{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:21:20Z","timestamp":1760142080144,"version":"build-2065373602"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185883","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"728-734","source":"Crossref","is-referenced-by-count":0,"title":["Permutation Code in Noise Presence Study"],"prefix":"10.1109","author":[{"given":"Orest","family":"Ivakhiv","sequence":"first","affiliation":[{"name":"Lviv Polytechnic National University,Intelligent Mechatronics and Robotics Department,Lviv,Ukraine"}]},{"given":"Markiyan","family":"Nakonechnyi","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Computarized Automation Systems Department,Lviv,Ukraine"}]},{"given":"Oleksandr","family":"Viter","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Computarized Automation Systems Department,Lviv,Ukraine"}]},{"given":"Yurii","family":"Nakonechnyi","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Information Security Department,Lviv,Ukraine"}]},{"given":"Rostyslav","family":"Deyneka","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Intelligent Mechatronics and Robotics Department,Lviv,Ukraine"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1109\/WICOM.2007.199","article-title":"A new time division multiplexing technique","volume-title":"Proceedings of the 2007 International Conference on Wireless Communications, Networking and Mobile Computing","author":"Jiang"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2394462"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2834848.2834868"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2405614"},{"key":"ref5","article-title":"Comparative Study between Various Algorithms of Data Compression Techniques","volume-title":"IJCSNS International Journal of Computer Science and Network Security","author":"Al-lahaml","year":"2007"},{"key":"ref6","article-title":"A Survey of Data Compression Algorithms and their Applications","volume-title":"Applications of Advanced Algorithms, At Simon Fraser University","author":"Hosseini","year":"2012"},{"article-title":"Data Compression Techniques and Applications, Lifetime Learning","year":"1985","author":"Lynch","key":"ref7"},{"key":"ref8","first-page":"113","article-title":"Source Data Processing. Proceedings of the III International Methrologyst Seminar \u201cMethods and Technics of Signal Processing in Physical Measurements\u201d","volume-title":"Lviv","author":"Ivakhiv","year":"1995"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2019.8924415"},{"key":"ref10","first-page":"105","article-title":"Compression of a Group Source Information. Proceedings of the I\/II International Methrologyst Seminar \u201cMethods and Technics of Signal Processing in Physical Measurements\u201d","volume-title":"Rzeszow","author":"Ivakhiv","year":"1993"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1965.3680"},{"key":"ref12","article-title":"Study of hybrid permutation frequency phase modulation","volume-title":"M.S. thesis, School Inf. Technol. Eng., Univ. Ottawa","author":"Li","year":"1996"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.1997.614824"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054729"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2005.1496578"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.01.091797"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1364\/OE.23.015587"},{"key":"ref18","article-title":"Mathematical Handbook for Scientists and Engineers. Definitions","volume-title":"Theorems and Formulas for Reference and Review","author":"Korn","year":"1961"},{"key":"ref19","first-page":"43","article-title":"Information Quantity Estimation of Multiplex Measurement Instrumentation","author":"Ivakhiv","year":"2003","journal-title":"\u0420omiary, \u0410utomatyka, \u041aontrola"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.15.1.828"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MEMSTECH.2017.7937549"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.88.174102"},{"volume-title":"Error-correction coding for digital communications","year":"1981","author":"\u0421lark","key":"ref24"},{"key":"ref25","first-page":"83","article-title":"Proceedings of the IV Interna-tional Methrologyst Seminar \u201cMethods and Technics of Signal Processing in Physical Measurements\u201d","volume-title":"Lviv","author":"Ivakhiv","year":"1996"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-024-00951-5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/JHEP06(2015)149"},{"article-title":"Notes on Coding Theory","volume-title":"Lecture Notes","author":"Hall","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0898-1221(00)00112-7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1961.10489978"},{"key":"ref31","first-page":"6","article-title":"Introduction into the Error-Correcting Codes","author":"Fomenko","year":"2025"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51103-0"},{"volume-title":"Error Control Coding: Fundamentals and Applications","year":"2004","author":"Lin","key":"ref33"},{"volume-title":"Code Tables: Bounds on the Parameters of Various Types of Codes","year":"2007","author":"Grassl","key":"ref34"},{"key":"ref35","first-page":"1456","article-title":"Iterative algebraic soft decision decoding of Reed\u2013Solomon codes","author":"El-Khamy","year":"2004","journal-title":"Int. Symp. Inf. Theory Appl."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.819332"},{"issue":"153","key":"ref37","first-page":"1","article-title":"The Guruswami\u2013Sudan decoding algorithm for Reed\u2013Solomon codes","volume":"42","author":"McEliece","year":"2003","journal-title":"JPL TDA Prog. Rep"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2000.866551"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/18.915676"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/S0898-1221(00)00112-7"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/APCC55198.2022.9943640"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TMRC56419.2022.9918619"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.15587\/2706-5448.2021.233656"},{"key":"ref44","first-page":"576","article-title":"Galua Field Codes: theory and application \u2013 Ternopil: Lmt. c. \u201cTernograph\u201d","author":"Nikolaychuk","year":"2012"},{"issue":"3","key":"ref45","first-page":"8","volume-title":"Influence of the channel on continuous message transmission quality in adaptive data transmission systems. Radioelectronics and Communications Systems","volume":"20","author":"Ivakhiv","year":"1997"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185883.pdf?arnumber=11185883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:27:22Z","timestamp":1760074042000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185883\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185883","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}