首页 > 最新文献

Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia最新文献

英文 中文
Investigation of heuristic search functions for nonlinear substitutions for symmetric cryptography 对称密码学非线性替换的启发式搜索函数研究
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-09-24 DOI: 10.30837/rt.2021.3.206.05
A. Kuznetsov, N. Poluyanenko, V. Katrich, S.O. Kandii, Yu. A. Zaĭchenko
Nonlinear substitutions (S-boxes) are used in most modern symmetric cryptoalgorithms. They are designed to mix input data and play a significant role in ensuring resistance against known cryptanalytic attacks (differential, linear, algebraic and other cryptanalysis methods). However, random generation of nonlinear substitutions with the desired indicators is an extremely difficult mathematical problem. This article explores the heuristic techniques for S-boxes informed search, in particular, discusses various cost functions used in most of the known algorithms (for example, local search, hill climbing, simulated annealing, genetic search, etc.). The aim of the study is to determine the specific parameters of heuristic functions, which, on the one hand, do not reduce the degree of awareness of the search nodes, and on the other hand, do not require significant computational costs. The article examines the influence of individual parameters on the value of the cost function and complexity of its calculation. It also provides specific recommendations for the formation of parameters for heuristic search for S-boxes, which significantly affect the efficiency of generating nonlinear substitutions for symmetric cryptography.
非线性替换(s -box)在大多数现代对称密码算法中使用。它们被设计用于混合输入数据,并在确保抵抗已知密码分析攻击(微分,线性,代数和其他密码分析方法)方面发挥重要作用。然而,具有期望指标的非线性替换的随机生成是一个极其困难的数学问题。本文探讨了s -box知情搜索的启发式技术,特别是讨论了大多数已知算法(例如,局部搜索、爬坡、模拟退火、遗传搜索等)中使用的各种成本函数。研究的目的是确定启发式函数的具体参数,一方面不降低搜索节点的感知程度,另一方面不需要大量的计算成本。本文考察了各个参数对成本函数值及其计算复杂性的影响。本文还对s -box的启发式搜索参数的形成提供了具体的建议,s -box对对称密码生成非线性替换的效率有重要影响。
{"title":"Investigation of heuristic search functions for nonlinear substitutions for symmetric cryptography","authors":"A. Kuznetsov, N. Poluyanenko, V. Katrich, S.O. Kandii, Yu. A. Zaĭchenko","doi":"10.30837/rt.2021.3.206.05","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.05","url":null,"abstract":"Nonlinear substitutions (S-boxes) are used in most modern symmetric cryptoalgorithms. They are designed to mix input data and play a significant role in ensuring resistance against known cryptanalytic attacks (differential, linear, algebraic and other cryptanalysis methods). However, random generation of nonlinear substitutions with the desired indicators is an extremely difficult mathematical problem. This article explores the heuristic techniques for S-boxes informed search, in particular, discusses various cost functions used in most of the known algorithms (for example, local search, hill climbing, simulated annealing, genetic search, etc.). The aim of the study is to determine the specific parameters of heuristic functions, which, on the one hand, do not reduce the degree of awareness of the search nodes, and on the other hand, do not require significant computational costs. The article examines the influence of individual parameters on the value of the cost function and complexity of its calculation. It also provides specific recommendations for the formation of parameters for heuristic search for S-boxes, which significantly affect the efficiency of generating nonlinear substitutions for symmetric cryptography.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"122 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87962519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of local search algorithm parameters for generating nonlinear substitutions 生成非线性替换的局部搜索算法参数优化
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-09-24 DOI: 10.30837/rt.2021.3.206.06
A. Kuznetsov, N. Poluyanenko, S. Berdnik, S.O. Kandii, Yu. A. Zaĭchenko
Nonlinear substitutions (S-boxes) are an important component of modern symmetric cryptography algorithms. They complicate symmetric transformations and introduce nonlinearity into the input-output relationship, which ensures the stability of the algorithms against some cryptanalysis methods. Generation of S-boxes can be done in different ways. However, heuristic techniques are the most promising ones. On the one hand, the generated S-boxes are in the form of random substitutions, which complicates algebraic cryptanalysis. On the other hand, heuristic search allows one to achieve high rates of nonlinearity and δ-uniformity, which complicates linear and differential cryptanalysis. This article studies the simplest local search algorithm for generating S-boxes. To assess the efficiency of the algorithm, the concept of a track of a cost function is introduced in the article. Numerous experiments are carried out, in particular, the influence of the number of internal and external loops of local search on the complexity of generating the target S-box is investigated. The optimal (from the point of view of minimum time consumption) parameters of the local search algorithm for generating S-blocks with a target nonlinearity of 104 and the number of parallel computing threads 30 are substantiated. It is shown that with the selected (optimal) parameters it is possible to reliably form S-blocks with a nonlinearity of 104.
非线性替换(s -box)是现代对称密码算法的重要组成部分。它们使对称变换复杂化,并在输入输出关系中引入非线性,从而保证了算法对某些密码分析方法的稳定性。生成s -box可以通过不同的方式完成。然而,启发式技术是最有前途的技术。一方面,生成的s盒是随机替换的形式,使代数密码分析变得复杂。另一方面,启发式搜索允许实现高非线性率和δ-均匀性,这使线性和差分密码分析复杂化。本文研究了生成s盒的最简单局部搜索算法。为了评估算法的效率,本文引入了成本函数轨迹的概念。进行了大量实验,重点研究了局部搜索的内外环数对目标s盒生成复杂度的影响。在目标非线性为104、并行计算线程数为30的情况下,从最小耗时的角度确定了局部搜索算法生成s块的最优参数。结果表明,在所选择的(最优)参数下,可以可靠地形成非线性为104的s块。
{"title":"Optimization of local search algorithm parameters for generating nonlinear substitutions","authors":"A. Kuznetsov, N. Poluyanenko, S. Berdnik, S.O. Kandii, Yu. A. Zaĭchenko","doi":"10.30837/rt.2021.3.206.06","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.06","url":null,"abstract":"Nonlinear substitutions (S-boxes) are an important component of modern symmetric cryptography algorithms. They complicate symmetric transformations and introduce nonlinearity into the input-output relationship, which ensures the stability of the algorithms against some cryptanalysis methods. Generation of S-boxes can be done in different ways. However, heuristic techniques are the most promising ones. On the one hand, the generated S-boxes are in the form of random substitutions, which complicates algebraic cryptanalysis. On the other hand, heuristic search allows one to achieve high rates of nonlinearity and δ-uniformity, which complicates linear and differential cryptanalysis. This article studies the simplest local search algorithm for generating S-boxes. To assess the efficiency of the algorithm, the concept of a track of a cost function is introduced in the article. Numerous experiments are carried out, in particular, the influence of the number of internal and external loops of local search on the complexity of generating the target S-box is investigated. The optimal (from the point of view of minimum time consumption) parameters of the local search algorithm for generating S-blocks with a target nonlinearity of 104 and the number of parallel computing threads 30 are substantiated. It is shown that with the selected (optimal) parameters it is possible to reliably form S-blocks with a nonlinearity of 104.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"43 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87573307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of the system based on word problems using logarithmic signatures 使用对数签名的基于单词问题的系统密码分析
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-09-24 DOI: 10.30837/rt.2021.3.206.09
Y. Kotukh, T. Okhrimenko, O. Dyachenko, N. Rotaneva, L. Kozina, D. Zelenskyi
Rapid development and advances of quantum computers are contributing to the development of public key cryptosystems based on mathematically complex or difficult problems, as the threat of using quantum algorithms to hack modern traditional cryptosystems is becoming much more real every day. It should be noted that the classical mathematically complex problems of factorization of integers and discrete logarithms are no longer considered complex for quantum calculations. Dozens of cryptosystems were considered and proposed on various complex problems of group theory in the 2000s. One of such complex problems is the problem of the word. One of the first implementations of the cryptosystem based on the word problem was proposed by Magliveras using logarithmic signatures for finite permutation groups and further proposed by Lempken et al. for asymmetric cryptography with random covers. The innovation of this idea is to extend the difficult problem of the word to a large number of groups. The article summarizes the known results of cryptanalysis of the basic structures of the cryptosystem and defines recommendations for ways to improve the cryptographic properties of structures and the use of non-commutative groups as basic structures.
量子计算机的快速发展和进步促进了基于数学上复杂或困难问题的公钥密码系统的发展,因为使用量子算法破解现代传统密码系统的威胁日益现实。值得注意的是,对于量子计算来说,经典数学上复杂的整数分解和离散对数问题不再被认为是复杂的。在2000年代,针对各种复杂的群论问题,人们考虑并提出了数十种密码系统。其中一个复杂的问题就是世界的问题。基于字问题的密码系统的第一个实现是由Magliveras提出的,使用有限置换群的对数签名,lemken等人进一步提出了随机覆盖的非对称密码系统。这一思路的创新之处在于将单词难题推广到大量的群体中。本文总结了密码系统基本结构的已知密码学分析结果,并定义了改进结构密码学特性的方法和使用非交换群作为基本结构的建议。
{"title":"Cryptanalysis of the system based on word problems using logarithmic signatures","authors":"Y. Kotukh, T. Okhrimenko, O. Dyachenko, N. Rotaneva, L. Kozina, D. Zelenskyi","doi":"10.30837/rt.2021.3.206.09","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.09","url":null,"abstract":"Rapid development and advances of quantum computers are contributing to the development of public key cryptosystems based on mathematically complex or difficult problems, as the threat of using quantum algorithms to hack modern traditional cryptosystems is becoming much more real every day. It should be noted that the classical mathematically complex problems of factorization of integers and discrete logarithms are no longer considered complex for quantum calculations. Dozens of cryptosystems were considered and proposed on various complex problems of group theory in the 2000s. One of such complex problems is the problem of the word. One of the first implementations of the cryptosystem based on the word problem was proposed by Magliveras using logarithmic signatures for finite permutation groups and further proposed by Lempken et al. for asymmetric cryptography with random covers. The innovation of this idea is to extend the difficult problem of the word to a large number of groups. The article summarizes the known results of cryptanalysis of the basic structures of the cryptosystem and defines recommendations for ways to improve the cryptographic properties of structures and the use of non-commutative groups as basic structures.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"115 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81098659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of methods for assessing and managing cyber risks and information security 分析评估和管理网络风险和信息安全的方法
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-09-24 DOI: 10.30837/rt.2021.3.206.01
O. Potii, Y. Gorbenko, O. Zamula, K. Isirova
Global trends to increase the threats to information and cybersecurity, increasing the level of vulnerability of information and telecommunications systems (ITS) necessitate the development and implementation of new standards and regulations on information security, the introduction of new technologies and best practices in information security. The main approach to information and cybersecurity in ITS is the Risk-Based Protection Strategy. The main task of information risk management (IR) is to identify and assess objectively the most significant risks for the company's business, as well as the need to use risk controls to increase the efficiency and profitability of the company's economic activities. It is believed that quality risk management allows you to use the optimal efficiency and cost of risk control and information protection measures, adequate to the current goals and objectives of the company's business. The paper presents results of solving the current problem of finding optimal methods for assessing the risks of information and cybersecurity. Criteria for selecting the best methods of risk assessment are proposed. The analysis of known methods of risk assessment for compliance with these criteria is performed. Proposals have been formulated to create promising methods for risk assessment, their application to modern information security management systems, especially those designed for critical infrastructure, will most effectively address the problems of information and cybersecurity, as well as privacy.
信息和网络安全面临的威胁日益增加,信息和电信系统(ITS)的脆弱性不断提高,这一全球趋势要求制定和实施有关信息安全的新标准和法规,引入信息安全方面的新技术和最佳实践。ITS中信息和网络安全的主要方法是基于风险的保护策略。信息风险管理(IR)的主要任务是客观地识别和评估公司业务中最重要的风险,以及需要使用风险控制来提高公司经济活动的效率和盈利能力。相信质量风险管理可以让您使用效率和成本最优的风险控制和信息保护措施,足以满足公司当前的经营目标和宗旨。本文介绍了解决当前寻找评估信息和网络安全风险的最佳方法的问题的结果。提出了选择最佳风险评估方法的准则。对符合这些准则的已知风险评估方法进行分析。已经制定了建议,以创建有希望的风险评估方法,将其应用于现代信息安全管理系统,特别是为关键基础设施设计的系统,将最有效地解决信息和网络安全以及隐私问题。
{"title":"Analysis of methods for assessing and managing cyber risks and information security","authors":"O. Potii, Y. Gorbenko, O. Zamula, K. Isirova","doi":"10.30837/rt.2021.3.206.01","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.01","url":null,"abstract":"Global trends to increase the threats to information and cybersecurity, increasing the level of vulnerability of information and telecommunications systems (ITS) necessitate the development and implementation of new standards and regulations on information security, the introduction of new technologies and best practices in information security. The main approach to information and cybersecurity in ITS is the Risk-Based Protection Strategy. The main task of information risk management (IR) is to identify and assess objectively the most significant risks for the company's business, as well as the need to use risk controls to increase the efficiency and profitability of the company's economic activities. It is believed that quality risk management allows you to use the optimal efficiency and cost of risk control and information protection measures, adequate to the current goals and objectives of the company's business. The paper presents results of solving the current problem of finding optimal methods for assessing the risks of information and cybersecurity. Criteria for selecting the best methods of risk assessment are proposed. The analysis of known methods of risk assessment for compliance with these criteria is performed. Proposals have been formulated to create promising methods for risk assessment, their application to modern information security management systems, especially those designed for critical infrastructure, will most effectively address the problems of information and cybersecurity, as well as privacy.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"103 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88803345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical approaches to the synthesis of discrete signals with necessary properties 具有必要性质的离散信号合成的理论方法
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-09-24 DOI: 10.30837/rt.2021.3.206.02
I. Gorbenko, A. Zamula
Methods for information exchange, formation and processing of data used in information and communication systems (ICS), as well as classes of broadband signals used as a physical data carrier, do not provide the necessary (for individual ICS applications) indicators of cyber and information security, noise immunity of reception signals and secrecy of IKS functioning. Most of the existing systems use signals, the construction of which is based on linear laws, which allows an attacker, based on the establishment of the parameters of the signals used in the system, to carry out deliberate interference in the operation of the ICS with minimal energy consumption. The article presents conceptual approaches to the construction of secure ICS, which determine the need to cover the entire spectrum of information transformations in the complex, and based on the synthesis of signal systems with improved ensemble, correlation, structural properties. A method is proposed for synthesizing discrete derivatives of signals based on nonlinear discrete complex cryptographic signals (CS) and orthogonal signals formed on the basis of the rows of the Hadamard matrix (initial signals),. Based on computer modeling and the performed calculations, it is shown that the derivative signals formed on the basis of cryptographic sequences and rows of the Hadamard matrix have improved properties compared to orthogonal and linear classes of signals. Approaches to the construction are stated and a general characteristic of the hardware-software complex for synthesis, analysis, study of properties, generation, processing of a number of studied signal classes is given. It is shown that the use of such signals will improve such indicators of the system functioning as information security, noise immunity of signal reception and secrecy of functioning.
信息和通信系统(ICS)中使用的信息交换、数据形成和处理方法,以及用作物理数据载体的宽带信号类别,没有提供必要的(对于个别ICS应用)网络和信息安全指标、接收信号的抗噪声性和IKS功能的保密性。现有的大多数系统使用的是基于线性定律的信号,这使得攻击者可以根据系统中使用的信号参数的建立,以最小的能耗对ICS的运行进行故意干扰。本文提出了构建安全ICS的概念方法,确定了需要覆盖复杂信息转换的整个频谱,并基于具有改进的集成,相关性和结构特性的信号系统的合成。提出了一种基于非线性离散复密码信号(CS)和由Hadamard矩阵的行构成的正交信号(初始信号)的信号离散导数合成方法。基于计算机建模和实际计算表明,由密码序列和Hadamard矩阵组成的导数信号比正交和线性信号具有更好的性能。本文阐述了该系统的构建方法,并给出了该系统的一般特点,用于对所研究的信号类进行综合、分析、性质研究、生成和处理。结果表明,该信号的使用将提高系统的信息安全性、信号接收的抗噪声性和功能的保密性等指标。
{"title":"Theoretical approaches to the synthesis of discrete signals with necessary properties","authors":"I. Gorbenko, A. Zamula","doi":"10.30837/rt.2021.3.206.02","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.02","url":null,"abstract":"Methods for information exchange, formation and processing of data used in information and communication systems (ICS), as well as classes of broadband signals used as a physical data carrier, do not provide the necessary (for individual ICS applications) indicators of cyber and information security, noise immunity of reception signals and secrecy of IKS functioning. Most of the existing systems use signals, the construction of which is based on linear laws, which allows an attacker, based on the establishment of the parameters of the signals used in the system, to carry out deliberate interference in the operation of the ICS with minimal energy consumption. The article presents conceptual approaches to the construction of secure ICS, which determine the need to cover the entire spectrum of information transformations in the complex, and based on the synthesis of signal systems with improved ensemble, correlation, structural properties. A method is proposed for synthesizing discrete derivatives of signals based on nonlinear discrete complex cryptographic signals (CS) and orthogonal signals formed on the basis of the rows of the Hadamard matrix (initial signals),. Based on computer modeling and the performed calculations, it is shown that the derivative signals formed on the basis of cryptographic sequences and rows of the Hadamard matrix have improved properties compared to orthogonal and linear classes of signals. Approaches to the construction are stated and a general characteristic of the hardware-software complex for synthesis, analysis, study of properties, generation, processing of a number of studied signal classes is given. It is shown that the use of such signals will improve such indicators of the system functioning as information security, noise immunity of signal reception and secrecy of functioning.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"22 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72654659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measurement of software quality based on international standards 基于国际标准的软件质量度量
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-09-24 DOI: 10.30837/rt.2021.3.206.14
O. Zaporozhets, N. Shtefan
Quality is one of the factors that ensure the commercial success and safety of using the software. Quality is understood as conformity the explicit and implicit requirements of various stakeholders. It is necessary to ensure a joint understanding between developers and users, engineers need to understand the meaning of the concept of quality, characteristics and importance of quality for the developed or maintained software. Measurements are the basis for quality assurance. They are the main tool for managing the life cycle of software products, assessing the implementation of plans and monitoring. To quantify quality, it is necessary to measure the characteristics of the software. Standardization provides unification of requirements for quality, its measurement and assessment. The use of standards has many potential benefits for any organization, especially in key areas such as measuring the quality of software products, information and measurement systems. Recognized international standards organizations have published the ISO/IEC 25000 series of standards for systems and software quality requirements and evaluation (SQuaRE), which is gaining widespread practical application. The paper discusses a series of the SQuaRE international standards, analyzes the relationship between the quality model, quality characteristics, quality measures and a new concept, i.e., a quality measure element of the software, presents the measurement of quality based on these standards.
质量是保证商业成功和安全使用软件的因素之一。质量被理解为各种利益相关者的显性和隐性需求的一致性。确保开发人员和用户之间的共同理解是必要的,工程师需要理解质量概念的含义、特征和质量对开发或维护的软件的重要性。测量是质量保证的基础。它们是管理软件产品生命周期、评估计划实施和监控的主要工具。为了量化质量,有必要度量软件的特性。标准化提供了质量、测量和评价要求的统一。标准的使用对任何组织都有许多潜在的好处,特别是在关键领域,如测量软件产品、信息和测量系统的质量。公认的国际标准组织已经发布了ISO/IEC 25000系列系统和软件质量要求与评价标准(SQuaRE),该标准正在得到广泛的实际应用。本文讨论了一系列的SQuaRE国际标准,分析了质量模型、质量特征、质量度量与软件质量度量元素的关系,提出了基于这些标准的质量度量方法。
{"title":"Measurement of software quality based on international standards","authors":"O. Zaporozhets, N. Shtefan","doi":"10.30837/rt.2021.3.206.14","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.14","url":null,"abstract":"Quality is one of the factors that ensure the commercial success and safety of using the software. Quality is understood as conformity the explicit and implicit requirements of various stakeholders. It is necessary to ensure a joint understanding between developers and users, engineers need to understand the meaning of the concept of quality, characteristics and importance of quality for the developed or maintained software. Measurements are the basis for quality assurance. They are the main tool for managing the life cycle of software products, assessing the implementation of plans and monitoring. To quantify quality, it is necessary to measure the characteristics of the software. Standardization provides unification of requirements for quality, its measurement and assessment. The use of standards has many potential benefits for any organization, especially in key areas such as measuring the quality of software products, information and measurement systems. Recognized international standards organizations have published the ISO/IEC 25000 series of standards for systems and software quality requirements and evaluation (SQuaRE), which is gaining widespread practical application. The paper discusses a series of the SQuaRE international standards, analyzes the relationship between the quality model, quality characteristics, quality measures and a new concept, i.e., a quality measure element of the software, presents the measurement of quality based on these standards.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"76 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90588633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Database protection model based on security system with full overlap 基于全重叠安全系统的数据库保护模型
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-09-24 DOI: 10.30837/rt.2021.3.206.08
V. Vilihura, V. Yesin
Security is one of the most important characteristics of the quality of information systems in general and databases, as their main component, in particular. Therefore, the presence of an information protection system, as a complex of software, technical, cryptographic, organizational and other methods, means and measures that ensure the integrity, confidentiality, authenticity and availability of information in conditions of exposure to natural or artificial threats, is an integral feature of almost any modern information system and database. At the same time, in order to be able to verify the conclusions about the degree of security, it must be measured in some way. The paper considers a database security model based on a full overlap security model (a covered security system), which is traditionally considered the basis for a formal description of security systems. Thanks to expanding the Clements-Hoffman model by including a set of vulnerabilities (as a separately objectively existing category necessary to describe a weakness of an asset or control that can be exploited by one or more threats), which makes it possible to assess more adequately the likelihood of an unwanted incident (threat realization) in a two-factor model (in which one of the factors reflects the motivational component of the threat, and the second takes into account the existing vulnerabilities); a defined integral indicator of database security (as a value inverse to the total residual risk, the constituent components of which are represented in the form of the corresponding linguistic variables); the developed technique for assessing the main components of security barriers and the security of the database as a whole, based on the theory of fuzzy sets and risk, it becomes possible to use the developed model to conduct a quantitative assessment of the security of the analyzed database.
安全性是一般信息系统质量的最重要特征之一,特别是数据库,作为它们的主要组成部分。因此,信息保护系统作为软件、技术、密码、组织和其他方法、手段和措施的综合体,在面临自然或人为威胁的情况下确保信息的完整性、机密性、真实性和可用性,是几乎任何现代信息系统和数据库的一个不可缺少的特征。同时,为了能够验证关于安全程度的结论,必须以某种方式进行测量。本文考虑了一种基于全重叠安全模型(覆盖安全系统)的数据库安全模型,该模型通常被认为是安全系统形式化描述的基础。由于扩展了克莱门茨-霍夫曼模型,包括一组漏洞(作为一个单独客观存在的类别,必须描述一个资产或控制的弱点,可以被一个或多个威胁利用),这使得有可能在双因素模型中更充分地评估意外事件(威胁实现)的可能性(其中一个因素反映了威胁的动机成分)。第二种考虑了现有的漏洞);数据库安全的一个定义的积分指标(作为与总剩余风险相反的值,其组成部分以相应的语言变量的形式表示);基于模糊集理论和风险理论,开发了对安全屏障主要组成部分和数据库整体安全性进行评估的技术,使利用所开发的模型对所分析数据库的安全性进行定量评估成为可能。
{"title":"Database protection model based on security system with full overlap","authors":"V. Vilihura, V. Yesin","doi":"10.30837/rt.2021.3.206.08","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.08","url":null,"abstract":"Security is one of the most important characteristics of the quality of information systems in general and databases, as their main component, in particular. Therefore, the presence of an information protection system, as a complex of software, technical, cryptographic, organizational and other methods, means and measures that ensure the integrity, confidentiality, authenticity and availability of information in conditions of exposure to natural or artificial threats, is an integral feature of almost any modern information system and database. At the same time, in order to be able to verify the conclusions about the degree of security, it must be measured in some way. The paper considers a database security model based on a full overlap security model (a covered security system), which is traditionally considered the basis for a formal description of security systems. Thanks to expanding the Clements-Hoffman model by including a set of vulnerabilities (as a separately objectively existing category necessary to describe a weakness of an asset or control that can be exploited by one or more threats), which makes it possible to assess more adequately the likelihood of an unwanted incident (threat realization) in a two-factor model (in which one of the factors reflects the motivational component of the threat, and the second takes into account the existing vulnerabilities); a defined integral indicator of database security (as a value inverse to the total residual risk, the constituent components of which are represented in the form of the corresponding linguistic variables); the developed technique for assessing the main components of security barriers and the security of the database as a whole, based on the theory of fuzzy sets and risk, it becomes possible to use the developed model to conduct a quantitative assessment of the security of the analyzed database.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89462535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified algorithms for signal nonlinear trend detection 改进的信号非线性趋势检测算法
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-09-24 DOI: 10.30837/rt.2021.3.206.13
N. Tulyakova, O. Trofymchuk
There is a problem of nonlinear (abrupt) signal trend detection in many digital signals processing practical applications. In particular, in the field of biomedical signals processing, the actual task is the elimination of abrupt signal baseline distortions caused by the patient's movements. For processing such signals containing edges and other discontinues, linear filtering based on discrete Fourier or cosine transforms leads to significant smoothing of a signal. Median type algorithms related to nonlinear stable (robust) filters are successfully applied for filtering such signals, in particular, high efficiency is provided by median hybrid filters with finite impulse response (FIR). The article considers simple algorithms of the class of FIR-median hybrid filters used for signal nonlinear trend detection. It is proposed to modify these algorithms by replacing the operation of finding the median of the data in the sliding filter window with the calculation of their myriad, as well as adding weights (number of duplications) to certain window elements. Statistical estimates of filter efficiency according to the mean square error (MSE) criterion for test signals like “step” and “ramp” edges, and triangular peak and parabola have been obtained. The high efficiency of the investigated nonlinear filters for the listed test signals types and the improvements achieved as a result of the proposed filter modifications are shown based on the analysis of the filter output signals and statistical estimates of their quality. Some examples of processing biomedical signals of electroencephalograms which illustrate good quality of noise suppression and signal abrupt changes preservation, and motion artifacts removal without large signal distortions are given.
在许多数字信号处理的实际应用中都存在非线性(突变)信号趋势检测问题。特别是在生物医学信号处理领域,实际任务是消除因患者运动引起的信号基线突变畸变。为了处理包含边缘和其他间断的信号,基于离散傅里叶变换或余弦变换的线性滤波可以使信号明显平滑。与非线性稳定(鲁棒)滤波器相关的中值型算法已成功地应用于此类信号的滤波,特别是具有有限脉冲响应(FIR)的中值混合滤波器具有很高的效率。本文研究一类用于信号非线性趋势检测的fir -中值混合滤波器的简单算法。本文提出对这些算法进行改进,将滑动滤波窗口中数据的求中值的操作替换为计算滑动滤波窗口中数据的无数次,并对某些窗口元素增加权重(重复次数)。根据均方误差(MSE)准则对“阶梯”边、“斜坡”边、三角峰和抛物线等测试信号进行了滤波效率的统计估计。基于对滤波器输出信号的分析和对其质量的统计估计,所研究的非线性滤波器对所列出的测试信号类型的高效率以及所提出的滤波器修改所取得的改进。给出了一些处理生物医学脑电图信号的实例,表明在不产生大的信号畸变的情况下,能很好地抑制噪声和保持信号突变,去除运动伪影。
{"title":"Modified algorithms for signal nonlinear trend detection","authors":"N. Tulyakova, O. Trofymchuk","doi":"10.30837/rt.2021.3.206.13","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.13","url":null,"abstract":"There is a problem of nonlinear (abrupt) signal trend detection in many digital signals processing practical applications. In particular, in the field of biomedical signals processing, the actual task is the elimination of abrupt signal baseline distortions caused by the patient's movements. For processing such signals containing edges and other discontinues, linear filtering based on discrete Fourier or cosine transforms leads to significant smoothing of a signal. Median type algorithms related to nonlinear stable (robust) filters are successfully applied for filtering such signals, in particular, high efficiency is provided by median hybrid filters with finite impulse response (FIR). The article considers simple algorithms of the class of FIR-median hybrid filters used for signal nonlinear trend detection. It is proposed to modify these algorithms by replacing the operation of finding the median of the data in the sliding filter window with the calculation of their myriad, as well as adding weights (number of duplications) to certain window elements. Statistical estimates of filter efficiency according to the mean square error (MSE) criterion for test signals like “step” and “ramp” edges, and triangular peak and parabola have been obtained. The high efficiency of the investigated nonlinear filters for the listed test signals types and the improvements achieved as a result of the proposed filter modifications are shown based on the analysis of the filter output signals and statistical estimates of their quality. Some examples of processing biomedical signals of electroencephalograms which illustrate good quality of noise suppression and signal abrupt changes preservation, and motion artifacts removal without large signal distortions are given.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"44 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88287214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statement of the problem of assessing instability of passive quantum frequency standards in the presence of an error from the interaction 在相互作用产生误差的情况下评估无源量子频率标准的不稳定性问题
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-09-24 DOI: 10.30837/rt.2021.3.206.03
O. Nariezhnii, T. Grinenko, I. Gorbenko
Construction of modern measuring complexes of the coordinate-time support system of Ukraine is impossible without improving mathematical models of quantum standards of frequency (QSF) used in group standards. This work is devoted to the analysis of methods for the stable solution of direct and inverse problems (methods for solving ill-posed problems) in models of the interaction of passive QSF in the process of their comparisons. The priority task is to use these methods for the numerical solution of problems in the design of group QSF and parallel quantum generators of random numbers. Methods for solving such problems are in demand, since they make it possible to create mathematical models of group QSF interaction. These models will enable the design of efficient parallel quantum random number generation devices for high-tech areas of cybersecurity. Varieties of methods such as the method of least squares or the method of the Moore-Penrose pseudo-inverse matrix are used, as a rule when evaluating the metrological parameters of QSF.Robust methods of regularization or filtering, for example, the Kalman or Wiener filter method, are used in the algorithms of group standards, due to the instability of the solution.However, these methods do not work in the presence of an error from the interaction of QSF in the process of their functioning in a group standard or in comparisons. The aim of this work is to analyze and substantiate the formulation of the problem of assessing the potential accuracy characteristics of passive QSF in the presence of an error from the interaction. Regularization parameters when determining the state vector of the group standard are found using signals transmitted by global navigation satellite systems such as GPSGLONASS in the local differential correction mode.
如果不改进群体标准中使用的量子频率标准(QSF)的数学模型,就不可能构建乌克兰坐标-时间支持系统的现代测量综合体。本文研究了被动量子结构相互作用模型在比较过程中的正问题和逆问题(求解病态问题的方法)的稳定解方法。将这些方法应用于群量子量子结构和随机数并行量子发生器设计问题的数值求解是当前的首要任务。解决这类问题的方法是需要的,因为它们使创建群体QSF相互作用的数学模型成为可能。这些模型将为网络安全的高科技领域设计高效的并行量子随机数生成设备。在评价QSF的计量参数时,通常采用最小二乘法或Moore-Penrose伪逆矩阵法等多种方法。鲁棒的正则化或滤波方法,例如卡尔曼或维纳滤波方法,由于解的不稳定性,在群体标准算法中使用。然而,这些方法在QSF在群体标准或比较中发挥作用的过程中存在相互作用的错误时不起作用。这项工作的目的是分析和证实在相互作用产生误差的情况下评估被动QSF潜在精度特征的问题的表述。利用GPSGLONASS等全球导航卫星系统在局部差分校正模式下传输的信号,找到确定组标准状态向量时的正则化参数。
{"title":"Statement of the problem of assessing instability of passive quantum frequency standards in the presence of an error from the interaction","authors":"O. Nariezhnii, T. Grinenko, I. Gorbenko","doi":"10.30837/rt.2021.3.206.03","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.03","url":null,"abstract":"Construction of modern measuring complexes of the coordinate-time support system of Ukraine is impossible without improving mathematical models of quantum standards of frequency (QSF) used in group standards. This work is devoted to the analysis of methods for the stable solution of direct and inverse problems (methods for solving ill-posed problems) in models of the interaction of passive QSF in the process of their comparisons. The priority task is to use these methods for the numerical solution of problems in the design of group QSF and parallel quantum generators of random numbers. Methods for solving such problems are in demand, since they make it possible to create mathematical models of group QSF interaction. These models will enable the design of efficient parallel quantum random number generation devices for high-tech areas of cybersecurity. \u0000Varieties of methods such as the method of least squares or the method of the Moore-Penrose pseudo-inverse matrix are used, as a rule when evaluating the metrological parameters of QSF.Robust methods of regularization or filtering, for example, the Kalman or Wiener filter method, are used in the algorithms of group standards, due to the instability of the solution.However, these methods do not work in the presence of an error from the interaction of QSF in the process of their functioning in a group standard or in comparisons. \u0000The aim of this work is to analyze and substantiate the formulation of the problem of assessing the potential accuracy characteristics of passive QSF in the presence of an error from the interaction. Regularization parameters when determining the state vector of the group standard are found using signals transmitted by global navigation satellite systems such as GPSGLONASS in the local differential correction mode.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"67 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85731205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method for increasing noise immunity of radar "friend or foe" identification systems under the action of intentional correlated interference 在有意相关干扰作用下提高雷达敌我识别系统抗扰度的方法
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-07-02 DOI: 10.30837/rt.2021.2.205.16
I. Svyd, I. Obod, O. Maltsev, M. Tkach, S.V. Starokozhev, A.O. Hlushchenko, V.S. Chumak
The paper analyzes the principles of construction and structure of "friend or foe" identification systems. It is revealed, that the party, interested in the existing system, has the ability of unauthorized use of this information resource for long-range determination of air objects coordinates, on the one hand, and distortion of information of this information resource, on the other hand, which leads to unpredictable consequences. It is shown, that the most vulnerable place in the "friend or foe" identification systems is the aircraft transponder, which significantly affects noise stability and noise immunity of the identification systems of air objects. The paper proposes a method of hereditary transition to noise-immune "friend or foe" identification systems based on synchronous networks of identification systems, which allows expanding significantly the methods of servicing requests and methods of constructing systems. This method of constructing identification systems eliminates the existing problem of dispersed identification systems, as well as the problem of temporal matching of signals coming from primary and secondary radar systems. The proposed method of hereditary transition to noise-immune "friend or foe" identification systems makes it possible to exclude the possibility of unauthorized access to identification information resources by an interested party, significantly increases the noise immunity of the identification system as a whole.
本文分析了敌我识别系统的构建原理和结构。据披露,对现有系统感兴趣的一方,一方面具有擅自使用该信息资源进行远程确定空中目标坐标的能力,另一方面,该信息资源的信息被扭曲,从而导致不可预测的后果。研究表明,敌我识别系统中最脆弱的地方是飞机应答器,它对空中物体识别系统的噪声稳定性和抗噪性有重要影响。提出了一种基于识别系统同步网络的抗噪声“敌我”识别系统的遗传过渡方法,从而大大扩展了服务请求方法和系统构造方法。这种识别系统的构建方法解决了现有的识别系统分散的问题,以及一次雷达和二次雷达信号的时序匹配问题。提出的遗传过渡到噪声免疫“敌我”识别系统的方法,可以排除利益相关方未经授权访问识别信息资源的可能性,显著提高识别系统整体的抗噪声能力。
{"title":"Method for increasing noise immunity of radar \"friend or foe\" identification systems under the action of intentional correlated interference","authors":"I. Svyd, I. Obod, O. Maltsev, M. Tkach, S.V. Starokozhev, A.O. Hlushchenko, V.S. Chumak","doi":"10.30837/rt.2021.2.205.16","DOIUrl":"https://doi.org/10.30837/rt.2021.2.205.16","url":null,"abstract":"The paper analyzes the principles of construction and structure of \"friend or foe\" identification systems. It is revealed, that the party, interested in the existing system, has the ability of unauthorized use of this information resource for long-range determination of air objects coordinates, on the one hand, and distortion of information of this information resource, on the other hand, which leads to unpredictable consequences. It is shown, that the most vulnerable place in the \"friend or foe\" identification systems is the aircraft transponder, which significantly affects noise stability and noise immunity of the identification systems of air objects. The paper proposes a method of hereditary transition to noise-immune \"friend or foe\" identification systems based on synchronous networks of identification systems, which allows expanding significantly the methods of servicing requests and methods of constructing systems. This method of constructing identification systems eliminates the existing problem of dispersed identification systems, as well as the problem of temporal matching of signals coming from primary and secondary radar systems. The proposed method of hereditary transition to noise-immune \"friend or foe\" identification systems makes it possible to exclude the possibility of unauthorized access to identification information resources by an interested party, significantly increases the noise immunity of the identification system as a whole.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"16 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90896916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1