symbol Hamming distance D i j D m i n .
In this case, D m i n is the symbol code distance.
Let N ( M , D m i n ) be the ( M , D m i n ) -code size equal to the number of its codewords.
Since the code size N ( M , D m i n ) determines the amount of information transmitted by each codeword equal to log 2 ( N ( M , D m i n ) ) bits, the use of a ( M , D m i n ) -code of the maximum size is the most efficient in terms of channel capacity. The last statement also follows from the central problem of coding theory [37,38].
In the literature [39], the ( M , D m i n ) -codes are called error correcting permutation codes. These codes are used for error correction of powerline communications using M-ary frequency shift keying modulation [40].
There are lower bounds for N ( M , D m i n ) (in particular, Gilbert–Varshamov bounds and their improvements) as well as algebraic techniques for constructing ( M , D m i n ) -codes [39,41,42,43,44,45,46,47]. For example, N ( M , 2 ) = N ( M , 1 ) = M ! , N ( M , 3 ) = M ! / 2 , if M is a prime power then N ( M , M 1 ) = M ( M 1 ) and N ( M + 1 , M 1 ) = ( M + 1 ) M ( M 1 ) [41], N ( 11 , 8 ) = 7920 and N ( 12 , 8 ) = 95 , 040 [42]. Studies [39,43] use automorphism groups to provide N ( M , D m i n ) lower bounds. The authors of the literature [44] use permutations invariant under isometries. The study [45,46] uses sequential partition and extension, parallel partition and extension, and a modified Kronecker product operation. The recent study [47] improves N ( M , D m i n ) lower bounds using permutation rational functions.
In this study, in contrast to known algebraic methods, we present a statistical method for constructing a ( M , D m i n ) -code and estimating its size N ( M , D m i n ) . We also take into account the fact that the ( M , D m i n ) -code must be unique for each object in the dynamic wireless sensor network, and the code agreement between the participants of the information exchange process can take place by applying a cryptographic protocol [36]. In such conditions, increasing the variability and unpredictability of the codeword ensemble is a necessary key condition for ensuring the protocol strength.

1.2. Main Contributions

We will generate codewords for a ( M , D m i n ) -code by enumerating a set of permutations { π } of length M and selecting permutations with the symbol Hamming distance to all preselected permutations not exceeding the D m i n value. Constructing a ( M , D m i n ) -code is complicated by the fact that when M increases, it is practically impossible to generate M ! permutations.
The goal of the study is to determine the dependence of the code size N ( M , D m i n ) on the values of M and D m i n when using the proposed statistical method.
To achieve this goal, the following tasks must be solved.
  • A statistical algorithm to generate codewords for a ( M , D m i n ) -code must be developed and implemented.
  • An analysis of the distribution frequency of a random value N ( M , D m i n ) for a given number of implementations of the codeword generating algorithm must be performed. The distribution law for N ( M , D m i n ) must be determined.
  • The dependences of the average and the maximum ( M , D m i n ) -code size, its standard deviation from the parameters M and D m i n must be explored.
  • A technique to estimate a ( M , D m i n ) -code size depending on parameters M and D m i n must be developed and applied.

1.3. Paper Structure

This paper is organized as follows: Section 2 describes an algorithm to generate a set of codewords, analyses the dependence of the ( M , D m i n ) -code size on the values of M and D m i n , and presents a technique for constructing an approximation polynomial for the code size dependencies; Section 3 shows the results of implementing the developed technique for M = 11 and discusses the results, and Section 4 is the conclusion.

2. Materials and Methods

2.1. Algorithm to Generate Codewords

Figure 1 shows the algorithm to generate a set of codewords of a ( M , D m i n ) -code.
Initially the set of codewords does not contain permutations. The initial complete set of M ! permutations is generated randomly. The first permutation is selected and placed into the set of codewords being generated. Then the second permutation is selected and the Hamming distance to the first codeword is calculated for it. If the calculated distance is no less than the given D m i n value, the second permutation is also placed into the set of codewords. Otherwise, the next permutation from the initial set is selected. We continue the process of selecting permutations, calculating the Hamming distances to all selected codewords, and placing the permutation into the set of codewords if all calculated Hamming distances are no less than D m i n till all permutations of the initial set have been enumerated. After that, the number of permutations in the set of codewords is counted.
Constructing of a complete set of M ! permutations can be implemented both by generating them in a certain, for example, lexicographic order with subsequent mixing, and by using random factorial numbers [ 0 ; M ! 1 ] and their bijective transformation into permutations. At the same time, storing the permutation numbers (or the corresponding factorial numbers) instead of the permutations reduces the required amount of memory; however, due to additional transformations, it leads to an increase in the time to generate and output a permutation.
To reduce the amount of memory required to store the full set of M ! permutations, the initial set of permutations can be generated simultaneously with their analysis. In this case, in the algorithm of Figure 1, there is no block for generating the initial set of permutations, and the block for selecting the next permutation is replaced by a block for generating the next permutation (Figure 2).
At the same time, the uniqueness check of the generated permutation is additionally implemented in the new block. Table 1 shows estimates of the mathematical expectation N ¯ ( M , D m i n ) and the standard deviation σ ( N ( M , D m i n ) ) of the code size, as well as its maximum value N m a x ( M , D m i n ) obtained as a result of implementing the algorithm shown in Figure 1 for 10,000 experiments with M = 7 and D m i n = { 4 , 5 , 6 } .
Figure 3 shows a histogram of the distribution of a random value N ( M , D m i n ) for M = 7 and D m i n = 4 .
Let the null hypothesis state that the distribution of a random value N ( 7 , 4 ) corresponds to a normal distribution. The use of Pearson’s chi-squared test χ 2 [48] indicates that there is no reason to reject the null hypothesis with the achieved p-value (significance level) of 0.2768.
The normality of the distribution of a random value N ( M , D m i n ) is also confirmed for M = 7 and D m i n = 5 : p value = 0.6313 . However, p value = 0.0000 for M = 7 and D m i n = 6 .
Note that as the value of M increases, the implementation of the algorithm shown in Figure 1 becomes more difficult, since the generation of a complete set of M ! permutations requires a significant amount of memory and processor time (Figure 4). For example, storing of M ! = 39 , 916 , 800   ( M = 11 ) permutations using a fixed length binary code to encode permutation symbols requires 209.37 MB of memory; for M = 15 this amount is 8.92 TB. These calculations do not take into account the need to store service information. If we add service information then the memory amount required to form a complete set of permutations in the Python programming language [49] is 67 MB for M = 9 , 667 MB for M = 10 , 7.15 GB for M = 11 , and 70 GB for M = 12 . It is possible to somewhat reduce the amount of used memory by optimizing the program code. However, it is almost impossible to implement the algorithm shown in Figure 1 on a standard modern workstation when M 12 .
The average time to generate one permutation was determined experimentally by generating 1,000,000 permutations of a given length M .
All experiments in this research were implemented in the Python programming language [49] using the PyCharm Community Edition 2020.3 [50] integrated development environment on a desktop personal computer with the following parameters:
  • OS—Windows 10
  • CPU—Intel Core i5-10400F
  • RAM 32Gb (2x16Gb dual channel 3200Mhz)
  • GPU—GeForce GTX 1650 4Gb
  • Hard Drive—SSD M.2 2280 1TB Samsung
Here, we provide the possibility to construct a ( M , D m i n ) -code for the values of M that do not allow generating M ! permutations in practice.
The approach proposed in this study is based on the following. The algorithm to generate a set of codewords shown in Figure 1 is preserved. At the same time, the initial set of permutations is a proper subset of the complete set of M ! permutations. The size of such a proper subset is denoted by N l i m .

2.2. Algorithms to Generate the Initial Set of N l i m Random Permutations

Permutations of the initial set will also be generated randomly. Here, we consider two algorithms:
  • Generating a random integer decimal number in the range [ 0 ; M ! 1 ] , converting the decimal number into a factorial number using division operations [51], and then converting the factorial number into a permutation [51];
  • Randomly generating individual digits of a factorial number and converting the factorial number into a permutation.
For example, permutation π = ( 3 , 2 , 4 , 0 , 1 , 5 , 6 ) with the basic permutation π 0 = ( 0 , 1 , 2 , 3 , 4 , 5 , 6 ) can be generated with both the first and the second algorithm. The first algorithm: A decimal number A = 2448 10 is generated, converted into a factorial number A = 3220000 F = 3 6 ! + 2 5 ! + 2 4 ! + 0 3 ! + 0 2 ! + 0 1 ! + 0 0 ! , and then converted into a permutation syndrome [52] S F = ( 3 , 2 , 2 , 0 , 0 , 0 , 0 ) and a permutation π = ( 3 , 2 , 4 , 0 , 1 , 5 , 6 ) itself. The second algorithm: Each element of the syndrome S F = ( 3 , 2 , 2 , 0 , 0 , 0 , 0 ) is generated separately and is then converted into a permutation π = ( 3 , 2 , 4 , 0 , 1 , 5 , 6 ) .
Both of the above algorithms to generate the initial set of permutations control the uniqueness of permutations within the set (Figure 5).
Note that the above algorithms to generate N l i m permutations can also be applied in the block for generating the next permutation of the algorithm in Figure 2. In this case, the algorithms will output the permutation for analysis instead of writing it to the memory.
Comparing the speed of the two algorithms for generating random permutations shown in Figure 5, we evaluated the performance of only the distinctive parts of the presented algorithms, the procedures for generating factorial numbers. The average time to generate one factorial number (Figure 6) was calculated based on the results of the generation of 10,000 numbers.
The achieved graphs indicate that the time to generate a factorial number with the first algorithm (Figure 5) increases with an increase of the M value much faster than the second method. In addition, unlike the first algorithm, the processes for the second algorithm in Figure 5 are convenient for parallelization. This circumstance makes it possible to further increase the performance of the algorithm.
In this paper, we will use the second proposed algorithm to generate the initial set of N l i m random permutations, N l i m < M ! .

2.3. Dependence of the ( M , D m i n ) -Code Size on the Values of M , D m i n , and N l i m

We will use ( M , D m i n , N l i m ) to denote block factorial code ( M , D m i n ) formed by a subset of N l i m random permutations, and will use N ( M , D m i n , N l i m ) to denote the size of ( M , D m i n , N l i m ) -code.
Next, we determine the dependence of the size N ( M , D m i n , N l i m ) on the value of N l i m . Such dependence can be used both to determine the required value of N l i m when designing a data transmission system with a ( M , D m i n ) -code, and to evaluate the efficiency of the code constructed from N l i m random permutations.
We will determine the dependence N ( M , D m i n , N l i m ) experimentally. In this case, the N l i m values are formed as follows.
Let t 0 = ln ( ln M ! ) . Then
ln ( ln N l i m ) = t 0 Δ t ,
or
N l i m = exp ( exp ( t 0 Δ t ) ) ,
where Δ is a step; t = 0 , 1 , 2 , , T .
Let M = 7 . Here, we accept Δ = 0.04 for M = 7 . Values N l i m for t = 0 , 1 , 2 , , 30 are given in Table 2.
Similarly to Figure 3, Figure 7 shows the histograms of the distribution of a random value N ( M , D m i n , N l i m ) for N l i m = { 13 ; 14 ; 18 ; 23 ; 30 ; 46 } at M = 7 and D m i n = 4 , constructed as a result of 10,000 experiments.
By analogy with the distribution of a random value N ( 7 , 4 ) , we accept the null statistical hypothesis, which states that a random variable N ( 7 , D m i n , N l i m ) is normally distributed. We apply Pearson’s chi-square test to test the null hypothesis. Table 3 shows the p-values obtained for N ( 7 , D m i n , N l i m ) at D m i n = { 4 , 5 , 6 } and N l i m from Table 2.
In Table 3, the green highlights the cases where the normal distribution for N ( 7 , D m i n , N l i m ) at the significance level of α = 0.05 is confirmed; and the red highlights the cases where the normal distribution for N ( 7 , D m i n , N l i m ) is not confirmed. These results can serve as evidence that at large D m i n values the normal distribution begins to be observed at smaller values of N l i m .
Figure 8 shows the graphs of estimates of the mathematical expectation N ¯ ( M , D m i n , N l i m ) , standard deviation σ ( N ( M , D m i n , N l i m ) ) , and the maximum value N m a x ( M , D m i n , N l i m ) of the ( M , D m i n ) -code size against the value N l i m . The curves on Figure 8 are obtained as a result of 10,000 experiments for M = 7 and D m i n = { 4 , 5 , 6 } .
Figure 8 also shows the approximation curves [53] and equations, as well as the approximation reliability coefficient R 2 for the dependences of estimates of the mathematical expectation N ¯ ( M , D m i n , N l i m ) and the maximum value N m a x ( M , D m i n , N l i m ) . The R 2 close to unity indicates an accurate description of the dependencies N ¯ ( 7 , D m i n , N l i m ) and N m a x ( 7 , D m i n , N l i m ) for D m i n = { 4 , 5 , 6 } by a second-degree polynomial of the form y = a x 2 + b x + c . Table 4 summarizes the coefficients a , b , c for the N ¯ ( 7 , D m i n , N l i m ) and N m a x ( 7 , D m i n , N l i m ) approximation polynomials.
Note that x = T t + 1 according to Equation (2). Then the approximation functions can be easily calculated by setting the values of t for the required N l i m .

2.4. Technique for Constructing an Approximation Polynomial

To construct approximations for dependencies N ¯ ( M , D m i n , N l i m ) and N m a x ( M , D m i n , N l i m ) and, if necessary, to perform extrapolation to predict the behaviour of these functions at N l i m values exceeding the upper limit of the range of their statistical study, it is necessary to perform the next steps:
  • To calculate t 0 = ln ( ln M ! ) , to set Δ and T values, and to calculate t min = t 0 Δ T ;
  • To generate dependencies N ¯ ( M , D m i n , N l i m ) and N m a x ( M , D m i n , N l i m ) for the range of N l i m values determined in accordance with (2);
  • To determine approximation polynomials for N ¯ ( M , D m i n , N l i m ) and N m a x ( M , D m i n , N l i m ) .
It is also possible to select the values of N l i m for constructing dependencies N ¯ ( M , D m i n , N l i m ) and N m a x ( M , D m i n , N l i m ) in the opposite direction with respect to (1), from the smallest to the largest. In this case, the method to obtain approximations is as follows:
  • Values of t min , Δ , and T are chosen. Values of N l i m are calculated using an expression
    N l i m = exp ( exp ( t m i n + Δ t ) ) ,
    where t = 0 , 1 , 2 , , T . It’s obvious that T ( ln ( ln M ! ) t m i n ) / Δ ;
  • Dependences N ¯ ( M , D m i n , N l i m ) and N m a x ( M , D m i n , N l i m ) are also formed for the range of N l i m values determined in accordance with (3);
  • Quadratic approximation polynomials are calculated for N ¯ ( M , D m i n , N l i m ) and N m a x ( M , D m i n , N l i m ) .
To obtain approximation polynomials of the form y = a t 2 + b t + c in the obtained expressions of the form y = a x 2 + b x + c , it is necessary to perform the replacement x = t + 1 .

3. Results

Here, we apply the developed method for M = 11 when it is necessary to predict the average and the maximum number of codewords with D m i n = 9 formed by N l i m = 30 , 000 and N l i m = 50 , 000 random permutations.
To construct approximations, we use the N l i m values given in Table 2 for the step Δ = 0.04 at t 0 = ln ( ln 7 ! ) = 2.1430 . Figure 9 shows the graphs of the estimates of the mathematical expectation N ¯ ( 11 , 9 , N l i m ) and the maximum value N m a x ( 11 , 9 , N l i m ) of the code size ( 11 , 9 , N l i m ) against the value N l i m = { 13 ; 16 ; 20 ; ; 2617 ; 5040 } . Each value of N ¯ ( 11 , 9 , N l i m ) and N m a x ( 11 , 9 , N l i m ) was formed as a result of 10,000 experiments.
If we place values N l i m = 30 , 000 and N l i m = 50 , 000 into the expression (1) ln ( ln N l i m ) = t 0 Δ t , and calculate the corresponding values of t = 1 0.04 ln ln 5040 ln N l i m , we can get t ( N l i m = 30 , 000 ) = 4 . 7498 , t ( N l i m = 50 , 000 ) = 5 . 9588 . Note that x = T t + 1 , T = 30 . Then the predicted values N ¯ ( 11 , 9 , N l i m ) and N m a x ( 11 , 9 , N l i m ) are equal to 73.3836 and 81.2250 for N l i m = 30 , 000 and 77.1631 and 84.8191 for N l i m = 50 , 000 .
Figure 10 shows the histograms of the distribution of random values N ( 11 , 9 , 3 × 10 4 ) and N ( 11 , 9 , 5 × 10 4 ) constructed as a result of K = 30 experiments. The resulting average values are 72.8667 and 76.5667 (maximum values are 76 and 81).
Here, we determine the confidence interval for the obtained sample means [54]:
N s a m p l e ¯ ( M , D m i n , N l i m ) s K t α , K 1 < N ¯ ( M , D m i n , N l i m ) < N s a m p l e ¯ ( M , D m i n , N l i m ) + s K t α , K 1 ,
where N s a m p l e ¯ ( M , D m i n , N l i m ) is the sample mean;
s = K K 1 σ s a m p l e is the corrected sample standard deviation, σ s a m p l e is the sample standard deviation;
K is the number of experiments ( K = 30 ) ;
t α / 2 , K 1 is the the upper α / 2 quantile of Student’s t-distribution with K 1 degrees of freedom.
Let α = 0.05 . Then, the confidence interval is ( 72.1346 ; 73.5987 ) for N ¯ ( 11.9 , 3 × 10 4 ) , and it is ( 75.8825 ; 77.2509 ) for N ¯ ( 11.9 , 5 × 10 4 ) .
The predicted values of 73.3836 and 77.1631 fall within the indicated confidence intervals.
Then, let Δ = 0.08 when t 0 = ln ( ln 7 ! ) = 2.1430 . Figure 11 shows the graphs of the estimates of the mathematical expectation N ¯ ( 11 , 9 , N l i m ) and the maximum value N m a x ( 11 , 9 , N l i m ) of the ( 11 , 9 , N l i m ) -code size against the value N l i m = { 13 ; 16 ; 20 ; ; 2617 ; 5040 } . Each value of N ¯ ( 11 , 9 , N l i m ) and N m a x ( 11 , 9 , N l i m ) was formed as a result of 10,000 experiments.
By placing values N l i m = 30 , 000 and N l i m = 50 , 000 into the expression (1) ln ( ln N l i m ) = t 0 Δ t , and calculating the corresponding values of t = 1 0.08 ln ln 5040 ln N l i m we get t ( N l i m = 30 , 000 ) = 2 . 3749 , t ( N l i m = 50 , 000 ) = 2 . 9794 . Taking into account that x = T t + 1 , T = 15 , the predicted values N ¯ ( 11 , 9 , N l i m ) and N m a x ( 11 , 9 , N l i m ) are equal to 73.3922 and 80.8342 for N l i m = 30 , 000 and 77.1775 and 84.3992 for N l i m = 50 , 000 .
Let the step Δ be further increased. Table 5 summarizes the predicted values N ¯ ( 11 , 9 , N l i m ) and N m a x ( 11 , 9 , N l i m ) for N l i m = 30 , 000 and N l i m = 50 , 000 when Δ = { 0.04 ; 0.08 ; 0.012 ; ; 0.4 ; 0.44 } .
Table 5 shows that all predicted values fall within the indicated confidence intervals ( 72.1346 ; 73.5987 ) for N ¯ ( 11.9 , 3 × 10 4 ) and ( 75.8825 ; 77.2509 ) for N ¯ ( 11.9 , 5 × 10 4 ) .
Here, we calculate and present in Table 6 the relative prediction error for the values given in Table 5. We assume that the maximum number of reference points ( T = 30 ) forms the most accurate prediction.
The results in Table 6 indicate that three points as far as possible from each other ( T = 2 ) are sufficient to obtain an approximation curve (an approximation polynomial of the second degree). At the same time, the authors recommend using four points ( T = 3 ) to construct such a curve.
Here, we discuss the study results.
The proposed algorithm to generate codewords allows for the provision of the necessary technical result of constructing ( M , D m i n ) -code with the required code distance. However, the obtained N ( M , D m i n ) values do not reach the known lower bounds [39,41,42,43,44,45,46,47]. For example, N m a x ( 11 , 9 , 5040 ) = 67 . At the same time, paper [39] gives the lower bound of 154 for the ( 11 , 9 ) -code size. The corresponding values for M = 7 are N m a x ( 7 , 6 , 5040 ) = 19 vs. the lower bound of 42 and N m a x ( 7 , 5 , 5040 ) = 57 vs. the lower bound of 77 in [39]. However, we cannot say that the result is negative. First, in this study, we used not an algebraic, but a statistical method for code construction. Second, the proposed statistical method, unlike the algebraic method, allows for the construction of a unique system of commands or alerts for dynamic wireless sensor network objects. Note also that increasing the N ( M , D m i n ) -code size may lead to a decrease in the number of different possible ( M , D m i n ) -codes, which can be constructed for the defined values of M , D m i n , and N l i m . In turn, the number of different possible ( M , D m i n ) -codes is important for applying the ( M , D m i n ) -code both in secure-channel coding schemes and for constructing a unique system of commands or alerts for MTC objects. At the same time, we do not deny the need to continue the search for new effective and fast statistical methods for ( M , D m i n ) -code construction or to improve the proposed method. Determining the balance between the ( M , D m i n ) -code size and the number of possible different ( M , D m i n ) -codes is an actual problem that can be the subject for further research.
The study has shown that the relative error in predicting the size of ( M , D m i n ) -code increases with increasing the hypothetical number N l i m of permutations in the initial set, as well as with increasing the step Δ . However, the nature of this dependence is not obvious and can be further investigated.

4. Conclusions

In this paper, we have developed and implemented a statistical algorithm to generate codewords of a ( M , D m i n ) -code by enumerating a set of permutations { π } of length M and selecting permutations with the symbol Hamming distance to all preselected codewords not exceeding the D m i n value.
We applied two algorithms to generate a random factorial number. The first algorithm is based on the conversion from a random decimal number by division, and the second algorithm is based on the random generation of individual digits of a factorial number. We found that the second method is faster.
We have determined experimentally the dependences of the average and the maximum values of the size N ( M , D m i n , N l i m ) of a ( M , D m i n ) -code constructed from a subset of N l i m permutations, on the value of N l i m .
A technique to compute approximation quadratic polynomials for the determined dependences of the average and the maximum values of the ( M , D m i n ) -code size has been developed. A key feature of this technique is to use the function (1) of a double logarithm ln ( ln N l i m ) and to use a quadratic polynomial. The approximation polynomials and their corresponding curves can be used to extrapolate the dependencies and predict their behavior at N l i m values exceeding the upper limit of their statistical study range.
Finally, we confirmed the effectiveness of the developed technique to estimate the average and the maximum size values N ( 11.9 , N l i m ) for N l i m = 30 , 000 and N l i m = 50 , 000 at the upper limit of the statistical study range N l i m = 5040 . The prediction relative error of ( M , D m i n ) -code size did not exceed the value of 0.72% obtained for N l i m = 50 , 000 and Δ = 0.44 .

Author Contributions

Conceptualization, E.F. and A.S.; methodology, E.F., A.S., M.M., B.S. and J.N.; software, M.M. and B.S.; validation, M.M., B.S. and R.S.; investigation, A.S., M.M., E.F. and B.S.; writing—original draft preparation, E.F., A.S. and J.N.; writing—review and editing, E.F., A.S., M.M. and B.S.; funding acquisition, E.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partly funded by the Ministry of Education and Science of Ukraine, grant number 0120U102607.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

All initial data, program codes will be provided upon request to the correspondent’s e-mail with appropriate justification.

Acknowledgments

The authors thank the anonymous reviewers for their useful comments that helped to improve this paper. The authors are grateful to Valerii Shvydkyi for helpful remarks and discussions.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Statista Research Department. Volume of Data/Information Created, Captured, Copied, and Consumed Worldwide from 2010 to 2025. Available online: https://www.statista.com/statistics/871513/worldwide-data-created/ (accessed on 22 June 2022).
  2. Avizienis, A.; Laprie, J.-C.; Randell, B. Fundamental Concepts of Dependability; Department of Computing Science Technical Report Series; Department of Computing Science, University of Newcastle upon Tyne: Newcastle upon Tyne, UK, 2001; p. 21. [Google Scholar]
  3. Durisi, D.; Liva, G.; Polyanskiy, Y. Short-Packet Transmission. In Information Theoretic Perspectives on 5G Systems and Beyond; Marić, I., Shamai (Shitz), S., Simeone, O., Eds.; Cambridge University Press: Cambridge, UK, 2022. [Google Scholar]
  4. Mahmood, N.H.; Böcker, S.; Moerman, I.; López, O.A.; Munari, A.; Mikhaylov, K.; Clazzer, F.; Bartz, H.; Park, O.-S.; Mercier, E.; et al. Machine Type Communications: Key Drivers and Enablers towards the 6G Era. J. Wirel. Com. Netw. 2021, 2021, 134. [Google Scholar] [CrossRef]
  5. Elhoseny, M.; Hassanien, A.E. Dynamic Wireless Sensor Networks: New Directions for Smart Technologies. In Studies in Systems, Decision and Control, 1st ed.; Springer: Berlin/Heidelberg, Germany, 2019; ISBN 978-3-319-92807-4. [Google Scholar]
  6. McEliece, R.J. A Public-Key Criptosystem Based on Algebraic Theory; Jet Propulsi on Lab: Pasadena, CA, USA, 1978; pp. 114–116. [Google Scholar]
  7. Rao, T.R.N. Joint Encryption and Error Correction Schemes. In Proceedings of the 11th Annual International Symposium on Computer Architecture—ISCA ’84, Ann Arbor, MI, USA, 5–7 June 1984; ACM Press: New York, NY, USA, 1984; pp. 240–241. [Google Scholar]
  8. Niederreiter, H. Knapsack-Type Cryptosystems and Algebraic Coding Theory. Prob. Control Inf. Theory 1986, 15, 159–166. [Google Scholar]
  9. Rao, T.R.N.; Nam, K.-H. Private-Key Algebraic-Coded Cryptosystems. In Advances in Cryptology—CRYPTO’ 86; Odlyzko, A.M., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1987; Volume 263, pp. 35–48. ISBN 978-3-540-18047-0. [Google Scholar]
  10. Kløve, T.; Korzhik, V.I. Error Detecting Codes: General Theory and Their Application in Feedback Communication Systems; Kluwer Academic Publishers: Boston, MA, USA, 1995; ISBN 978-0-7923-9629-1. [Google Scholar]
  11. Kløve, T. Codes for Error Detection; Series on Coding Theory and Cryptology; World Scientific: Singapore, 2007; Volume 2, ISBN 978-981-270-586-0. [Google Scholar]
  12. Stakhov, A.P. The “Golden” Matrices and a New Kind of Cryptography. Chaos Solitons Fractals 2007, 32, 1138–1146. [Google Scholar] [CrossRef]
  13. Stakhov, A.P. The Golden Section, Fibonacci Numbers, Mathematics of Harmony and “Golden” Scientific Revolution. Comput. Sci. Cybersecur. 2016, 2016, 31–68. [Google Scholar]
  14. Mazurkov, M.I.; Chechel’nitskii, V.Y.; Murr, P. Information Security Method Based on Perfect Binary Arrays. Radioelectron. Commun. Syst. 2008, 51, 612–614. [Google Scholar] [CrossRef]
  15. Mazurkov, M.I.; Chechelnytskyi, V.Y.; Nekrasov, K.K. Three-Level Cryptographic System for Block Data Encryption. Radioelectron. Commun. Syst. 2010, 53, 376–379. [Google Scholar] [CrossRef]
  16. Borisenko, A.A.; Kalashnikov, V.V.; Kulik, I.A.; Goryachev, A.E. Generation of Permutations Based Upon Factorial Numbers. In Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, Kaohiung, Taiwan, 26 November 2008; IEEE Computer Society: Washington, DC, USA, 2008; pp. 57–61. [Google Scholar]
  17. Borysenko, A.A.; Horiachev, O.Y.; Matsenko, S.M.; Kobiakov, O.M. Noise-Immune Codes Based on Permutations. In Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kiev, Ukraine, 24–27 May 2018; IEEE: Washington, DC, USA, 2018; pp. 609–612. [Google Scholar]
  18. Al-Azzeh, J.S.; Ayyoub, B.; Faure, E.; Shvydkyi, V.; Kharin, O.; Lavdanskyi, A. Telecommunication Systems with Multiple Access Based on Data Factorial Coding. Int. J. Commun. Antenna Propag. 2020, 10, 102–113. [Google Scholar] [CrossRef]
  19. Faure, E.; Shcherba, A.; Vasiliu, Y.; Fesenko, A. Cryptographic Key Exchange Method for Data Factorial Coding. CEUR Workshop Proc. 2020, 2654, 643–653. [Google Scholar]
  20. Durisi, G.; Koch, T.; Popovski, P. Toward Massive, Ultrareliable, and Low-Latency Wireless Communication With Short Packets. Proc. IEEE 2016, 104, 1711–1726. [Google Scholar] [CrossRef] [Green Version]
  21. Lee, B.; Park, S.; Love, D.J.; Ji, H.; Shim, B. Packet Structure and Receiver Design for Low Latency Wireless Communications With Ultra-Short Packets. IEEE Trans. Commun. 2018, 66, 796–807. [Google Scholar] [CrossRef]
  22. Bana, A.-S.; Trillingsgaard, K.F.; Popovski, P.; de Carvalho, E. Short Packet Structure for Ultra-Reliable Machine-Type Communication: Tradeoff between Detection and Decoding. In Proceedings of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB, Canada, 15–20 April 2018; IEEE: Washington, DC, USA, 2018; pp. 6608–6612. [Google Scholar]
  23. Salamat Ullah, S.; Liew, S.C.; Liva, G.; Wang, T. Short-Packet Physical-Layer Network Coding. IEEE Trans. Commun. 2020, 68, 737–751. [Google Scholar] [CrossRef]
  24. Salamat Ullah, S.; Liew, S.C.; Liva, G.; Wang, T. Implementation of Short-Packet Physical-Layer Network Coding. IEEE Trans. Mob. Comput. 2021, 20, 1. [Google Scholar] [CrossRef]
  25. Wu, J.; Kim, W.; Shim, B. Pilot-Less One-Shot Sparse Coding for Short Packet-Based Machine-Type Communications. IEEE Trans. Veh. Technol. 2020, 69, 9117–9120. [Google Scholar] [CrossRef]
  26. Feng, C.; Wang, H. Secure Short-Packet Communications at the Physical Layer for 5G and Beyond. arXiv 2021, arXiv:2107.05966. [Google Scholar] [CrossRef]
  27. Feng, C.; Wang, H.-M.; Poor, H.V. Reliable and Secure Short-Packet Communications. IEEE Trans. Wirel. Commun. 2022, 21, 1913–1926. [Google Scholar] [CrossRef]
  28. Nguyen, A.T.P.; Le Bidan, R.; Guilloud, F. Superimposed Frame Synchronization Optimization for Finite Blocklength Regime. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW), Marrakech, Morocco, 15–19 April 2019; IEEE: Washington, DC, USA, 2019; pp. 1–6. [Google Scholar]
  29. Nguyen, A.T.P.; Le Bidan, R.; Guilloud, F. Trade-Off Between Frame Synchronization and Channel Decoding for Short Packets. IEEE Commun. Lett. 2019, 23, 979–982. [Google Scholar] [CrossRef]
  30. Nguyen, A.T.P.; Guilloud, F.; Le Bidan, R. On the Optimization of Resources for Short Frame Synchronization. Ann. Telecommun. 2020, 75, 635–640. [Google Scholar] [CrossRef]
  31. Faure, E.; Shcherba, A.; Stupka, B. Permutation-Based Frame Synchronisation Method for Short Packet Communication Systems. In Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, 22 September 2021; IEEE: Washington, DC, USA, 2021; pp. 1073–1077. [Google Scholar]
  32. Al-Azzeh, J.; Faure, E.; Shcherba, A.; Stupka, B. Permutation-Based Frame Synchronization Method for Data Transmission Systems with Short Packets. Egypt. Inform. J. 2022, in press. [Google Scholar] [CrossRef]
  33. Faure, E.V. Factorial coding with data recovery. Visnyk Cherkaskogo Derzhavnogo Tehnol. Univ. 2016, 2, 33–39. [Google Scholar]
  34. Faure, E.V. Factorial Coding with Error Correction. Radio Electron. Comput. Sci. Control. 2017, 3, 130–138. [Google Scholar] [CrossRef] [Green Version]
  35. Reed, I.S.; Solomon, G. Polynomial Codes Over Certain Finite Fields. J. Soc. Ind. Appl. Math. 1960, 8, 300–304. [Google Scholar] [CrossRef]
  36. Shcherba, A.; Faure, E.; Lavdanska, O. Three-Pass Cryptographic Protocol Based on Permutations. In Proceedings of the 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine, 25 November 2020; IEEE: Washington, DC, USA, 2020; pp. 281–284. [Google Scholar]
  37. Conway, J.H.; Sloane, N.J.A. Sphere Packings, Lattices, and Groups, 3rd ed.; Springer: New York, NY, USA, 1999; ISBN 978-1-4757-6568-7. [Google Scholar]
  38. MacWilliams, F.J.; Sloane, N.J.A. The Theory of Error Correcting Codes; North Holland Mathematical Library; North Holland Publishing Co.: Amsterdam, The Netherlands, 1977; ISBN 978-0-444-85193-2. [Google Scholar]
  39. Smith, D.H.; Montemanni, R. A New Table of Permutation Codes. Des. Codes Cryptogr. 2012, 63, 241–253. [Google Scholar] [CrossRef]
  40. Vinck, A.J.H. Coded Modulation for Power Line Communications. arXiv 2011, arXiv:1104.1528. [Google Scholar] [CrossRef]
  41. Frankl, P.; Deza, M. On the Maximum Number of Permutations with given Maximal or Minimal Distance. J. Comb. Theory Ser. A 1977, 22, 352–360. [Google Scholar] [CrossRef] [Green Version]
  42. Dixon, J.D.; Mortimer, B. Permutation Groups; Springer: New York, NY, USA, 1996; ISBN 978-1-4612-0731-3. [Google Scholar]
  43. Chu, W.; Colbourn, C.J.; Dukes, P. Constructions for Permutation Codes in Powerline Communications. Des. Codes Cryptogr. 2004, 32, 51–64. [Google Scholar] [CrossRef]
  44. Janiszczak, I.; Lempken, W.; Östergård, P.R.J.; Staszewski, R. Permutation Codes Invariant under Isometries. Des. Codes Cryptogr. 2015, 75, 497–507. [Google Scholar] [CrossRef]
  45. Bereg, S.; Mojica, L.G.; Morales, L.; Sudborough, H. Kronecker Product and Tiling of Permutation Arrays for Hamming Distances. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; IEEE: Washington, DC, USA; pp. 2198–2202. [Google Scholar]
  46. Bereg, S.; Mojica, L.G.; Morales, L.; Sudborough, H. Constructing Permutation Arrays Using Partition and Extension. Des. Codes Cryptogr. 2020, 88, 311–339. [Google Scholar] [CrossRef] [Green Version]
  47. Bereg, S.; Malouf, B.; Morales, L.; Stanley, T.; Sudborough, I.H. Using Permutation Rational Functions to Obtain Permutation Arrays with Large Hamming Distance. Des. Codes Cryptogr. 2022, 90, 1659–1677. [Google Scholar] [CrossRef]
  48. Neyman, J.; Pearson, E.S. On the Use and Interpretation of Certain Test Criteria for Purposes of Statistical Inference: Part I. Biometrika 1928, 20A, 175. [Google Scholar] [CrossRef]
  49. Python 3.10.5 Documentation. Available online: https://docs.python.org/3/ (accessed on 2 June 2022).
  50. Other Versions—PyCharm Edu. Available online: https://www.jetbrains.com/pycharm/download/download-thanks.html?platform=windows&code=PCC (accessed on 2 June 2022).
  51. Borysenko, O.; Kulyk, I.; Horiachev, O. Electronic system for generating permutations based on factorial numbers. Her. Sumy State Univ. 2007, 1, 183–188. [Google Scholar]
  52. Faure, E.; Shvydkyi, V.; Shcherba, A. Method for Generating Reproducible and Unpredictable Sequence of Permutations. Bezpeka ìnf. 2014, 20, 253–258. [Google Scholar] [CrossRef]
  53. Celant, G.; Broniatowski, M. Interpolation and Extrapolation Optimal Designs 1: Polynomial Regression and Approximation Theory; Mathematics and Statistics; John Wiley: London, UK; Hoboken, NJ, USA, 2016; ISBN 978-1-84821-995-3. [Google Scholar]
  54. Meeker, W.Q.; Hahn, G.J.; Escobar, L.A. Statistical Intervals: A Guide for Practitioners and Researchers, 2nd ed.; Wiley series in Probability and Statistics; Wiley: Hoboken, NJ, USA, 2017; ISBN 978-0-471-68717-7. [Google Scholar]
Figure 1. Algorithm to generate a set of codewords.
Figure 1. Algorithm to generate a set of codewords.
Sensors 22 05391 g001
Figure 2. Algorithm to generate a set of codewords without storing the full set of permutations.
Figure 2. Algorithm to generate a set of codewords without storing the full set of permutations.
Sensors 22 05391 g002
Figure 3. Histogram of the distribution of a random value N ( 7 , 4 ) .
Figure 3. Histogram of the distribution of a random value N ( 7 , 4 ) .
Sensors 22 05391 g003
Figure 4. The required amount of memory and time to generate a complete set of M ! permutations.
Figure 4. The required amount of memory and time to generate a complete set of M ! permutations.
Sensors 22 05391 g004
Figure 5. Algorithms to generate the initial set of N l i m random permutations: (a) By division; (b) By generating digits.
Figure 5. Algorithms to generate the initial set of N l i m random permutations: (a) By division; (b) By generating digits.
Sensors 22 05391 g005
Figure 6. The average time to generate one factorial number using two different algorithms.
Figure 6. The average time to generate one factorial number using two different algorithms.
Sensors 22 05391 g006
Figure 7. Histograms of the distribution of a random variable N ( 7 , 4 , N l i m ) for: (a) N l i m = 13 ; (b) N l i m = 14 ; (c) N l i m = 18 ; (d) N l i m = 23 ; (e) N l i m = 30 ; (f) N l i m = 46 .
Figure 7. Histograms of the distribution of a random variable N ( 7 , 4 , N l i m ) for: (a) N l i m = 13 ; (b) N l i m = 14 ; (c) N l i m = 18 ; (d) N l i m = 23 ; (e) N l i m = 30 ; (f) N l i m = 46 .
Sensors 22 05391 g007
Figure 8. Graphs of N ¯ ( M , D m i n , N l i m ) , σ ( N ( M , D m i n , N l i m ) ) and N m a x ( M , D m i n , N l i m ) for M = 7 and: (a) D m i n = 4 ; (b) D m i n = 5 ; (c) D m i n = 6 .
Figure 8. Graphs of N ¯ ( M , D m i n , N l i m ) , σ ( N ( M , D m i n , N l i m ) ) and N m a x ( M , D m i n , N l i m ) for M = 7 and: (a) D m i n = 4 ; (b) D m i n = 5 ; (c) D m i n = 6 .
Sensors 22 05391 g008
Figure 9. Graphs N ¯ ( 11 , 9 , N l i m ) and N m a x ( 11 , 9 , N l i m ) when Δ = 0.04 .
Figure 9. Graphs N ¯ ( 11 , 9 , N l i m ) and N m a x ( 11 , 9 , N l i m ) when Δ = 0.04 .
Sensors 22 05391 g009
Figure 10. Histograms of the distribution of a random value N ( 11 , 9 , N l i m ) for: (a) N l i m = 30 , 000 ; (b) N l i m = 50 , 000 .
Figure 10. Histograms of the distribution of a random value N ( 11 , 9 , N l i m ) for: (a) N l i m = 30 , 000 ; (b) N l i m = 50 , 000 .
Sensors 22 05391 g010
Figure 11. Graphs N ¯ ( 11 , 9 , N l i m ) and N m a x ( 11 , 9 , N l i m ) when Δ = 0.08 .
Figure 11. Graphs N ¯ ( 11 , 9 , N l i m ) and N m a x ( 11 , 9 , N l i m ) when Δ = 0.08 .
Sensors 22 05391 g011
Table 1. Values of N ¯ ( M , D m i n ) , σ ( N ( M , D m i n ) ) , and N m a x ( M , D m i n ) for M = 7 and D m i n = { 4 , 5 , 6 } .
Table 1. Values of N ¯ ( M , D m i n ) , σ ( N ( M , D m i n ) ) , and N m a x ( M , D m i n ) for M = 7 and D m i n = { 4 , 5 , 6 } .
D m i n 456
N ¯ ( 7 , D m i n ) 199.678749.830515.1698
σ ( N ( 7 , D m i n ) ) 4.15321.66930.9384
N m a x ( M , D m i n ) 2175719
Table 2. Dependence of N l i m for M = 7 and Δ = 0.04 when t = 0 , 1 , 2 , , 30 .
Table 2. Dependence of N l i m for M = 7 and Δ = 0.04 when t = 0 , 1 , 2 , , 30 .
t N l i m t N l i m t N l i m t N l i m t N l i m t N l i m
05040681712195186324263013
1360876281315919542523
2261784881413020462620
3192293831510821402718
4142910303169022342816
5107511242177523302974
Table 3. p-values for N ( 7 , D m i n , N l i m ) .
Table 3. p-values for N ( 7 , D m i n , N l i m ) .
N l i m   \   D m i n 456
130.0000000.1934330.000002
140.0000000.3671690.000000
160.0000000.3800550.000090
180.0000000.5893500.000028
200.0000000.2880590.000000
230.0000000.7556970.000000
260.0000000.0003280.337444
300.0000120.0000490.000011
340.2999140.0000020.013646
400.0353420.0024160.000689
460.4213270.0080210.000055
540.6226450.0000000.000001
630.7557720.0003240.000297
750.8322530.0000870.000013
900.1040760.7132040.018065
1080.6532650.6471420.001913
1300.9780500.0101210.000001
1590.0762890.0000810.000449
1950.0615140.0038010.000813
2420.4272420.0662690.026604
3030.4898140.4103490.025393
3830.0440700.0531790.020188
4880.5276480.0769590.031807
6280.0007910.5947410.336770
8170.2423910.9260650.037511
10750.9496840.4705630.932577
14290.0193840.0386980.093501
19220.9125740.4289310.177253
26170.0852100.0854140.000893
36080.5452120.1430080.000000
50400.2767880.6312890.000000
Table 4. Coefficients of quadratic approximation polynomials for N ¯ ( 7 , D m i n , N l i m ) and N m a x ( 7 , D m i n , N l i m ) .
Table 4. Coefficients of quadratic approximation polynomials for N ¯ ( 7 , D m i n , N l i m ) and N m a x ( 7 , D m i n , N l i m ) .
N ¯ ( 7 , D m i n , N l i m ) N m a x ( 7 , D m i n , N l i m )
D m i n a b c a b c
40.2140−0.578213.76240.19540.607112.0047
50.02000.77027.44380.00881.176511.4452
60.00250.25544.87640.00300.23668.6812
Table 5. Predicted values N ¯ ( 11 , 9 , N l i m ) and N m a x ( 11 , 9 , N l i m ) for N l i m = 30 , 000 and N l i m = 50 , 000 depending on the step Δ value.
Table 5. Predicted values N ¯ ( 11 , 9 , N l i m ) and N m a x ( 11 , 9 , N l i m ) for N l i m = 30 , 000 and N l i m = 50 , 000 depending on the step Δ value.
Δ T Expected N ¯ ( 11 , 9 , N l i m )   Expected N m a x ( 11 , 9 , N l i m )  
N l i m = 30 , 000   N l i m = 50 , 000   N l i m = 30 , 000   N l i m = 50 , 000  
0.043073.383677.163181.225084.8191
0.081573.392277.177580.834284.3992
0.121073.318077.094080.197483.6976
0.16773.248677.010179.679683.1427
0.20673.284977.055179.452782.8157
0.24573.295577.078679.996883.4801
0.28473.131676.881079.633082.9191
0.32372.973176.682180.510684.1495
0.36373.156176.912380.052583.5624
0.4373.184476.953679.065882.3375
0.44272.907976.605479.649783.0483
Table 6. Relative prediction error, %.
Table 6. Relative prediction error, %.
Δ T Expected N ¯ ( 11 , 9 , N l i m )
N l i m = 30 , 000 N l i m = 50 , 000
0.04300.000.00
0.08150.010.02
0.12100.090.09
0.1670.180.20
0.2060.130.14
0.2450.120.11
0.2840.340.37
0.3230.560.62
0.3630.310.33
0.430.270.27
0.4420.650.72
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Faure, E.; Shcherba, A.; Makhynko, M.; Stupka, B.; Nikodem, J.; Shevchuk, R. Permutation-Based Block Code for Short Packet Communication Systems. Sensors 2022, 22, 5391. https://doi.org/10.3390/s22145391

AMA Style

Faure E, Shcherba A, Makhynko M, Stupka B, Nikodem J, Shevchuk R. Permutation-Based Block Code for Short Packet Communication Systems. Sensors. 2022; 22(14):5391. https://doi.org/10.3390/s22145391

Chicago/Turabian Style

Faure, Emil, Anatoly Shcherba, Mykola Makhynko, Bohdan Stupka, Joanna Nikodem, and Ruslan Shevchuk. 2022. "Permutation-Based Block Code for Short Packet Communication Systems" Sensors 22, no. 14: 5391. https://doi.org/10.3390/s22145391

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop