首页 > 最新文献

Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia最新文献

英文 中文
Side-channel attacks on CRYSTALS-KYBER, countermeasures and comparison with SKELYA (DSTU 8961-2019) CRYSTALS-KYBER的侧信道攻击、对抗及与SKELYA的比较
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.02
Yaroslav Derevianko, I.D. Gorbenko
Although the mathematical problems used in post-quantum cryptography algorithms appear to be mathematically secure, a class of attacks known as side-channel attacks may prove to be a threat to the security of such algorithms. Side-channel attacks affect the hardware on which the cryptographic algorithm runs, they are not attacks on the algorithm itself. The good news is that side-channel analysis on new post-quantum cryptographic algorithms started early, even before the algorithms were standardized, given that older algorithms still face side-channel problems. Kyber is a lattice-based post-quantum algorithm based on the complexity of the M-LWE problem. Kyber offers a secure public key encryption (PKE) scheme against a chosen plaintext attack (CPA) and a secure key encapsulation mechanism against a chosen ciphertext attack (CCA). This paper provides a study of side-channel and fault-injection attacks on lattice-based schemes, with focus on the Kyber (KEM). Considering the wide range of known attacks, the protection of the algorithm requires the implementation of individual countermeasures. The paper presents and tests a number of countermeasures capable of providing/improving protection against existing SCA/FIA for Kyber KEM. The obtained results show that the presented countermeasures incur a reasonable performance cost. Therefore, the use of special countermeasures in real implementations of lattice-based schemes, either alone or as an augmentation of general countermeasures, is necessary.
尽管后量子加密算法中使用的数学问题在数学上似乎是安全的,但一类被称为侧信道攻击的攻击可能会对此类算法的安全性构成威胁。侧信道攻击影响的是运行加密算法的硬件,而不是对算法本身的攻击。好消息是,考虑到旧算法仍然面临侧信道问题,对新的后量子加密算法的侧信道分析很早就开始了,甚至在算法标准化之前就开始了。Kyber是一种基于M-LWE问题复杂性的基于格子的后量子算法。Kyber提供了一种安全的公钥加密(PKE)方案来对抗选择的明文攻击(CPA)和一种安全的密钥封装机制来对抗选择的密文攻击(CCA)。本文研究了基于格子方案的侧信道攻击和故障注入攻击,重点研究了Kyber (KEM)。考虑到已知攻击的范围很广,保护算法需要实施单独的对策。本文提出并测试了一些能够为Kyber KEM提供/改进针对现有SCA/FIA的保护的对策。结果表明,所提出的对策产生了合理的性能代价。因此,在基于格的方案的实际实现中使用特殊对抗措施,无论是单独使用还是作为一般对抗措施的增强,都是必要的。
{"title":"Side-channel attacks on CRYSTALS-KYBER, countermeasures and comparison with SKELYA (DSTU 8961-2019)","authors":"Yaroslav Derevianko, I.D. Gorbenko","doi":"10.30837/rt.2023.1.212.02","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.02","url":null,"abstract":"Although the mathematical problems used in post-quantum cryptography algorithms appear to be mathematically secure, a class of attacks known as side-channel attacks may prove to be a threat to the security of such algorithms. Side-channel attacks affect the hardware on which the cryptographic algorithm runs, they are not attacks on the algorithm itself. \u0000The good news is that side-channel analysis on new post-quantum cryptographic algorithms started early, even before the algorithms were standardized, given that older algorithms still face side-channel problems. \u0000Kyber is a lattice-based post-quantum algorithm based on the complexity of the M-LWE problem. Kyber offers a secure public key encryption (PKE) scheme against a chosen plaintext attack (CPA) and a secure key encapsulation mechanism against a chosen ciphertext attack (CCA). \u0000This paper provides a study of side-channel and fault-injection attacks on lattice-based schemes, with focus on the Kyber (KEM). \u0000Considering the wide range of known attacks, the protection of the algorithm requires the implementation of individual countermeasures. The paper presents and tests a number of countermeasures capable of providing/improving protection against existing SCA/FIA for Kyber KEM. \u0000The obtained results show that the presented countermeasures incur a reasonable performance cost. Therefore, the use of special countermeasures in real implementations of lattice-based schemes, either alone or as an augmentation of general countermeasures, is necessary.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"168 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83337009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scientific and methodological bases of analysis, evaluation and results of comparison of existing and promising (post-quantum) asymmetric cryptographic primitives of electronic signature, protocols of asymmetric encryption and key encapsulation protocols 现有和有前途的(后量子)电子签名非对称密码原语、非对称加密协议和密钥封装协议的分析、评估和结果比较的科学和方法基础
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.05
Y. Gorbenko, M. Yesina, V. Ponomar, I.D. Gorbenko, E.Yu. Kapt'ol
Currently, world civilization is taking significant steps in science and practice related to quantum calculations. Significant steps are being taken to achieve the competitive advantage of countries in the field of quantum information science and the practice of introducing quantum technologies. Scientific and practical research is first aimed at reducing the risks related to quantum computers on cybersecurity, economic and national security. Although the full range of quantum computers is still unknown, it is obvious that further technological and scientific leadership of states will at least partially depend on the country's ability to maintain a competitive advantage in quantum computing and quantum information science. However, along with the potential advantages, quantum calculations are likely to cause significant risks about economic and national security. Specific actions are determined that technologically developed states that begin a long-term process of transferring vulnerable computer systems to quantum-resistant cryptography. An important problem in cryptology is to analyze ways of reducing risks for vulnerable cryptographic systems and the state of their development, adoption and implementation at the international and national levels of post-quantum standards of asymmetric cryptotransformations of electronic signatures (ES), asymmetric ciphers (AC) and key encapsulation protocols (KEP). Therefore, the processes of reducing risks for vulnerable existing standardized cryptographic systems and determining the directions of development of mathematical methods and the study of the prospects for their application in the creation of standardized AC, KEP and ES are significantly significant. They are reduced to justification and definition of mathematical methods and mechanisms that will create promising (post-quantum) standardized AC, KEP and ES. The course of analysis, evaluation and results of comparison of existing and post-quantum asymmetric cryptotransformations of AC, KEP and ES, and standardization at the international and national levels, including for transitional and post-quantum periods, are the main objective of this article.
当前,世界文明在量子计算的科学和实践方面取得了重大进展。各国在量子信息科学领域和引进量子技术的实践方面正在采取重大步骤,以实现竞争优势。科学和实践研究首先旨在降低与量子计算机相关的网络安全、经济和国家安全风险。尽管量子计算机的全系列仍然未知,但很明显,各国在技术和科学方面的进一步领导地位至少部分取决于该国在量子计算和量子信息科学方面保持竞争优势的能力。然而,随着潜在的优势,量子计算可能会对经济和国家安全造成重大风险。具体的行动被确定为技术发达的国家开始将易受攻击的计算机系统转移到抗量子密码术的长期过程。密码学中的一个重要问题是分析如何降低易受攻击的密码系统的风险,以及它们在国际和国家层面的非对称电子签名密码转换(ES)、非对称密码(AC)和密钥封装协议(KEP)的后量子标准的发展、采用和实施状况。因此,降低现有脆弱的标准化密码系统的风险,确定数学方法的发展方向,研究其在标准化AC、KEP和ES创建中的应用前景具有重要意义。它们被简化为证明和定义数学方法和机制,这些方法和机制将创造有前途的(后量子)标准化AC, KEP和ES。本文的主要目的是对AC、KEP和ES的现有和后量子非对称密码变换进行分析、评价和结果比较,并在国际和国家层面进行标准化,包括过渡和后量子时期。
{"title":"Scientific and methodological bases of analysis, evaluation and results of comparison of existing and promising (post-quantum) asymmetric cryptographic primitives of electronic signature, protocols of asymmetric encryption and key encapsulation protocols","authors":"Y. Gorbenko, M. Yesina, V. Ponomar, I.D. Gorbenko, E.Yu. Kapt'ol","doi":"10.30837/rt.2023.1.212.05","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.05","url":null,"abstract":"Currently, world civilization is taking significant steps in science and practice related to quantum calculations. Significant steps are being taken to achieve the competitive advantage of countries in the field of quantum information science and the practice of introducing quantum technologies. Scientific and practical research is first aimed at reducing the risks related to quantum computers on cybersecurity, economic and national security. Although the full range of quantum computers is still unknown, it is obvious that further technological and scientific leadership of states will at least partially depend on the country's ability to maintain a competitive advantage in quantum computing and quantum information science. However, along with the potential advantages, quantum calculations are likely to cause significant risks about economic and national security. Specific actions are determined that technologically developed states that begin a long-term process of transferring vulnerable computer systems to quantum-resistant cryptography. An important problem in cryptology is to analyze ways of reducing risks for vulnerable cryptographic systems and the state of their development, adoption and implementation at the international and national levels of post-quantum standards of asymmetric cryptotransformations of electronic signatures (ES), asymmetric ciphers (AC) and key encapsulation protocols (KEP). Therefore, the processes of reducing risks for vulnerable existing standardized cryptographic systems and determining the directions of development of mathematical methods and the study of the prospects for their application in the creation of standardized AC, KEP and ES are significantly significant. They are reduced to justification and definition of mathematical methods and mechanisms that will create promising (post-quantum) standardized AC, KEP and ES. The course of analysis, evaluation and results of comparison of existing and post-quantum asymmetric cryptotransformations of AC, KEP and ES, and standardization at the international and national levels, including for transitional and post-quantum periods, are the main objective of this article.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"125 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78456833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Models of threats to cloud services 云服务的威胁模型
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.04
M.V. Yesina, V.V. Onoprienko, A.V. Tolok
Cloud services have become popular due to their advantages over traditional computing. The cloud provides remote access to software, hardware, and other services. This has allowed companies to be more productive and enabled remote work. Cloud services have fewer hardware and infrastructure requirements, which reduces the cost of maintaining and supporting information technology. The future success of organizations will depend, not least, on the extent to which they implement cloud computing in their operations. According to forecasts, spending on cloud IT technologies will continue to grow and in 2025 will exceed spending on traditional IT technologies. Security of cloud services is becoming a critical issue as more and more companies complete their digital transformation. Despite the many benefits, cloud services also face their own security threats and challenges. Since cloud services store and process a significant amount of sensitive information, a cloud breach can lead to data leaks that can hinder business development and cause significant damage to a company's reputation. There are risks associated with the unavailability of cloud services in case of technical problems and dependence on external providers. Therefore, companies should carefully assess potential threats and take appropriate measures to protect their data and business in general when using cloud services. There are many methods to help determine how prepared your organization is for the growing number of threats. Threat modeling is one of the methods for predicting and preparing for possible threats. Using modeling frameworks allows you to allocate resources and plan possible actions during an attack. There are many modeling frameworks available, but it is important to remember that these frameworks have their advantages and disadvantages, so the choice depends on the context and needs of a particular system. Analyzing, evaluating, and comparing existing methods for modeling and protecting against threats in cloud services is the main objective of this article.
云服务由于其优于传统计算的优势而变得流行起来。云提供对软件、硬件和其他服务的远程访问。这使得公司的工作效率更高,并支持远程工作。云服务对硬件和基础设施的要求更少,从而降低了维护和支持信息技术的成本。组织未来的成功将主要取决于他们在运营中实现云计算的程度。根据预测,云IT技术的支出将继续增长,到2025年将超过传统IT技术的支出。随着越来越多的企业完成数字化转型,云服务的安全性成为一个关键问题。尽管有很多好处,云服务也面临着自身的安全威胁和挑战。由于云服务存储和处理大量敏感信息,因此云漏洞可能导致数据泄露,从而阻碍业务发展并对公司声誉造成重大损害。在出现技术问题和依赖外部提供商的情况下,存在与云服务不可用相关的风险。因此,企业在使用云服务时应仔细评估潜在威胁,并采取适当措施保护其数据和业务。有许多方法可以帮助确定您的组织对日益增长的威胁准备得如何。威胁建模是对可能发生的威胁进行预测和准备的方法之一。使用建模框架允许您在攻击期间分配资源并计划可能的操作。有许多可用的建模框架,但重要的是要记住,这些框架有其优点和缺点,因此选择取决于特定系统的上下文和需求。分析、评估和比较用于云服务中建模和防范威胁的现有方法是本文的主要目标。
{"title":"Models of threats to cloud services","authors":"M.V. Yesina, V.V. Onoprienko, A.V. Tolok","doi":"10.30837/rt.2023.1.212.04","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.04","url":null,"abstract":"Cloud services have become popular due to their advantages over traditional computing. The cloud provides remote access to software, hardware, and other services. This has allowed companies to be more productive and enabled remote work. Cloud services have fewer hardware and infrastructure requirements, which reduces the cost of maintaining and supporting information technology. The future success of organizations will depend, not least, on the extent to which they implement cloud computing in their operations. According to forecasts, spending on cloud IT technologies will continue to grow and in 2025 will exceed spending on traditional IT technologies. Security of cloud services is becoming a critical issue as more and more companies complete their digital transformation. Despite the many benefits, cloud services also face their own security threats and challenges. Since cloud services store and process a significant amount of sensitive information, a cloud breach can lead to data leaks that can hinder business development and cause significant damage to a company's reputation. There are risks associated with the unavailability of cloud services in case of technical problems and dependence on external providers. Therefore, companies should carefully assess potential threats and take appropriate measures to protect their data and business in general when using cloud services. There are many methods to help determine how prepared your organization is for the growing number of threats. Threat modeling is one of the methods for predicting and preparing for possible threats. Using modeling frameworks allows you to allocate resources and plan possible actions during an attack. There are many modeling frameworks available, but it is important to remember that these frameworks have their advantages and disadvantages, so the choice depends on the context and needs of a particular system. Analyzing, evaluating, and comparing existing methods for modeling and protecting against threats in cloud services is the main objective of this article.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"76 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88522719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creating a call center test bench for load balancing Asterisk servers in a cluster 创建呼叫中心测试平台,用于集群中的Asterisk服务器负载均衡
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.18
L.O. Tokar, O.A. Koltakov, V.Y. Tsyliuryk
The article deals with the issues of increasing throughput in call centers. The current solution is to cluster call servers and evaluate their characteristics to ensure efficient operation and the necessary fault tolerance. It is shown that one of the main aspects of the quality functioning of the call center is load balancing of servers in the cluster. The features of the call-center modeling process are considered. The organization scheme of the call center of the company and the network model of the call center have been created. Virtualization technology was used to create a network model of a call center. The VMWare ESXI 6.7 hypervisor and the vCenter client were used as a network configuration platform. An analysis of load balancing was carried out using different algorithms and strategies. Asterisk PBX was configured and a server cluster was created. A test bench was developed and configured using the Zabbix open source product to explore a cluster of call servers. A bandwidth characteristic for the Asterisk _1 server and a network map were obtained, which actually represents a simulated structure of the call center network. The process of load testing on three Asterisk servers and the implementation of Zabbix load balancing capabilities are shown. A custom SIPp session script has been created for accepting calls and load testing. The number of calls that the call center is able to handle is calculated. It has been determined that a single Asterisk server with its current settings can handle a maximum of 915 concurrent calls. The process of load balancing on a cluster of SIP servers has been launched. A cluster of Asterisk servers has been found to be capable of handling 2550 simultaneous calls.
本文讨论了呼叫中心中提高吞吐量的问题。目前的解决方案是集群调用服务器,并评估其特性,以确保高效运行和必要的容错性。研究表明,集群中服务器的负载均衡是影响呼叫中心质量运行的主要因素之一。考虑了呼叫中心建模过程的特点。建立了公司呼叫中心的组织方案和呼叫中心的网络模型。利用虚拟化技术建立了呼叫中心的网络模型。使用VMWare ESXI 6.7 hypervisor和vCenter客户端作为网络配置平台。采用不同的算法和策略对负载均衡进行了分析。配置Asterisk PBX并创建服务器集群。使用Zabbix开源产品开发和配置了一个测试台架,以探索调用服务器集群。得到了Asterisk _1服务器的带宽特性和网络图,这实际上代表了呼叫中心网络的模拟结构。给出了在三台Asterisk服务器上进行负载测试的过程以及Zabbix负载均衡功能的实现。已经创建了一个自定义sip会话脚本,用于接受调用和负载测试。计算呼叫中心能够处理的呼叫数。已经确定单个Asterisk服务器在其当前设置下最多可以处理915个并发调用。SIP服务器集群负载均衡进程启动。一组Asterisk服务器已被发现能够处理2550个同时调用。
{"title":"Creating a call center test bench for load balancing Asterisk servers in a cluster","authors":"L.O. Tokar, O.A. Koltakov, V.Y. Tsyliuryk","doi":"10.30837/rt.2023.1.212.18","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.18","url":null,"abstract":"The article deals with the issues of increasing throughput in call centers. The current solution is to cluster call servers and evaluate their characteristics to ensure efficient operation and the necessary fault tolerance. It is shown that one of the main aspects of the quality functioning of the call center is load balancing of servers in the cluster. \u0000The features of the call-center modeling process are considered. The organization scheme of the call center of the company and the network model of the call center have been created. Virtualization technology was used to create a network model of a call center. The VMWare ESXI 6.7 hypervisor and the vCenter client were used as a network configuration platform. \u0000An analysis of load balancing was carried out using different algorithms and strategies. \u0000Asterisk PBX was configured and a server cluster was created. A test bench was developed and configured using the Zabbix open source product to explore a cluster of call servers. A bandwidth characteristic for the Asterisk _1 server and a network map were obtained, which actually represents a simulated structure of the call center network. \u0000The process of load testing on three Asterisk servers and the implementation of Zabbix load balancing capabilities are shown. A custom SIPp session script has been created for accepting calls and load testing. The number of calls that the call center is able to handle is calculated. It has been determined that a single Asterisk server with its current settings can handle a maximum of 915 concurrent calls. The process of load balancing on a cluster of SIP servers has been launched. A cluster of Asterisk servers has been found to be capable of handling 2550 simultaneous calls.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"30 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74534041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods and means of static and dynamic code analysis 静态和动态代码分析的方法和手段
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.01
A.O. Gapon, V.M. Fedorchenko, О.V. Sievierinov
The purpose of the article is to explore the methods and tools used to analyze software code in order to identify errors and potential problems. Static and dynamic code analysis are key processes in software development, as they allow you to detect errors in the early stages of development, reduce the risk of problems later and ensure high quality of the software product. The article discusses various methods and means of static and dynamic code analysis. For each method and tool, examples of their use and advantages and disadvantages are described. The article will be useful for software developers who want to improve the quality of their products and reduce the risk of problems. It will provide readers with an in-depth understanding of code analysis techniques and tools and help them choose the most appropriate tool for their needs.
本文的目的是探讨用于分析软件代码的方法和工具,以便识别错误和潜在问题。静态和动态代码分析是软件开发中的关键过程,因为它们允许您在开发的早期阶段检测错误,减少以后出现问题的风险,并确保软件产品的高质量。本文讨论了静态和动态代码分析的各种方法和手段。对于每种方法和工具,描述了它们的使用和优缺点的示例。对于想要提高产品质量和降低问题风险的软件开发人员来说,这篇文章将是有用的。它将为读者提供对代码分析技术和工具的深入理解,并帮助他们选择最适合自己需求的工具。
{"title":"Methods and means of static and dynamic code analysis","authors":"A.O. Gapon, V.M. Fedorchenko, О.V. Sievierinov","doi":"10.30837/rt.2023.1.212.01","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.01","url":null,"abstract":"The purpose of the article is to explore the methods and tools used to analyze software code in order to identify errors and potential problems. Static and dynamic code analysis are key processes in software development, as they allow you to detect errors in the early stages of development, reduce the risk of problems later and ensure high quality of the software product. The article discusses various methods and means of static and dynamic code analysis. For each method and tool, examples of their use and advantages and disadvantages are described. \u0000The article will be useful for software developers who want to improve the quality of their products and reduce the risk of problems. It will provide readers with an in-depth understanding of code analysis techniques and tools and help them choose the most appropriate tool for their needs.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"11 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79686712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying factorization to increase the resolving ability of the parametric estimation of the power spectral density 采用因式分解提高功率谱密度参数估计的分辨能力
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.08
V.A. Tikhonov, V.M. Bezruk
We consider a possibility of the factorization of parametric spectral power density (PSM) estimation of a random process based on autoregressive linear prediction model to increase the spectrum resolution. Factorization refers to the decomposition of the multimode PSM into simpler single-mode components. Factorization makes it possible not only to decompose a complex multimode PSM into simple single-mode components, but also to analyze more accurately the low-, medium- and high-frequency components of the SPM of a random process. The main attention is paid to the study of the problem of increasing the resolving power of SPM estimation by its factorization by the Yule-Walker and Berg method.
我们考虑了基于自回归线性预测模型的随机过程参数谱功率密度(PSM)估计的因式分解的可能性,以提高谱分辨率。因数分解是指将多模PSM分解成更简单的单模组件。因式分解不仅可以将复杂的多模PSM分解为简单的单模分量,而且可以更准确地分析随机过程中SPM的低、中、高频分量。重点研究了利用Yule-Walker和Berg方法对SPM估计进行分解以提高分辨能力的问题。
{"title":"Applying factorization to increase the resolving ability of the parametric estimation of the power spectral density","authors":"V.A. Tikhonov, V.M. Bezruk","doi":"10.30837/rt.2023.1.212.08","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.08","url":null,"abstract":"We consider a possibility of the factorization of parametric spectral power density (PSM) estimation of a random process based on autoregressive linear prediction model to increase the spectrum resolution. Factorization refers to the decomposition of the multimode PSM into simpler single-mode components. Factorization makes it possible not only to decompose a complex multimode PSM into simple single-mode components, but also to analyze more accurately the low-, medium- and high-frequency components of the SPM of a random process. The main attention is paid to the study of the problem of increasing the resolving power of SPM estimation by its factorization by the Yule-Walker and Berg method.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"70 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79106766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed processing of radar information in airspace surveillance systems 空域监视系统中雷达信息的分布式处理
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.15
I.V. Svyd, S.V. Starokozhev
The work is dedicated to the analysis of the quality of combining assessments of the radar signals and airborne objects detections in the implementation of distributed processing of radar information of airspace surveillance systems. The main sources of radar information about the air situation in the airspace control system are primary surveillance radars, secondary radar systems and identification systems on the basis of "friend or foe". It should be noted that the analysis of the information security of single-position radars shows their vulnerability in a wide range of unintentional and intentional interference, as well as determining their location. This is due to the ease of detection of the emitting transmitter of the probing signal in single-position radars. It led to the main disadvantage of single-position radars – low noise immunity and low survivability. The transition to a network of radar systems can significantly reduce the impact of deliberately directed interference. It also allows the use of methods for distributed processing of radar information in airspace surveillance systems. Analysis of the effectiveness of information support algorithms based on distributed processing of radar information of airspace surveillance systems, taking into account the final result, makes it possible to detect airborne objects using a packet of binary-quantized signals, taking into account two algorithms for combining detection results: channel accumulation and combining results; association of channel solutions and accumulation. It shows following: – the quality of consumer information support based on the proposed structure is much higher compared to the used radar information processing structure; the quality of information support for consumers has the best performance when using the signal processing method based on the accumulation of signals with the subsequent combination of detection results; the availability factor of the aircraft transponder significantly affects the quality of information support, already at P0<0.9 the use of integer logic for combining detection information is undesirable.
本研究致力于分析在空域监视系统雷达信息分布式处理实施过程中,雷达信号综合评估与机载目标探测的质量。空域管制系统中有关空情的雷达信息的主要来源是一次监视雷达、二次雷达系统和基于“敌我”的识别系统。值得注意的是,单位置雷达的信息安全分析显示其在大范围的无意和有意干扰以及确定其位置方面的脆弱性。这是由于在单位置雷达中探测信号的发射发射机易于检测。这导致了单位置雷达的主要缺点-低抗噪能力和低生存能力。过渡到雷达系统网络可以显著减少故意定向干扰的影响。它还允许在空域监视系统中使用分布式处理雷达信息的方法。分析了基于空域监视系统雷达信息分布式处理的信息支持算法的有效性,在考虑最终结果的情况下,使得利用一组二值量化信号对机载目标进行检测成为可能,同时考虑了两种检测结果组合算法:信道积累和组合结果;渠道解决与积累的关联。结果表明:——与现有雷达信息处理结构相比,基于所提结构的消费者信息支持质量显著提高;采用基于信号积累与后续检测结果相结合的信号处理方法时,对消费者的信息支持质量表现最佳;飞机应答器的可用性因子显著影响信息保障质量,在P0<0.9时,不希望使用整数逻辑组合探测信息。
{"title":"Distributed processing of radar information in airspace surveillance systems","authors":"I.V. Svyd, S.V. Starokozhev","doi":"10.30837/rt.2023.1.212.15","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.15","url":null,"abstract":"The work is dedicated to the analysis of the quality of combining assessments of the radar signals and airborne objects detections in the implementation of distributed processing of radar information of airspace surveillance systems. The main sources of radar information about the air situation in the airspace control system are primary surveillance radars, secondary radar systems and identification systems on the basis of \"friend or foe\". It should be noted that the analysis of the information security of single-position radars shows their vulnerability in a wide range of unintentional and intentional interference, as well as determining their location. This is due to the ease of detection of the emitting transmitter of the probing signal in single-position radars. It led to the main disadvantage of single-position radars – low noise immunity and low survivability. The transition to a network of radar systems can significantly reduce the impact of deliberately directed interference. It also allows the use of methods for distributed processing of radar information in airspace surveillance systems. \u0000Analysis of the effectiveness of information support algorithms based on distributed processing of radar information of airspace surveillance systems, taking into account the final result, makes it possible to detect airborne objects using a packet of binary-quantized signals, taking into account two algorithms for combining detection results: channel accumulation and combining results; association of channel solutions and accumulation. It shows following: – the quality of consumer information support based on the proposed structure is much higher compared to the used radar information processing structure; the quality of information support for consumers has the best performance when using the signal processing method based on the accumulation of signals with the subsequent combination of detection results; the availability factor of the aircraft transponder significantly affects the quality of information support, already at P0<0.9 the use of integer logic for combining detection information is undesirable.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"59 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84271029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of threats to data security and integrity in cloud computing 概述云计算对数据安全和完整性的威胁
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.03
M.V. Yesina, A.A. Kravchenko, S.O. Kravchenko
Cloud computing has become an integral part of our lives, and today it is used almost everywhere. In general, cloud computing is a concept of providing IT resources in the form of services. There are two cloud computing models: deployment models, which differ in the type of cloud management and access to the cloud and the level of security, and service models, which differ in the level of service provision, which affects, among other things, the level of responsibility of the service provider and the consumer. Cloud services began to gain popularity in 2009, and the demand for them has grown exponentially every year. They became especially popular during the pandemic in 2019, when people had to stay at home without interrupting their work processes, and now, in post-covid times, they also remain popular due to their convenience, high availability, easy scalability and cost savings. Due to the widespread use of cloud computing services, a high level of security is required. Unfortunately, the popularity of cloud computing has its drawbacks – in addition to the fact that it is more difficult to monitor the security of a remote environment than the security of a local computer, there are many other threats. In today's reality, people use cloud computing technologies in large volumes, for example, at work, for personal purposes, etc., as they have great trust in these technologies. This is the reason why it is necessary to maintain a high level of security and constantly improve it. Cloud computing security threats are usually divided into confidentiality, integrity, and availability threats. To prevent the loss of confidential information, service providers must ensure its integrity. Users want to be sure that their data will not fall into the hands of an intruder or third-party services. Therefore, this article discusses the most common threats to data security and integrity in cloud computing and the existing methods that prevent these vulnerabilities and possible problems at different levels and with the help of different tools.
云计算已经成为我们生活中不可或缺的一部分,如今它几乎无处不在。一般来说,云计算是一个以服务的形式提供IT资源的概念。有两种云计算模型:部署模型和服务模型,前者在云管理和云访问的类型以及安全级别上有所不同,后者在服务提供级别上有所不同,后者会影响服务提供者和使用者的责任级别等。云服务在2009年开始流行,对它的需求每年都呈指数级增长。在2019年大流行期间,当人们不得不呆在家里而不中断他们的工作流程时,它们变得特别受欢迎。现在,在新冠肺炎后的时代,它们因其便利性、高可用性、易于扩展和节省成本而仍然受欢迎。由于云计算服务的广泛使用,需要高水平的安全性。不幸的是,云计算的普及有其缺点——除了监视远程环境的安全性比监视本地计算机的安全性困难这一事实之外,还有许多其他威胁。在当今的现实中,人们大量使用云计算技术,例如,在工作中,出于个人目的等,因为他们对这些技术非常信任。这就是为什么需要保持高水平的安全性并不断改进的原因。云计算安全威胁通常分为保密性威胁、完整性威胁和可用性威胁。为了防止机密信息的丢失,服务提供商必须确保其完整性。用户希望确保他们的数据不会落入入侵者或第三方服务的手中。因此,本文将讨论云计算中对数据安全性和完整性的最常见威胁,以及在不同级别和借助不同工具防止这些漏洞和可能问题的现有方法。
{"title":"An overview of threats to data security and integrity in cloud computing","authors":"M.V. Yesina, A.A. Kravchenko, S.O. Kravchenko","doi":"10.30837/rt.2023.1.212.03","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.03","url":null,"abstract":"Cloud computing has become an integral part of our lives, and today it is used almost everywhere. In general, cloud computing is a concept of providing IT resources in the form of services. There are two cloud computing models: deployment models, which differ in the type of cloud management and access to the cloud and the level of security, and service models, which differ in the level of service provision, which affects, among other things, the level of responsibility of the service provider and the consumer. Cloud services began to gain popularity in 2009, and the demand for them has grown exponentially every year. They became especially popular during the pandemic in 2019, when people had to stay at home without interrupting their work processes, and now, in post-covid times, they also remain popular due to their convenience, high availability, easy scalability and cost savings. Due to the widespread use of cloud computing services, a high level of security is required. Unfortunately, the popularity of cloud computing has its drawbacks – in addition to the fact that it is more difficult to monitor the security of a remote environment than the security of a local computer, there are many other threats. In today's reality, people use cloud computing technologies in large volumes, for example, at work, for personal purposes, etc., as they have great trust in these technologies. This is the reason why it is necessary to maintain a high level of security and constantly improve it. Cloud computing security threats are usually divided into confidentiality, integrity, and availability threats. To prevent the loss of confidential information, service providers must ensure its integrity. Users want to be sure that their data will not fall into the hands of an intruder or third-party services. Therefore, this article discusses the most common threats to data security and integrity in cloud computing and the existing methods that prevent these vulnerabilities and possible problems at different levels and with the help of different tools.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"3 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83277121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ways to improve the efficiency of methods and means of counteracting unauthorized speech recording and their comparative analysis 提高反非法录音效率的方法和手段及其比较分析
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.07
A. Oleynikov, V.A. Pulavskyi, O.H. Bilotserkivets
The features of using ultrasonic, electromagnetic and acoustic methods to counteract unauthorized recording of speech on sound recording devices are considered. The advantages and unused possibilities of the methods are noted. Ways to increase the effectiveness of the ultrasonic method of counteraction consist in using the two-frequency ultrasonic method, in positioning the device for emitting ultrasonic vibrations no more than two meters from the target, in using high-intensity ultrasonic vibrations, in using the ultrasonic method together with the acoustic method, and others. Ways to increase the effectiveness of the electromagnetic method consist in using amplitude-pulse modulation of the interference signal, narrowly directed antennas, a device with a maximum allowable power, and others; Ways to increase the effectiveness of the acoustic method consist in creating speech-like interference from the speech of the interlocutor (synchronized with speech pauses), reducing the distance between the source of interference radiation and the source of speech in relation to the distance between the interlocutors due to organizational protection measures. (adapted acoustic method). The most promising is the adapted acoustic method having the greatest potential for guaranteed countermeasures, subject to the requirements for its optimal use. Analyzing the results of the experiment, we conclude that the adapted acoustic method is the most effective. The effectiveness of the method confirms the suppression range from 1.8 m to 3.5 m depending on the device, for comparison, in the ultrasonic experiment, one of the indicators was 0.9 m, and in the electromagnetic experiment, even 0 m. The formation of interference through the acoustic channel is higher the described method ensures the universality of the proposed method to the type of device for suppressing unauthorized speech recording, regardless of the underlying method – electromagnetic, ultrasonic or acoustic.
考虑了使用超声波、电磁和声学方法来抵消录音设备上未经授权的录音的特点。指出了这些方法的优点和未使用的可能性。提高超声反作用方法有效性的方法包括:使用双频超声方法,将发射超声振动的装置定位在距离目标不超过2米的位置,使用高强度超声振动,将超声方法与声学方法结合使用,以及其他方法。提高电磁方法有效性的方法包括使用干扰信号的幅度脉冲调制、窄定向天线、具有最大允许功率的装置等;提高声学方法有效性的方法包括从对话者的语音中产生类似语音的干扰(与语音暂停同步),减少干扰辐射源与语音源之间的距离,相对于由于组织保护措施而导致的对话者之间的距离。(改编声学法)。最有希望的是适应声学方法,它具有最大的保证对抗的潜力,但要满足其最佳使用要求。通过对实验结果的分析,认为自适应声学方法是最有效的。该方法的有效性证实了根据设备的不同,抑制范围从1.8 m到3.5 m不等,作为比较,在超声波实验中,有一个指标是0.9 m,在电磁实验中,甚至是0 m。通过声学通道形成的干扰较高,所描述的方法确保了所提出的方法对抑制未经授权的语音记录的设备类型的通用性,无论其底层方法是电磁,超声波还是声学。
{"title":"Ways to improve the efficiency of methods and means of counteracting unauthorized speech recording and their comparative analysis","authors":"A. Oleynikov, V.A. Pulavskyi, O.H. Bilotserkivets","doi":"10.30837/rt.2023.1.212.07","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.07","url":null,"abstract":"The features of using ultrasonic, electromagnetic and acoustic methods to counteract unauthorized recording of speech on sound recording devices are considered. The advantages and unused possibilities of the methods are noted. Ways to increase the effectiveness of the ultrasonic method of counteraction consist in using the two-frequency ultrasonic method, in positioning the device for emitting ultrasonic vibrations no more than two meters from the target, in using high-intensity ultrasonic vibrations, in using the ultrasonic method together with the acoustic method, and others. Ways to increase the effectiveness of the electromagnetic method consist in using amplitude-pulse modulation of the interference signal, narrowly directed antennas, a device with a maximum allowable power, and others; Ways to increase the effectiveness of the acoustic method consist in creating speech-like interference from the speech of the interlocutor (synchronized with speech pauses), reducing the distance between the source of interference radiation and the source of speech in relation to the distance between the interlocutors due to organizational protection measures. (adapted acoustic method). \u0000The most promising is the adapted acoustic method having the greatest potential for guaranteed countermeasures, subject to the requirements for its optimal use. \u0000Analyzing the results of the experiment, we conclude that the adapted acoustic method is the most effective. The effectiveness of the method confirms the suppression range from 1.8 m to 3.5 m depending on the device, for comparison, in the ultrasonic experiment, one of the indicators was 0.9 m, and in the electromagnetic experiment, even 0 m. The formation of interference through the acoustic channel is higher the described method ensures the universality of the proposed method to the type of device for suppressing unauthorized speech recording, regardless of the underlying method – electromagnetic, ultrasonic or acoustic.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"16 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86856084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis of promising key encapsulation mechanisms in the core-SVP model 核心- svp模型中有前途的密钥封装机制的安全性分析
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.06
S.O. Kandiy
The study of key encapsulation mechanisms on structured lattices is one of the important directions in modern post-quantum cryptography, as many mechanisms are either already standardized (DSTU 8961:2019 "Skelya") or are promising candidates for standardization (CRYSTALS-Kyber). Estimating the complexity of lattice reduction for cryptographic schemes is an old problem. Asymptotic estimates differ greatly from experimental values, therefore, a number of heuristic methods were developed to solve practical problems. The coreSVP model is a standard means of assessing the security of cryptographic schemes on lattices. The purpose of the work is to analyze the encapsulation mechanisms of DSTU 8961:2019 "Skelya" and CRYSTALS-Kyber keys in the coreSVP model. The analysis was performed using two popular heuristics – GSA (Geometric Series Assumption) and the Chen-Nguyen simulator. The analysis showed that the Chen-Nguyen simulator gives slightly lower estimates than the GSA heuristic. As a result of the analysis, it was found that 8961:2019 The “Skelya” and CRYSTALS-Kyber in the coreSVP model for classical computers have slightly lower than declared security values, but for quantum computers the key encapsulation mechanisms provide the declared security levels. Note that during the analysis, the accuracy of the GSA heuristics and the Chen-Nguyen simulator were analyzed separately. Examples of parameters for which heuristics do not give sufficiently accurate results are given. The performed analysis does not take into account the algebraic structure of lattices used in 8961:2019 "Skelya" and CRYSTALS-Kyber. The inclusion of an algebraic structure in the analysis is a further direction of work. The use of simulators is a promising direction, however, more accurate simulators that take into account the structuring of LWE and NTRU arrays are needed.
结构化晶格上密钥封装机制的研究是现代后量子密码学的重要方向之一,因为许多机制要么已经标准化(DSTU 8961:2019“Skelya”),要么是标准化的有希望的候选者(CRYSTALS-Kyber)。估计密码方案的格约简复杂度是一个老问题。渐近估计与实验值相差很大,因此,开发了许多启发式方法来解决实际问题。coreSVP模型是评估格上密码方案安全性的标准方法。本工作的目的是分析DSTU 8961:2019“Skelya”和CRYSTALS-Kyber密钥在coreSVP模型中的封装机制。分析使用两种流行的启发式方法- GSA(几何级数假设)和Chen-Nguyen模拟器。分析表明,Chen-Nguyen模拟器给出的估计略低于GSA启发式。分析结果发现,经典计算机coreSVP模型中的8961:2019“Skelya”和crystal - kyber的安全值略低于声明的安全值,但对于量子计算机,关键封装机制提供了声明的安全级别。请注意,在分析过程中,分别分析了GSA启发式和Chen-Nguyen模拟器的准确性。给出了启发式不能给出足够准确结果的参数示例。所进行的分析没有考虑到8961:2019“Skelya”和CRYSTALS-Kyber中使用的晶格的代数结构。在分析中加入代数结构是进一步的工作方向。使用模拟器是一个很有前途的方向,然而,需要更精确的模拟器来考虑LWE和NTRU阵列的结构。
{"title":"Security analysis of promising key encapsulation mechanisms in the core-SVP model","authors":"S.O. Kandiy","doi":"10.30837/rt.2023.1.212.06","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.06","url":null,"abstract":"The study of key encapsulation mechanisms on structured lattices is one of the important directions in modern post-quantum cryptography, as many mechanisms are either already standardized (DSTU 8961:2019 \"Skelya\") or are promising candidates for standardization (CRYSTALS-Kyber). Estimating the complexity of lattice reduction for cryptographic schemes is an old problem. Asymptotic estimates differ greatly from experimental values, therefore, a number of heuristic methods were developed to solve practical problems. The coreSVP model is a standard means of assessing the security of cryptographic schemes on lattices. The purpose of the work is to analyze the encapsulation mechanisms of DSTU 8961:2019 \"Skelya\" and CRYSTALS-Kyber keys in the coreSVP model. The analysis was performed using two popular heuristics – GSA (Geometric Series Assumption) and the Chen-Nguyen simulator. The analysis showed that the Chen-Nguyen simulator gives slightly lower estimates than the GSA heuristic. As a result of the analysis, it was found that 8961:2019 The “Skelya” and CRYSTALS-Kyber in the coreSVP model for classical computers have slightly lower than declared security values, but for quantum computers the key encapsulation mechanisms provide the declared security levels. Note that during the analysis, the accuracy of the GSA heuristics and the Chen-Nguyen simulator were analyzed separately. Examples of parameters for which heuristics do not give sufficiently accurate results are given. The performed analysis does not take into account the algebraic structure of lattices used in 8961:2019 \"Skelya\" and CRYSTALS-Kyber. The inclusion of an algebraic structure in the analysis is a further direction of work. The use of simulators is a promising direction, however, more accurate simulators that take into account the structuring of LWE and NTRU arrays are needed.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"30 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91302475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1