Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Jul 19;22(14):5391.
doi: 10.3390/s22145391.

Permutation-Based Block Code for Short Packet Communication Systems

Affiliations

Permutation-Based Block Code for Short Packet Communication Systems

Emil Faure et al. Sensors (Basel). .

Abstract

This paper presents an approach to the construction of block error-correcting code for data transmission systems with short packets. The need for this is driven by the necessity of information interaction between objects of machine-type communication network with a dynamically changing structure and unique system of commands or alerts for each network object. The codewords of a code are permutations with a given minimum pairwise Hamming distance. The purpose of the study is to develop a statistical method for constructing a code, in contrast to known algebraic methods, and to investigate the code size. An algorithm for generating codewords has been developed. It can be implemented both by enumeration of the full set of permutations, and by enumeration of a given number of randomly selected permutations. We have experimentally determined the dependencies of the average and the maximum values of the code size on the size of a subset of permutations used for constructing the code. A technique for computing approximation quadratic polynomials for the determined code size dependencies has been developed. These polynomials and their corresponding curves estimate the size of a code generated from a subset of random permutations of such a size that a statistically significant experiment cannot be performed. The results of implementing the developed technique for constructing a code based on permutations of lengths 7 and 11 have been presented. The prediction relative error of the code size did not exceed the value of 0.72% for permutation length 11, code distance 9, random permutation subset size 50,000, and permutation statistical study range limited by 5040.

Keywords: block error-correcting code; code size; codeword; factorial code; permutation; permutation code; secure channel coding scheme.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Algorithm to generate a set of codewords.
Figure 2
Figure 2
Algorithm to generate a set of codewords without storing the full set of permutations.
Figure 3
Figure 3
Histogram of the distribution of a random value N(7,4).
Figure 4
Figure 4
The required amount of memory and time to generate a complete set of M! permutations.
Figure 5
Figure 5
Algorithms to generate the initial set of Nlim random permutations: (a) By division; (b) By generating digits.
Figure 6
Figure 6
The average time to generate one factorial number using two different algorithms.
Figure 7
Figure 7
Histograms of the distribution of a random variable N(7,4,Nlim) for: (a) Nlim=13; (b) Nlim=14; (c) Nlim=18; (d) Nlim=23; (e) Nlim=30; (f) Nlim=46.
Figure 8
Figure 8
Graphs of N¯(M,Dmin,Nlim), σ(N(M,Dmin,Nlim)) and Nmax(M,Dmin,Nlim) for M=7 and: (a) Dmin=4; (b) Dmin=5; (c) Dmin=6.
Figure 9
Figure 9
Graphs N¯(11,9,Nlim) and Nmax(11,9,Nlim) when Δ=0.04.
Figure 10
Figure 10
Histograms of the distribution of a random value N(11,9,Nlim) for: (a) Nlim=30,000; (b) Nlim=50,000.
Figure 11
Figure 11
Graphs N¯(11,9,Nlim) and Nmax(11,9,Nlim) when Δ=0.08.

References

    1. Statista Research Department Volume of Data/Information Created, Captured, Copied, and Consumed Worldwide from 2010 to 2025. [(accessed on 22 June 2022)]. Available online: https://www.statista.com/statistics/871513/worldwide-data-created/
    1. Avizienis A., Laprie J.-C., Randell B. Fundamental Concepts of Dependability. Department of Computing Science, University of Newcastle upon Tyne; Newcastle upon Tyne, UK: 2001. p. 21. (Department of Computing Science Technical Report Series).
    1. Durisi D., Liva G., Polyanskiy Y. Short-Packet Transmission. In: Marić I., Shamai (Shitz) S., Simeone O., editors. Information Theoretic Perspectives on 5G Systems and Beyond. Cambridge University Press; Cambridge, UK: 2022.
    1. Mahmood N.H., Böcker S., Moerman I., López O.A., Munari A., Mikhaylov K., Clazzer F., Bartz H., Park O.-S., Mercier E., et al. Machine Type Communications: Key Drivers and Enablers towards the 6G Era. J. Wirel. Com. Netw. 2021;2021:134. doi: 10.1186/s13638-021-02010-5. - DOI
    1. Elhoseny M., Hassanien A.E. Studies in Systems, Decision and Control. 1st ed. Springer; Berlin/Heidelberg, Germany: 2019. Dynamic Wireless Sensor Networks: New Directions for Smart Technologies.

LinkOut - more resources