Asymptotic Analysis of Blind Reconstruction of BCH Codes Based on Consecutive Roots of Generator Polynomials
In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important. Especially, many blind reconstruction methods of error-correcting codes have been proposed, and their theoretical performance analysis is essential...
Saved in:
| Published in | IEEE access Vol. 8; pp. 206514 - 206527 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Piscataway
IEEE
2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2169-3536 2169-3536 |
| DOI | 10.1109/ACCESS.2020.3037799 |
Cover
| Abstract | In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important. Especially, many blind reconstruction methods of error-correcting codes have been proposed, and their theoretical performance analysis is essential for both the defender who wants to prevent information leakage and the challenger who wants to extract information from the intercepted signals. However, a proper performance analysis of most blind reconstruction methods has not been performed yet. Among many blind reconstruction methods of BCH codes proposed so far, the blind reconstruction method based on consecutive roots of generator polynomials proposed by Jo, Kwon, and Shin, called the JKS method, shows the best performance under the unknown channel information. However, the performance of the JKS method is only evaluated through simulation without performing theoretical analysis. In this paper, the JKS method is asymptotically analyzed under the binary symmetric channel with the cross-over probability <inline-formula> <tex-math notation="LaTeX">p </tex-math></inline-formula>. Since the blind reconstruction performance heavily depends on how many and which received codewords are used even for the same channel environment, sufficiently many codewords are assumed to perform asymptotic analysis. More specifically, an asymptotic threshold on <inline-formula> <tex-math notation="LaTeX">p </tex-math></inline-formula>, up to which blind reconstruction is successful, is derived when the number of received codewords is sufficiently large, which can be used as a new performance metric for blind reconstruction methods. Finally, the validity of the asymptotic analysis is confirmed through simulation. |
|---|---|
| AbstractList | In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important. Especially, many blind reconstruction methods of error-correcting codes have been proposed, and their theoretical performance analysis is essential for both the defender who wants to prevent information leakage and the challenger who wants to extract information from the intercepted signals. However, a proper performance analysis of most blind reconstruction methods has not been performed yet. Among many blind reconstruction methods of BCH codes proposed so far, the blind reconstruction method based on consecutive roots of generator polynomials proposed by Jo, Kwon, and Shin, called the JKS method, shows the best performance under the unknown channel information. However, the performance of the JKS method is only evaluated through simulation without performing theoretical analysis. In this paper, the JKS method is asymptotically analyzed under the binary symmetric channel with the cross-over probability <inline-formula> <tex-math notation="LaTeX">p </tex-math></inline-formula>. Since the blind reconstruction performance heavily depends on how many and which received codewords are used even for the same channel environment, sufficiently many codewords are assumed to perform asymptotic analysis. More specifically, an asymptotic threshold on <inline-formula> <tex-math notation="LaTeX">p </tex-math></inline-formula>, up to which blind reconstruction is successful, is derived when the number of received codewords is sufficiently large, which can be used as a new performance metric for blind reconstruction methods. Finally, the validity of the asymptotic analysis is confirmed through simulation. In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important. Especially, many blind reconstruction methods of error-correcting codes have been proposed, and their theoretical performance analysis is essential for both the defender who wants to prevent information leakage and the challenger who wants to extract information from the intercepted signals. However, a proper performance analysis of most blind reconstruction methods has not been performed yet. Among many blind reconstruction methods of BCH codes proposed so far, the blind reconstruction method based on consecutive roots of generator polynomials proposed by Jo, Kwon, and Shin, called the JKS method, shows the best performance under the unknown channel information. However, the performance of the JKS method is only evaluated through simulation without performing theoretical analysis. In this paper, the JKS method is asymptotically analyzed under the binary symmetric channel with the cross-over probability [Formula Omitted]. Since the blind reconstruction performance heavily depends on how many and which received codewords are used even for the same channel environment, sufficiently many codewords are assumed to perform asymptotic analysis. More specifically, an asymptotic threshold on [Formula Omitted], up to which blind reconstruction is successful, is derived when the number of received codewords is sufficiently large, which can be used as a new performance metric for blind reconstruction methods. Finally, the validity of the asymptotic analysis is confirmed through simulation. In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important. Especially, many blind reconstruction methods of error-correcting codes have been proposed, and their theoretical performance analysis is essential for both the defender who wants to prevent information leakage and the challenger who wants to extract information from the intercepted signals. However, a proper performance analysis of most blind reconstruction methods has not been performed yet. Among many blind reconstruction methods of BCH codes proposed so far, the blind reconstruction method based on consecutive roots of generator polynomials proposed by Jo, Kwon, and Shin, called the JKS method, shows the best performance under the unknown channel information. However, the performance of the JKS method is only evaluated through simulation without performing theoretical analysis. In this paper, the JKS method is asymptotically analyzed under the binary symmetric channel with the cross-over probability $p$ . Since the blind reconstruction performance heavily depends on how many and which received codewords are used even for the same channel environment, sufficiently many codewords are assumed to perform asymptotic analysis. More specifically, an asymptotic threshold on $p$ , up to which blind reconstruction is successful, is derived when the number of received codewords is sufficiently large, which can be used as a new performance metric for blind reconstruction methods. Finally, the validity of the asymptotic analysis is confirmed through simulation. |
| Author | Shin, Dong-Joon Song, Minki |
| Author_xml | – sequence: 1 givenname: Minki orcidid: 0000-0003-1051-0066 surname: Song fullname: Song, Minki organization: Department of Electronic Engineering, Hanyang University, Seoul, South Korea – sequence: 2 givenname: Dong-Joon orcidid: 0000-0002-5017-5314 surname: Shin fullname: Shin, Dong-Joon email: djshin@hanyang.ac.kr organization: Department of Electronic Engineering, Hanyang University, Seoul, South Korea |
| BookMark | eNptkU9r3DAQxU1JoWmaT5CLoefd6o9tSceNSZNAoCVpz2Isj4sWr7SV5BZ_-2jXYSlLdRnxeL8Zad7H4sJ5h0VxQ8maUqK-bNr27uVlzQgja064EEq9Ky4ZbdSK17y5-Of-obiOcUvykVmqxWUxbuK82yefrCk3DsY52lj6obwdrevLZzTexRQmk6x3R719KFvfYyxvIWJfZrXNFjRTsn-wfPY-Hfl7dBgg-VB-9-Ps_M7CGD8V74dc8PqtXhU_v979aB9WT9_uH9vN08pURKYV4z12taKdMLKmVPZk6PjQAEjKUMkKRC0qQmgDDGTHRYMAom-4qhsJXUf4VfG49O09bPU-2B2EWXuw-ij48EtDyD8eUUvV8wyJjhGsGKUdQWJ6pSjjiIrz3Ktaek1uD_NfGMdTQ0r0IQANxmCM-hCAfgsgY58XbB_87wlj0ls_hbzg7KuauqqYElV2qcVlgo8x4KCNTXDYdQpgx9OEJeLzCfyMPX_X_6mbhbKIeCIUO2xU8lelAbKB |
| CODEN | IAECCG |
| CitedBy_id | crossref_primary_10_1109_LCOMM_2021_3100348 crossref_primary_10_1109_TSP_2021_3110087 |
| Cites_doi | 10.23919/ISITA.2018.8664357 10.1109/GLOCOMW.2009.5360726 10.1109/TCOMM.2014.050614.130297 10.1186/1687-1499-2013-218 10.1007/BFb0024454 10.1109/TCOMM.2016.2561931 10.1109/WCSP.2015.7341243 10.1109/LCOMM.2018.2806482 10.1016/S0166-218X(00)00353-X 10.1186/1687-1499-2011-168 10.1109/ISIT.2006.261971 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D ADTOC UNPAY DOA |
| DOI | 10.1109/ACCESS.2020.3037799 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Materials Research Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2169-3536 |
| EndPage | 206527 |
| ExternalDocumentID | oai_doaj_org_article_89d38ab7b20e4211b0e0cd99123ee933 10.1109/access.2020.3037799 10_1109_ACCESS_2020_3037799 9257408 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Signal Intelligence Research Center – fundername: Defense Acquisition Program Administration and Agency for Defense Development of Korea funderid: 10.13039/501100005073 |
| GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D ADTOC UNPAY |
| ID | FETCH-LOGICAL-c408t-23deb591b7c85118d0fb3f6aa812e984a75740016a2a8b376eaa7d639568abb03 |
| IEDL.DBID | RIE |
| ISSN | 2169-3536 |
| IngestDate | Fri Oct 03 12:45:11 EDT 2025 Sun Sep 07 11:07:19 EDT 2025 Mon Jun 30 05:44:16 EDT 2025 Thu Apr 24 23:08:33 EDT 2025 Wed Oct 01 03:37:47 EDT 2025 Wed Aug 27 02:27:31 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://creativecommons.org/licenses/by/4.0/legalcode cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c408t-23deb591b7c85118d0fb3f6aa812e984a75740016a2a8b376eaa7d639568abb03 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-5017-5314 0000-0003-1051-0066 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9257408 |
| PQID | 2465442974 |
| PQPubID | 4845423 |
| PageCount | 14 |
| ParticipantIDs | crossref_primary_10_1109_ACCESS_2020_3037799 unpaywall_primary_10_1109_access_2020_3037799 crossref_citationtrail_10_1109_ACCESS_2020_3037799 proquest_journals_2465442974 doaj_primary_oai_doaj_org_article_89d38ab7b20e4211b0e0cd99123ee933 ieee_primary_9257408 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20200000 2020-00-00 20200101 2020-01-01 |
| PublicationDateYYYYMMDD | 2020-01-01 |
| PublicationDate_xml | – year: 2020 text: 20200000 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE access |
| PublicationTitleAbbrev | Access |
| PublicationYear | 2020 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref12 lee (ref2) 2012 ref15 ref14 yardi (ref13) 2014 ref11 ref10 ref8 ref7 ref9 ref4 ref6 ref5 wicker (ref1) 1995 yardi (ref3) 2014 |
| References_xml | – ident: ref9 doi: 10.23919/ISITA.2018.8664357 – start-page: 1051 year: 2014 ident: ref13 article-title: Channel-code detection by a third-parity receiver via the likelihood ratio test publication-title: Proc IEEE Int Symp Inf Theory – ident: ref15 doi: 10.1109/GLOCOMW.2009.5360726 – ident: ref11 doi: 10.1109/TCOMM.2014.050614.130297 – ident: ref12 doi: 10.1186/1687-1499-2013-218 – ident: ref7 doi: 10.1007/BFb0024454 – ident: ref4 doi: 10.1109/TCOMM.2016.2561931 – start-page: 849 year: 2014 ident: ref3 article-title: Blind reconstruction of binary cyclic codes publication-title: Proc Eur Wireless – ident: ref5 doi: 10.1109/WCSP.2015.7341243 – ident: ref6 doi: 10.1109/LCOMM.2018.2806482 – ident: ref8 doi: 10.1016/S0166-218X(00)00353-X – ident: ref10 doi: 10.1186/1687-1499-2011-168 – ident: ref14 doi: 10.1109/ISIT.2006.261971 – start-page: 591 year: 2012 ident: ref2 article-title: Reconstruction of BCH codes using probability compensation publication-title: Proc 18th Asia-Pacific Conf Commun (APCC) – year: 1995 ident: ref1 publication-title: Error Control Systems for Digital Communication and Storage |
| SSID | ssj0000816957 |
| Score | 2.1848829 |
| Snippet | In the military surveillance and security information systems, correct blind reconstruction of signal parameters from unknown signals is very important.... |
| SourceID | doaj unpaywall proquest crossref ieee |
| SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 206514 |
| SubjectTerms | Asymptotic analysis Asymptotic methods Asymptotic properties BCH codes blind reconstruction Codes consecutive roots Crossovers Error correcting codes Error correction Error correction codes generator polynomial Generators Information systems Methods military surveillance system Polynomials Receivers Reconstruction Reconstruction algorithms Security security information system Surveillance Transmitters |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS-wwEA7iRT08_Mmrv8jBo8U0bbfJcbcoi6CIKHgLkyY99W0XdkX2v3cm7a67CL6L15Cm6cwk831t8w1jV5kWkPoqj522VYz8K48Vwu4YXG0xe_okDULaD4-D8Wt2_5a_rZX6on_COnngznA3SrtUgS2sFD5DtmKFF5VDVCNT75GN0-4rlF4jU2EPVgnetuhlhhKhb4ZliU-EhFAiTxUks6c3UlFQ7O9LrGygzZ33yRQWH9A0a4nnbp_96REjH3YzPWBbfnLI9tZ0BI9YM5wt_k3nLfbgS5UR3tZ8hBjScWKYXzqxob0c87J1fsZHmMQcx1Yq3Omrd9r8-HPbzsP1nSY1snL-1DYLOsCMwXrMXu9uX8px3JdRiKtMqHksU-dtrhNbVASvlBO1TesBAOZ2r1UGRV5kBP1AgrK44XiAwiFyyQdoeCvSE7Y9aSf-L-MBHko67kofVAFwzQJmN5dAbmtZuYjJpUVN1WuMU6mLxgSuIbTp3GDIDaZ3Q8SuVxdNO4mNn7uPyFWrrqSPHRowakwfNeZ_UROxI3L0ahAtyQYqYudLx5t-Lc-MJMk5TNtFFrF4FQzfpgqhwOXGVE9_Y6pnbJfG7F77nLNtDBd_gUBobi9DzH8CMX8ADw priority: 102 providerName: Directory of Open Access Journals – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lj9MwELage0AceC1os7sgHziSxbHz8rGNWFVIrFaISsvJ8isXQlOpqVD59cw4bmlBWsHVGkeO_dnzjez5hpC3uWRaeFukThqbQvxVpDXQ7lS71oD39JkIQtqfbsr5Iv94V9xFnW3MhTm8v8-YfK9D2UCI4ziElwzV8eRDclIWQLwn5GRxczv9iuXjslKmIlxEXtzT88j3BIn-WFPliF4-2ixXevtDd92Bp7l-OqZwr4NAIT4w-Xa1GcyV_fmHfOM__sQz8iQyTjodIfKcPPDLF-TxgQ7hKemm6-331dCDBd2plNC-pTPgoI5ihPpbZza0N3Pa9M6v6QycoKPQioU_vd3g4Uk_9_0Q-o-a1hDV09u-22ICNID9JVlcf_jSzNNYhiG1OauHlAvnTSEzU1mkZ7VjrRFtqTVwAy_rXFdFlSN11FzXBg4sr3XlgPkUZa2NYeIVmSz7pT8jNNBLjumyeCGrNex5Dd7RZbowLbcuIXy3QMpGjXIsldGpEKswqaZNA8BUOJUqTmVC3u07rUaJjvvNZ7jye1PU1w4NsGIqbldVSydg8JXhzOcQIxvmmXXApbnwXgqRkFPEzf4jkuMc1Am53OFIxbNgrThK1oHbr_KEpHts_TXUESRHQz3_T_tLMgEw-NdAkwbzJm6PXwZeCsQ priority: 102 providerName: Unpaywall |
| Title | Asymptotic Analysis of Blind Reconstruction of BCH Codes Based on Consecutive Roots of Generator Polynomials |
| URI | https://ieeexplore.ieee.org/document/9257408 https://www.proquest.com/docview/2465442974 https://doi.org/10.1109/access.2020.3037799 https://doaj.org/article/89d38ab7b20e4211b0e0cd99123ee933 |
| UnpaywallVersion | publishedVersion |
| Volume | 8 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: KQ8 dateStart: 20130101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: M~E dateStart: 20130101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwED-N8QA88DUQgVH5gcelc-OkiR_biKlC2jQhKo0ny195IWsqNRXq_vrdOWlYASHeIstJzrqz73e273cAn1LJtfA2i500Nsb4K4sLhN2xdpVB7-knIhBpX15NF8v0y012cwRnQy6M9z5cPvNjegxn-a6xW9oqO5doXyll9j7Ki2mXqzXsp1ABCZnlPbHQhMvzWVniGDAETDAy5USsJw-cT-Do74uqHODLJ9vVWu9-6rp-4GouXsDlXsjuhsmP8bY1Y3v3G3_j_47iJTzvMSebdUbyCo786jU8e8BEeAL1bLO7XbcN9mB7nhLWVGyOKNQxilF_Mc2G9nLBysb5DZujG3QMW6n0p7dbWj7Z16Zpw_sdqzXG9ey6qXeUAo3m_gaWF5-_lYu4L8QQWxS0jRPhvMnkxOSWAFrheGVENdUa0YGXRapzGhGCR53owuCS5bXOHWKfbFpoY7h4C8erZuXfAQsAM6GEWTqS1RpnvUb_6CY6M1ViXQTJXkPK9izlVCyjViFa4VJ1alWkVtWrNYKz4aV1R9Lx7-5zUv3QlRi2QwOqSfUTVhXSCRQ-Nwn3KUbJhntuHaLpRHgvhYjghFQ7fKTXagSne0NS_WqwUQmR1qHjz9MI4sG4_hBVhxKZB6K-__tfPsBT6tVtBZ3CMRqA_4jgqDWjsKkwCnNjBI-XV9ez7_cgPQyL |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwED9N42HwwNdAZAzwA49Ll8ZxEz-2EVOBdUJok_Zm-SsvhKZSU6Hy1-_OScMKCPEWWXZy1p19v7NzvwN4n8lEc29F7KSxMcZfIi4QdsfaVQa9px_zQKS9uJrMb7JPt-L2AM6GXBjvffj5zI_oMdzlu8Zu6KjsXKJ9ZZTZ-0BkWSa6bK3hRIVKSEiR99RC40SeT8sSZ4FBYIqxaULUenLP_QSW_r6syh7CPNosV3r7Q9f1PWdz8QQWOzG7f0y-jTatGdmfvzE4_u88nsLjHnWyaWcmz-DAL5_Do3tchMdQT9fb76u2wR5sx1TCmorNEIc6RlHqL67Z0F7OWdk4v2YzdISOYSsV__R2Qxso-9o0bRjf8VpjZM--NPWWkqDR4F_AzcWH63Ie96UYYouCtnHKnTdCjk1uCaIVLqkMryZaIz7wssh0TjNC-KhTXRjctLzWuUP0IyaFNibhL-Fw2Sz9K2ABYqaUMkuXslrjutfoId1YC1Ol1kWQ7jSkbM9TTuUyahXilUSqTq2K1Kp6tUZwNgxadTQd_-4-I9UPXYljOzSgmlS_ZFUhHUfhc5MmPsM42SQ-sQ7xdMq9l5xHcEyqHV7SazWC050hqX4_WKuUaOvQ9edZBPFgXH-IqkORzD1RT_7-lXdwNL9eXKrLj1efX8NDGtEdDJ3CIRqDf4NQqTVvwwq5A5AyDTM |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lj9MwELage0AceC1os7sgHziSxbHz8rGNWFVIrFaISsvJ8isXQlOpqVD59cw4bmlBWsHVGkeO_dnzjez5hpC3uWRaeFukThqbQvxVpDXQ7lS71oD39JkIQtqfbsr5Iv94V9xFnW3MhTm8v8-YfK9D2UCI4ziElwzV8eRDclIWQLwn5GRxczv9iuXjslKmIlxEXtzT88j3BIn-WFPliF4-2ixXevtDd92Bp7l-OqZwr4NAIT4w-Xa1GcyV_fmHfOM__sQz8iQyTjodIfKcPPDLF-TxgQ7hKemm6-331dCDBd2plNC-pTPgoI5ihPpbZza0N3Pa9M6v6QycoKPQioU_vd3g4Uk_9_0Q-o-a1hDV09u-22ICNID9JVlcf_jSzNNYhiG1OauHlAvnTSEzU1mkZ7VjrRFtqTVwAy_rXFdFlSN11FzXBg4sr3XlgPkUZa2NYeIVmSz7pT8jNNBLjumyeCGrNex5Dd7RZbowLbcuIXy3QMpGjXIsldGpEKswqaZNA8BUOJUqTmVC3u07rUaJjvvNZ7jye1PU1w4NsGIqbldVSydg8JXhzOcQIxvmmXXApbnwXgqRkFPEzf4jkuMc1Am53OFIxbNgrThK1oHbr_KEpHts_TXUESRHQz3_T_tLMgEw-NdAkwbzJm6PXwZeCsQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Asymptotic+Analysis+of+Blind+Reconstruction+of+BCH+Codes+Based+on+Consecutive+Roots+of+Generator+Polynomials&rft.jtitle=IEEE+access&rft.au=Song%2C+Minki&rft.au=Shin%2C+Dong-Joon&rft.date=2020&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=8&rft.spage=206514&rft.epage=206527&rft_id=info:doi/10.1109%2FACCESS.2020.3037799&rft.externalDocID=9257408 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |