Pub Date : 2021-09-24DOI: 10.30837/rt.2021.3.206.05
A. Kuznetsov, N. Poluyanenko, V. Katrich, S.O. Kandii, Yu. A. Zaĭchenko
Nonlinear substitutions (S-boxes) are used in most modern symmetric cryptoalgorithms. They are designed to mix input data and play a significant role in ensuring resistance against known cryptanalytic attacks (differential, linear, algebraic and other cryptanalysis methods). However, random generation of nonlinear substitutions with the desired indicators is an extremely difficult mathematical problem. This article explores the heuristic techniques for S-boxes informed search, in particular, discusses various cost functions used in most of the known algorithms (for example, local search, hill climbing, simulated annealing, genetic search, etc.). The aim of the study is to determine the specific parameters of heuristic functions, which, on the one hand, do not reduce the degree of awareness of the search nodes, and on the other hand, do not require significant computational costs. The article examines the influence of individual parameters on the value of the cost function and complexity of its calculation. It also provides specific recommendations for the formation of parameters for heuristic search for S-boxes, which significantly affect the efficiency of generating nonlinear substitutions for symmetric cryptography.
{"title":"Investigation of heuristic search functions for nonlinear substitutions for symmetric cryptography","authors":"A. Kuznetsov, N. Poluyanenko, V. Katrich, S.O. Kandii, Yu. A. Zaĭchenko","doi":"10.30837/rt.2021.3.206.05","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.05","url":null,"abstract":"Nonlinear substitutions (S-boxes) are used in most modern symmetric cryptoalgorithms. They are designed to mix input data and play a significant role in ensuring resistance against known cryptanalytic attacks (differential, linear, algebraic and other cryptanalysis methods). However, random generation of nonlinear substitutions with the desired indicators is an extremely difficult mathematical problem. This article explores the heuristic techniques for S-boxes informed search, in particular, discusses various cost functions used in most of the known algorithms (for example, local search, hill climbing, simulated annealing, genetic search, etc.). The aim of the study is to determine the specific parameters of heuristic functions, which, on the one hand, do not reduce the degree of awareness of the search nodes, and on the other hand, do not require significant computational costs. The article examines the influence of individual parameters on the value of the cost function and complexity of its calculation. It also provides specific recommendations for the formation of parameters for heuristic search for S-boxes, which significantly affect the efficiency of generating nonlinear substitutions for symmetric cryptography.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87962519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.30837/rt.2021.3.206.06
A. Kuznetsov, N. Poluyanenko, S. Berdnik, S.O. Kandii, Yu. A. Zaĭchenko
Nonlinear substitutions (S-boxes) are an important component of modern symmetric cryptography algorithms. They complicate symmetric transformations and introduce nonlinearity into the input-output relationship, which ensures the stability of the algorithms against some cryptanalysis methods. Generation of S-boxes can be done in different ways. However, heuristic techniques are the most promising ones. On the one hand, the generated S-boxes are in the form of random substitutions, which complicates algebraic cryptanalysis. On the other hand, heuristic search allows one to achieve high rates of nonlinearity and δ-uniformity, which complicates linear and differential cryptanalysis. This article studies the simplest local search algorithm for generating S-boxes. To assess the efficiency of the algorithm, the concept of a track of a cost function is introduced in the article. Numerous experiments are carried out, in particular, the influence of the number of internal and external loops of local search on the complexity of generating the target S-box is investigated. The optimal (from the point of view of minimum time consumption) parameters of the local search algorithm for generating S-blocks with a target nonlinearity of 104 and the number of parallel computing threads 30 are substantiated. It is shown that with the selected (optimal) parameters it is possible to reliably form S-blocks with a nonlinearity of 104.
{"title":"Optimization of local search algorithm parameters for generating nonlinear substitutions","authors":"A. Kuznetsov, N. Poluyanenko, S. Berdnik, S.O. Kandii, Yu. A. Zaĭchenko","doi":"10.30837/rt.2021.3.206.06","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.06","url":null,"abstract":"Nonlinear substitutions (S-boxes) are an important component of modern symmetric cryptography algorithms. They complicate symmetric transformations and introduce nonlinearity into the input-output relationship, which ensures the stability of the algorithms against some cryptanalysis methods. Generation of S-boxes can be done in different ways. However, heuristic techniques are the most promising ones. On the one hand, the generated S-boxes are in the form of random substitutions, which complicates algebraic cryptanalysis. On the other hand, heuristic search allows one to achieve high rates of nonlinearity and δ-uniformity, which complicates linear and differential cryptanalysis. This article studies the simplest local search algorithm for generating S-boxes. To assess the efficiency of the algorithm, the concept of a track of a cost function is introduced in the article. Numerous experiments are carried out, in particular, the influence of the number of internal and external loops of local search on the complexity of generating the target S-box is investigated. The optimal (from the point of view of minimum time consumption) parameters of the local search algorithm for generating S-blocks with a target nonlinearity of 104 and the number of parallel computing threads 30 are substantiated. It is shown that with the selected (optimal) parameters it is possible to reliably form S-blocks with a nonlinearity of 104.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87573307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.30837/rt.2021.3.206.09
Y. Kotukh, T. Okhrimenko, O. Dyachenko, N. Rotaneva, L. Kozina, D. Zelenskyi
Rapid development and advances of quantum computers are contributing to the development of public key cryptosystems based on mathematically complex or difficult problems, as the threat of using quantum algorithms to hack modern traditional cryptosystems is becoming much more real every day. It should be noted that the classical mathematically complex problems of factorization of integers and discrete logarithms are no longer considered complex for quantum calculations. Dozens of cryptosystems were considered and proposed on various complex problems of group theory in the 2000s. One of such complex problems is the problem of the word. One of the first implementations of the cryptosystem based on the word problem was proposed by Magliveras using logarithmic signatures for finite permutation groups and further proposed by Lempken et al. for asymmetric cryptography with random covers. The innovation of this idea is to extend the difficult problem of the word to a large number of groups. The article summarizes the known results of cryptanalysis of the basic structures of the cryptosystem and defines recommendations for ways to improve the cryptographic properties of structures and the use of non-commutative groups as basic structures.
{"title":"Cryptanalysis of the system based on word problems using logarithmic signatures","authors":"Y. Kotukh, T. Okhrimenko, O. Dyachenko, N. Rotaneva, L. Kozina, D. Zelenskyi","doi":"10.30837/rt.2021.3.206.09","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.09","url":null,"abstract":"Rapid development and advances of quantum computers are contributing to the development of public key cryptosystems based on mathematically complex or difficult problems, as the threat of using quantum algorithms to hack modern traditional cryptosystems is becoming much more real every day. It should be noted that the classical mathematically complex problems of factorization of integers and discrete logarithms are no longer considered complex for quantum calculations. Dozens of cryptosystems were considered and proposed on various complex problems of group theory in the 2000s. One of such complex problems is the problem of the word. One of the first implementations of the cryptosystem based on the word problem was proposed by Magliveras using logarithmic signatures for finite permutation groups and further proposed by Lempken et al. for asymmetric cryptography with random covers. The innovation of this idea is to extend the difficult problem of the word to a large number of groups. The article summarizes the known results of cryptanalysis of the basic structures of the cryptosystem and defines recommendations for ways to improve the cryptographic properties of structures and the use of non-commutative groups as basic structures.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81098659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.30837/rt.2021.3.206.01
O. Potii, Y. Gorbenko, O. Zamula, K. Isirova
Global trends to increase the threats to information and cybersecurity, increasing the level of vulnerability of information and telecommunications systems (ITS) necessitate the development and implementation of new standards and regulations on information security, the introduction of new technologies and best practices in information security. The main approach to information and cybersecurity in ITS is the Risk-Based Protection Strategy. The main task of information risk management (IR) is to identify and assess objectively the most significant risks for the company's business, as well as the need to use risk controls to increase the efficiency and profitability of the company's economic activities. It is believed that quality risk management allows you to use the optimal efficiency and cost of risk control and information protection measures, adequate to the current goals and objectives of the company's business. The paper presents results of solving the current problem of finding optimal methods for assessing the risks of information and cybersecurity. Criteria for selecting the best methods of risk assessment are proposed. The analysis of known methods of risk assessment for compliance with these criteria is performed. Proposals have been formulated to create promising methods for risk assessment, their application to modern information security management systems, especially those designed for critical infrastructure, will most effectively address the problems of information and cybersecurity, as well as privacy.
{"title":"Analysis of methods for assessing and managing cyber risks and information security","authors":"O. Potii, Y. Gorbenko, O. Zamula, K. Isirova","doi":"10.30837/rt.2021.3.206.01","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.01","url":null,"abstract":"Global trends to increase the threats to information and cybersecurity, increasing the level of vulnerability of information and telecommunications systems (ITS) necessitate the development and implementation of new standards and regulations on information security, the introduction of new technologies and best practices in information security. The main approach to information and cybersecurity in ITS is the Risk-Based Protection Strategy. The main task of information risk management (IR) is to identify and assess objectively the most significant risks for the company's business, as well as the need to use risk controls to increase the efficiency and profitability of the company's economic activities. It is believed that quality risk management allows you to use the optimal efficiency and cost of risk control and information protection measures, adequate to the current goals and objectives of the company's business. The paper presents results of solving the current problem of finding optimal methods for assessing the risks of information and cybersecurity. Criteria for selecting the best methods of risk assessment are proposed. The analysis of known methods of risk assessment for compliance with these criteria is performed. Proposals have been formulated to create promising methods for risk assessment, their application to modern information security management systems, especially those designed for critical infrastructure, will most effectively address the problems of information and cybersecurity, as well as privacy.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88803345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.30837/rt.2021.3.206.14
O. Zaporozhets, N. Shtefan
Quality is one of the factors that ensure the commercial success and safety of using the software. Quality is understood as conformity the explicit and implicit requirements of various stakeholders. It is necessary to ensure a joint understanding between developers and users, engineers need to understand the meaning of the concept of quality, characteristics and importance of quality for the developed or maintained software. Measurements are the basis for quality assurance. They are the main tool for managing the life cycle of software products, assessing the implementation of plans and monitoring. To quantify quality, it is necessary to measure the characteristics of the software. Standardization provides unification of requirements for quality, its measurement and assessment. The use of standards has many potential benefits for any organization, especially in key areas such as measuring the quality of software products, information and measurement systems. Recognized international standards organizations have published the ISO/IEC 25000 series of standards for systems and software quality requirements and evaluation (SQuaRE), which is gaining widespread practical application. The paper discusses a series of the SQuaRE international standards, analyzes the relationship between the quality model, quality characteristics, quality measures and a new concept, i.e., a quality measure element of the software, presents the measurement of quality based on these standards.
{"title":"Measurement of software quality based on international standards","authors":"O. Zaporozhets, N. Shtefan","doi":"10.30837/rt.2021.3.206.14","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.14","url":null,"abstract":"Quality is one of the factors that ensure the commercial success and safety of using the software. Quality is understood as conformity the explicit and implicit requirements of various stakeholders. It is necessary to ensure a joint understanding between developers and users, engineers need to understand the meaning of the concept of quality, characteristics and importance of quality for the developed or maintained software. Measurements are the basis for quality assurance. They are the main tool for managing the life cycle of software products, assessing the implementation of plans and monitoring. To quantify quality, it is necessary to measure the characteristics of the software. Standardization provides unification of requirements for quality, its measurement and assessment. The use of standards has many potential benefits for any organization, especially in key areas such as measuring the quality of software products, information and measurement systems. Recognized international standards organizations have published the ISO/IEC 25000 series of standards for systems and software quality requirements and evaluation (SQuaRE), which is gaining widespread practical application. The paper discusses a series of the SQuaRE international standards, analyzes the relationship between the quality model, quality characteristics, quality measures and a new concept, i.e., a quality measure element of the software, presents the measurement of quality based on these standards.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90588633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.30837/rt.2021.3.206.02
I. Gorbenko, A. Zamula
Methods for information exchange, formation and processing of data used in information and communication systems (ICS), as well as classes of broadband signals used as a physical data carrier, do not provide the necessary (for individual ICS applications) indicators of cyber and information security, noise immunity of reception signals and secrecy of IKS functioning. Most of the existing systems use signals, the construction of which is based on linear laws, which allows an attacker, based on the establishment of the parameters of the signals used in the system, to carry out deliberate interference in the operation of the ICS with minimal energy consumption. The article presents conceptual approaches to the construction of secure ICS, which determine the need to cover the entire spectrum of information transformations in the complex, and based on the synthesis of signal systems with improved ensemble, correlation, structural properties. A method is proposed for synthesizing discrete derivatives of signals based on nonlinear discrete complex cryptographic signals (CS) and orthogonal signals formed on the basis of the rows of the Hadamard matrix (initial signals),. Based on computer modeling and the performed calculations, it is shown that the derivative signals formed on the basis of cryptographic sequences and rows of the Hadamard matrix have improved properties compared to orthogonal and linear classes of signals. Approaches to the construction are stated and a general characteristic of the hardware-software complex for synthesis, analysis, study of properties, generation, processing of a number of studied signal classes is given. It is shown that the use of such signals will improve such indicators of the system functioning as information security, noise immunity of signal reception and secrecy of functioning.
{"title":"Theoretical approaches to the synthesis of discrete signals with necessary properties","authors":"I. Gorbenko, A. Zamula","doi":"10.30837/rt.2021.3.206.02","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.02","url":null,"abstract":"Methods for information exchange, formation and processing of data used in information and communication systems (ICS), as well as classes of broadband signals used as a physical data carrier, do not provide the necessary (for individual ICS applications) indicators of cyber and information security, noise immunity of reception signals and secrecy of IKS functioning. Most of the existing systems use signals, the construction of which is based on linear laws, which allows an attacker, based on the establishment of the parameters of the signals used in the system, to carry out deliberate interference in the operation of the ICS with minimal energy consumption. The article presents conceptual approaches to the construction of secure ICS, which determine the need to cover the entire spectrum of information transformations in the complex, and based on the synthesis of signal systems with improved ensemble, correlation, structural properties. A method is proposed for synthesizing discrete derivatives of signals based on nonlinear discrete complex cryptographic signals (CS) and orthogonal signals formed on the basis of the rows of the Hadamard matrix (initial signals),. Based on computer modeling and the performed calculations, it is shown that the derivative signals formed on the basis of cryptographic sequences and rows of the Hadamard matrix have improved properties compared to orthogonal and linear classes of signals. Approaches to the construction are stated and a general characteristic of the hardware-software complex for synthesis, analysis, study of properties, generation, processing of a number of studied signal classes is given. It is shown that the use of such signals will improve such indicators of the system functioning as information security, noise immunity of signal reception and secrecy of functioning.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72654659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.30837/rt.2021.3.206.08
V. Vilihura, V. Yesin
Security is one of the most important characteristics of the quality of information systems in general and databases, as their main component, in particular. Therefore, the presence of an information protection system, as a complex of software, technical, cryptographic, organizational and other methods, means and measures that ensure the integrity, confidentiality, authenticity and availability of information in conditions of exposure to natural or artificial threats, is an integral feature of almost any modern information system and database. At the same time, in order to be able to verify the conclusions about the degree of security, it must be measured in some way. The paper considers a database security model based on a full overlap security model (a covered security system), which is traditionally considered the basis for a formal description of security systems. Thanks to expanding the Clements-Hoffman model by including a set of vulnerabilities (as a separately objectively existing category necessary to describe a weakness of an asset or control that can be exploited by one or more threats), which makes it possible to assess more adequately the likelihood of an unwanted incident (threat realization) in a two-factor model (in which one of the factors reflects the motivational component of the threat, and the second takes into account the existing vulnerabilities); a defined integral indicator of database security (as a value inverse to the total residual risk, the constituent components of which are represented in the form of the corresponding linguistic variables); the developed technique for assessing the main components of security barriers and the security of the database as a whole, based on the theory of fuzzy sets and risk, it becomes possible to use the developed model to conduct a quantitative assessment of the security of the analyzed database.
{"title":"Database protection model based on security system with full overlap","authors":"V. Vilihura, V. Yesin","doi":"10.30837/rt.2021.3.206.08","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.08","url":null,"abstract":"Security is one of the most important characteristics of the quality of information systems in general and databases, as their main component, in particular. Therefore, the presence of an information protection system, as a complex of software, technical, cryptographic, organizational and other methods, means and measures that ensure the integrity, confidentiality, authenticity and availability of information in conditions of exposure to natural or artificial threats, is an integral feature of almost any modern information system and database. At the same time, in order to be able to verify the conclusions about the degree of security, it must be measured in some way. The paper considers a database security model based on a full overlap security model (a covered security system), which is traditionally considered the basis for a formal description of security systems. Thanks to expanding the Clements-Hoffman model by including a set of vulnerabilities (as a separately objectively existing category necessary to describe a weakness of an asset or control that can be exploited by one or more threats), which makes it possible to assess more adequately the likelihood of an unwanted incident (threat realization) in a two-factor model (in which one of the factors reflects the motivational component of the threat, and the second takes into account the existing vulnerabilities); a defined integral indicator of database security (as a value inverse to the total residual risk, the constituent components of which are represented in the form of the corresponding linguistic variables); the developed technique for assessing the main components of security barriers and the security of the database as a whole, based on the theory of fuzzy sets and risk, it becomes possible to use the developed model to conduct a quantitative assessment of the security of the analyzed database.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89462535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.30837/rt.2021.3.206.13
N. Tulyakova, O. Trofymchuk
There is a problem of nonlinear (abrupt) signal trend detection in many digital signals processing practical applications. In particular, in the field of biomedical signals processing, the actual task is the elimination of abrupt signal baseline distortions caused by the patient's movements. For processing such signals containing edges and other discontinues, linear filtering based on discrete Fourier or cosine transforms leads to significant smoothing of a signal. Median type algorithms related to nonlinear stable (robust) filters are successfully applied for filtering such signals, in particular, high efficiency is provided by median hybrid filters with finite impulse response (FIR). The article considers simple algorithms of the class of FIR-median hybrid filters used for signal nonlinear trend detection. It is proposed to modify these algorithms by replacing the operation of finding the median of the data in the sliding filter window with the calculation of their myriad, as well as adding weights (number of duplications) to certain window elements. Statistical estimates of filter efficiency according to the mean square error (MSE) criterion for test signals like “step” and “ramp” edges, and triangular peak and parabola have been obtained. The high efficiency of the investigated nonlinear filters for the listed test signals types and the improvements achieved as a result of the proposed filter modifications are shown based on the analysis of the filter output signals and statistical estimates of their quality. Some examples of processing biomedical signals of electroencephalograms which illustrate good quality of noise suppression and signal abrupt changes preservation, and motion artifacts removal without large signal distortions are given.
{"title":"Modified algorithms for signal nonlinear trend detection","authors":"N. Tulyakova, O. Trofymchuk","doi":"10.30837/rt.2021.3.206.13","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.13","url":null,"abstract":"There is a problem of nonlinear (abrupt) signal trend detection in many digital signals processing practical applications. In particular, in the field of biomedical signals processing, the actual task is the elimination of abrupt signal baseline distortions caused by the patient's movements. For processing such signals containing edges and other discontinues, linear filtering based on discrete Fourier or cosine transforms leads to significant smoothing of a signal. Median type algorithms related to nonlinear stable (robust) filters are successfully applied for filtering such signals, in particular, high efficiency is provided by median hybrid filters with finite impulse response (FIR). The article considers simple algorithms of the class of FIR-median hybrid filters used for signal nonlinear trend detection. It is proposed to modify these algorithms by replacing the operation of finding the median of the data in the sliding filter window with the calculation of their myriad, as well as adding weights (number of duplications) to certain window elements. Statistical estimates of filter efficiency according to the mean square error (MSE) criterion for test signals like “step” and “ramp” edges, and triangular peak and parabola have been obtained. The high efficiency of the investigated nonlinear filters for the listed test signals types and the improvements achieved as a result of the proposed filter modifications are shown based on the analysis of the filter output signals and statistical estimates of their quality. Some examples of processing biomedical signals of electroencephalograms which illustrate good quality of noise suppression and signal abrupt changes preservation, and motion artifacts removal without large signal distortions are given.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88287214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.30837/rt.2021.3.206.03
O. Nariezhnii, T. Grinenko, I. Gorbenko
Construction of modern measuring complexes of the coordinate-time support system of Ukraine is impossible without improving mathematical models of quantum standards of frequency (QSF) used in group standards. This work is devoted to the analysis of methods for the stable solution of direct and inverse problems (methods for solving ill-posed problems) in models of the interaction of passive QSF in the process of their comparisons. The priority task is to use these methods for the numerical solution of problems in the design of group QSF and parallel quantum generators of random numbers. Methods for solving such problems are in demand, since they make it possible to create mathematical models of group QSF interaction. These models will enable the design of efficient parallel quantum random number generation devices for high-tech areas of cybersecurity. Varieties of methods such as the method of least squares or the method of the Moore-Penrose pseudo-inverse matrix are used, as a rule when evaluating the metrological parameters of QSF.Robust methods of regularization or filtering, for example, the Kalman or Wiener filter method, are used in the algorithms of group standards, due to the instability of the solution.However, these methods do not work in the presence of an error from the interaction of QSF in the process of their functioning in a group standard or in comparisons. The aim of this work is to analyze and substantiate the formulation of the problem of assessing the potential accuracy characteristics of passive QSF in the presence of an error from the interaction. Regularization parameters when determining the state vector of the group standard are found using signals transmitted by global navigation satellite systems such as GPSGLONASS in the local differential correction mode.
{"title":"Statement of the problem of assessing instability of passive quantum frequency standards in the presence of an error from the interaction","authors":"O. Nariezhnii, T. Grinenko, I. Gorbenko","doi":"10.30837/rt.2021.3.206.03","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.03","url":null,"abstract":"Construction of modern measuring complexes of the coordinate-time support system of Ukraine is impossible without improving mathematical models of quantum standards of frequency (QSF) used in group standards. This work is devoted to the analysis of methods for the stable solution of direct and inverse problems (methods for solving ill-posed problems) in models of the interaction of passive QSF in the process of their comparisons. The priority task is to use these methods for the numerical solution of problems in the design of group QSF and parallel quantum generators of random numbers. Methods for solving such problems are in demand, since they make it possible to create mathematical models of group QSF interaction. These models will enable the design of efficient parallel quantum random number generation devices for high-tech areas of cybersecurity. \u0000Varieties of methods such as the method of least squares or the method of the Moore-Penrose pseudo-inverse matrix are used, as a rule when evaluating the metrological parameters of QSF.Robust methods of regularization or filtering, for example, the Kalman or Wiener filter method, are used in the algorithms of group standards, due to the instability of the solution.However, these methods do not work in the presence of an error from the interaction of QSF in the process of their functioning in a group standard or in comparisons. \u0000The aim of this work is to analyze and substantiate the formulation of the problem of assessing the potential accuracy characteristics of passive QSF in the presence of an error from the interaction. Regularization parameters when determining the state vector of the group standard are found using signals transmitted by global navigation satellite systems such as GPSGLONASS in the local differential correction mode.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85731205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-02DOI: 10.30837/rt.2021.2.205.16
I. Svyd, I. Obod, O. Maltsev, M. Tkach, S.V. Starokozhev, A.O. Hlushchenko, V.S. Chumak
The paper analyzes the principles of construction and structure of "friend or foe" identification systems. It is revealed, that the party, interested in the existing system, has the ability of unauthorized use of this information resource for long-range determination of air objects coordinates, on the one hand, and distortion of information of this information resource, on the other hand, which leads to unpredictable consequences. It is shown, that the most vulnerable place in the "friend or foe" identification systems is the aircraft transponder, which significantly affects noise stability and noise immunity of the identification systems of air objects. The paper proposes a method of hereditary transition to noise-immune "friend or foe" identification systems based on synchronous networks of identification systems, which allows expanding significantly the methods of servicing requests and methods of constructing systems. This method of constructing identification systems eliminates the existing problem of dispersed identification systems, as well as the problem of temporal matching of signals coming from primary and secondary radar systems. The proposed method of hereditary transition to noise-immune "friend or foe" identification systems makes it possible to exclude the possibility of unauthorized access to identification information resources by an interested party, significantly increases the noise immunity of the identification system as a whole.
{"title":"Method for increasing noise immunity of radar \"friend or foe\" identification systems under the action of intentional correlated interference","authors":"I. Svyd, I. Obod, O. Maltsev, M. Tkach, S.V. Starokozhev, A.O. Hlushchenko, V.S. Chumak","doi":"10.30837/rt.2021.2.205.16","DOIUrl":"https://doi.org/10.30837/rt.2021.2.205.16","url":null,"abstract":"The paper analyzes the principles of construction and structure of \"friend or foe\" identification systems. It is revealed, that the party, interested in the existing system, has the ability of unauthorized use of this information resource for long-range determination of air objects coordinates, on the one hand, and distortion of information of this information resource, on the other hand, which leads to unpredictable consequences. It is shown, that the most vulnerable place in the \"friend or foe\" identification systems is the aircraft transponder, which significantly affects noise stability and noise immunity of the identification systems of air objects. The paper proposes a method of hereditary transition to noise-immune \"friend or foe\" identification systems based on synchronous networks of identification systems, which allows expanding significantly the methods of servicing requests and methods of constructing systems. This method of constructing identification systems eliminates the existing problem of dispersed identification systems, as well as the problem of temporal matching of signals coming from primary and secondary radar systems. The proposed method of hereditary transition to noise-immune \"friend or foe\" identification systems makes it possible to exclude the possibility of unauthorized access to identification information resources by an interested party, significantly increases the noise immunity of the identification system as a whole.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90896916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}