首页 > 最新文献

Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia最新文献

英文 中文
Classification and analysis of vulnerabilities of modern information systems from classical and quantum attacks 现代信息系统在经典攻击和量子攻击中的漏洞分类与分析
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.01
Ye. V. Ostrianska, S.O. Kandiy, I. Gorbenko, M. Yesina
Recent advances in quantum technology and the potential that practical quantum computers may become a reality in the future have led to renewed interest in developing cryptographic technologies that are secure against conventional and quantum attacks. Currently, virtually all asymmetric cryptographic schemes in use are threatened by the potential development of powerful quantum computers. Post-quantum cryptography is one of main the ways to combat this threat. Its security is based on the complexity of mathematical problems that are currently considered unsolvable efficiently, even with the help of quantum computers. The security of information systems is ensured through protection against various threats that use system vulnerabilities. Security protocols are the building blocks of secure communication. They implement security mechanisms to provide security services. Security protocols are considered abstract when analyzed, but may have additional vulnerabilities in implementation. This work contains a holistic study of security protocols. Basics of security protocols, taxonomy of attacks on security protocols and their implementation are considered, as well as various methods and models of protocol security analysis. In particular, the differences between information-theoretic and computational security, computational and symbolic models are specified. In addition, an overview of the computational security models for Authenticated Key Exchange (AKE) and Password Authentication Key Exchange (PAKE) protocols is provided. The most important security models for the AKE and PAKE protocols were also described. With the emergence of new technologies that may have different security requirements, as well as with increased opportunities for competition, there is always a need to develop new protocols. Thus, the purpose of this article is to review, classify, analyze, and research the vulnerabilities of information systems from classical, quantum, and special attacks, performed taking into account the forecast regarding the possibilities of attacks on post-quantum cryptographic transformations; studying security assessment models for existing cryptographic protocols, as well as reviewing and benchmarking security models and providing suggestions for protection against existing potential attacks.
量子技术的最新进展以及实用量子计算机在未来可能成为现实的潜力,使人们对开发能够抵御传统和量子攻击的加密技术重新产生了兴趣。目前,几乎所有正在使用的非对称加密方案都受到强大量子计算机潜在发展的威胁。后量子密码学是对抗这种威胁的主要方法之一。它的安全性基于数学问题的复杂性,这些问题目前被认为是无法有效解决的,即使有量子计算机的帮助。通过防范利用系统漏洞的各种威胁,确保信息系统的安全。安全协议是安全通信的基石。它们实现安全机制以提供安全服务。安全协议在分析时被认为是抽象的,但在实现时可能有额外的漏洞。这项工作包含了对安全协议的全面研究。介绍了安全协议的基础知识,安全协议攻击的分类及其实现,以及协议安全分析的各种方法和模型。特别指出了信息理论和计算安全、计算模型和符号模型之间的区别。此外,还概述了认证密钥交换(AKE)和密码认证密钥交换(PAKE)协议的计算安全模型。对AKE和PAKE协议最重要的安全模型也进行了描述。随着可能具有不同安全需求的新技术的出现,以及竞争机会的增加,总是需要开发新的协议。因此,本文的目的是回顾、分类、分析和研究信息系统在经典攻击、量子攻击和特殊攻击中的漏洞,并考虑到对后量子密码转换攻击可能性的预测;研究现有加密协议的安全评估模型,审查和对安全模型进行基准测试,并提供针对现有潜在攻击的保护建议。
{"title":"Classification and analysis of vulnerabilities of modern information systems from classical and quantum attacks","authors":"Ye. V. Ostrianska, S.O. Kandiy, I. Gorbenko, M. Yesina","doi":"10.30837/rt.2022.4.211.01","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.01","url":null,"abstract":"Recent advances in quantum technology and the potential that practical quantum computers may become a reality in the future have led to renewed interest in developing cryptographic technologies that are secure against conventional and quantum attacks. Currently, virtually all asymmetric cryptographic schemes in use are threatened by the potential development of powerful quantum computers. Post-quantum cryptography is one of main the ways to combat this threat. Its security is based on the complexity of mathematical problems that are currently considered unsolvable efficiently, even with the help of quantum computers. The security of information systems is ensured through protection against various threats that use system vulnerabilities. Security protocols are the building blocks of secure communication. They implement security mechanisms to provide security services. Security protocols are considered abstract when analyzed, but may have additional vulnerabilities in implementation. This work contains a holistic study of security protocols. Basics of security protocols, taxonomy of attacks on security protocols and their implementation are considered, as well as various methods and models of protocol security analysis. In particular, the differences between information-theoretic and computational security, computational and symbolic models are specified. In addition, an overview of the computational security models for Authenticated Key Exchange (AKE) and Password Authentication Key Exchange (PAKE) protocols is provided. The most important security models for the AKE and PAKE protocols were also described. With the emergence of new technologies that may have different security requirements, as well as with increased opportunities for competition, there is always a need to develop new protocols. Thus, the purpose of this article is to review, classify, analyze, and research the vulnerabilities of information systems from classical, quantum, and special attacks, performed taking into account the forecast regarding the possibilities of attacks on post-quantum cryptographic transformations; studying security assessment models for existing cryptographic protocols, as well as reviewing and benchmarking security models and providing suggestions for protection against existing potential attacks.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"13 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81483611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of interference protection of "Friend-Foe" radar identification systems 敌我雷达识别系统干扰防护比较分析
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.08
I. Svyd, M. Tkach, I. Obod
The paper examines the existing systems of radar identification based on the "friend-foe" feature from the point of view of immunity evaluation. Currently, there are two systems of the radar identification based on the characteristic of "friend-foe", namely, the "Password" and MkXIIA. They are the radar identification systems based on the "home-foreign" feature. The former of the specified systems operates in a frequency range that differs from the frequency range of secondary radar systems, while the second one operates in the frequency range of secondary radar. These systems are ones of the main information resources of the airspace control system and are built on the principles of a one-channel or two-channel information transmission system. It allows the interested party, both an unauthorized use of this information resource for remote determination of the coordinates of aerial objects, on the one hand, and twisting the information of these information resources, on the other hand, which leads to unpredictable results. The purpose of the work is to assess the immunity of existing radar identification systems based on the "friend-foe" feature. The analysis of the interference protection of existing systems for the object radar identification based on the "friend-foe" feature, built on the principles of interrogative and non-interrogative information systems presented in this work, showed that the use of rectangular radio signals with time-pulse modulation as request and response signals emitting by air objects, has low immunity and excludes the energy stealthiest of the respondents of aerial objects. And, as a result, it allows for unauthorized calculation of the coordinates of air objects by the interested party based on the emitted identification signals on the basis of "friend-foe".
从抗扰度评价的角度,对现有基于敌我特征的雷达识别系统进行了研究。目前,基于“敌我”特性的雷达识别有两种系统,即“Password”和MkXIIA。它们是基于“内外”特征的雷达识别系统。指定系统的前者工作在与二次雷达系统的频率范围不同的频率范围内,后者工作在二次雷达的频率范围内。这些系统是空域管制系统的主要信息资源之一,其原理是单通道或双通道信息传输系统。它一方面允许利益方未经授权使用这些信息资源远程确定空中物体的坐标,另一方面也允许扭曲这些信息资源的信息,从而导致不可预测的结果。这项工作的目的是评估基于“敌我”特征的现有雷达识别系统的抗扰度。本文在提出的询问和非询问信息系统原理的基础上,对基于敌我特征的现有目标雷达识别系统的干扰防护进行了分析,结果表明,使用时间脉冲调制的矩形无线电信号作为空中目标发出的请求和响应信号,抗干扰性低,排除了空中目标应答者的能量隐身性。因此,它允许利益方根据发射的“敌我”识别信号未经授权计算空中物体的坐标。
{"title":"Comparative analysis of interference protection of \"Friend-Foe\" radar identification systems","authors":"I. Svyd, M. Tkach, I. Obod","doi":"10.30837/rt.2022.4.211.08","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.08","url":null,"abstract":"The paper examines the existing systems of radar identification based on the \"friend-foe\" feature from the point of view of immunity evaluation. Currently, there are two systems of the radar identification based on the characteristic of \"friend-foe\", namely, the \"Password\" and MkXIIA. They are the radar identification systems based on the \"home-foreign\" feature. The former of the specified systems operates in a frequency range that differs from the frequency range of secondary radar systems, while the second one operates in the frequency range of secondary radar. These systems are ones of the main information resources of the airspace control system and are built on the principles of a one-channel or two-channel information transmission system. It allows the interested party, both an unauthorized use of this information resource for remote determination of the coordinates of aerial objects, on the one hand, and twisting the information of these information resources, on the other hand, which leads to unpredictable results. The purpose of the work is to assess the immunity of existing radar identification systems based on the \"friend-foe\" feature. The analysis of the interference protection of existing systems for the object radar identification based on the \"friend-foe\" feature, built on the principles of interrogative and non-interrogative information systems presented in this work, showed that the use of rectangular radio signals with time-pulse modulation as request and response signals emitting by air objects, has low immunity and excludes the energy stealthiest of the respondents of aerial objects. And, as a result, it allows for unauthorized calculation of the coordinates of air objects by the interested party based on the emitted identification signals on the basis of \"friend-foe\".","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89932662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structural modeling and calculation of thermal conductivity of polyimide composite materials 聚酰亚胺复合材料的结构建模与导热系数计算
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.10
V. Borshchov, O. Listratenko, M. Protsenko, I. Tymchuk, O. Kravchenko, O.V. Suddia, I.V. Borshchov, M. Slipchenko
Issues of direct modeling effective thermal conductivity of two-component thermally conductive polyimide composite films based on polyimide thermosetting varnishes and thermally conductive powder fillers are considered. 3D-structural modeling of elementary cubic cells of polyimide composites has been performed. Calculations of average heat fluxes and effective thermal conductivity of variants of polyimide composite films with the introduction of highly thermally conductive highly dispersed and ultradispersed powder fillers into the polyimide matrix were carried out, including those from SiO2, SiC, Al2O3, AlN, taking into account boundary and initial conditions using COMSOL MULTIPHYSICS software. Specific recommendations are proposed for direct modeling of the thermal conductivity of environments with a complex structure and for carrying out with sufficient reliability numerical calculations of the effective thermal conductivity of polyimide composite films in order to increase their thermal conductivity from 0,12 W/(m•K) up to 1-4 W/(m•K) by changing concentration and thermal conductivity of mixtures of filler particles of micron and ultramicron sizes.
研究了基于聚酰亚胺热固性清漆和导热粉末填料的双组分导热聚酰亚胺复合薄膜的有效导热系数的直接建模问题。对聚酰亚胺复合材料的初等立方胞进行了三维结构建模。采用COMSOL MULTIPHYSICS软件,考虑边界条件和初始条件,计算了在聚酰亚胺基体中加入高导热、高分散和超分散粉末填料(SiO2、SiC、Al2O3、AlN)后,不同类型聚酰亚胺复合薄膜的平均热流密度和有效导热系数。对于复杂结构环境的热导率的直接建模,以及对聚酰亚胺复合薄膜的有效热导率进行足够可靠的数值计算,提出了具体建议,以便通过改变微米和超微尺寸填充颗粒混合物的浓度和热导率,将其热导率从0,12 W/(m•K)提高到1-4 W/(m•K)。
{"title":"Structural modeling and calculation of thermal conductivity of polyimide composite materials","authors":"V. Borshchov, O. Listratenko, M. Protsenko, I. Tymchuk, O. Kravchenko, O.V. Suddia, I.V. Borshchov, M. Slipchenko","doi":"10.30837/rt.2022.4.211.10","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.10","url":null,"abstract":"Issues of direct modeling effective thermal conductivity of two-component thermally conductive polyimide composite films based on polyimide thermosetting varnishes and thermally conductive powder fillers are considered. \u00003D-structural modeling of elementary cubic cells of polyimide composites has been performed. \u0000Calculations of average heat fluxes and effective thermal conductivity of variants of polyimide composite films with the introduction of highly thermally conductive highly dispersed and ultradispersed powder fillers into the polyimide matrix were carried out, including those from SiO2, SiC, Al2O3, AlN, taking into account boundary and initial conditions using COMSOL MULTIPHYSICS software. \u0000Specific recommendations are proposed for direct modeling of the thermal conductivity of environments with a complex structure and for carrying out with sufficient reliability numerical calculations of the effective thermal conductivity of polyimide composite films in order to increase their thermal conductivity from 0,12 W/(m•K) up to 1-4 W/(m•K) by changing concentration and thermal conductivity of mixtures of filler particles of micron and ultramicron sizes.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"44 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74142221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Features of the tasks of identifying and observing groups of unmanned letter vehicles 无人信车群识别与观测任务特征
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.06
V. Kartashov, V.A. Pososhenko, A. Kapusta, M. Rybnykov, E.V. Pershin
The current trend towards increasing the efficiency of UAV use is the transition from their single use to group use. In accordance with this, when building a complex integrated system for detecting and monitoring UAVs, including various information channels, it is advisable to take into account the features of the system functioning associated with the detection of groups of UAVs. The article discusses the information, energy and search capabilities of individual detection tools being a part of the integrated UAV surveillance system in order to build an effective algorithm for joint processing of incoming input signals, taking into account various capabilities of individual channels (in terms of range, recognition, etc.). An optimal algorithm for detecting groups of UAVs in a complex integrated system combining detection decisions made in private channels is synthesized. According to the synthesized algorithm, complex processing consists in summing up the solutions of individual detectors with some weights determined by the quality of the decisions made in the channels. The quality of solutions, in turn, depends on the technical means used in the channels and the conditions of observation. A sequence for solving a set of interrelated tasks in a complex integrated UAV surveillance system as the group target approaches the protected object is proposed. The sequence includes the following operations: identification of a group target (energy detection); estimation of coordinates of a group of objects; spatial resolution and determination of the number of vehicles in a group; recognition (type determination) of each individual device; assessment of the coordinates of each aircraft separately; determination of the composition of the group (homogeneous, heterogeneous); determination of the specialization of the group and revealing the nature of its tasks.
当前提高无人机使用效率的趋势是由单一使用向成组使用转变。因此,在构建包含多种信息通道的复杂的无人机检测与监控综合系统时,应考虑到与无人机群检测相关的系统功能特点。本文讨论了作为无人机综合监视系统一部分的单个检测工具的信息、能量和搜索能力,以便在考虑单个通道的各种能力(在距离、识别等方面)的情况下,建立一个有效的算法来联合处理输入信号。综合了一种结合专用信道检测决策的复杂集成系统中无人机群检测的优化算法。根据综合算法,复杂处理包括将单个检测器的解与通道中决策质量决定的一些权重相加。解决方案的质量反过来又取决于通道中使用的技术手段和观察条件。提出了一种复杂集成无人机监视系统中,当群目标接近保护对象时,求解一组相互关联任务的序列。所述序列包括以下操作:识别一组目标(能量检测);一组目标的坐标估计;空间分辨率和一组车辆数量的确定;单个设备的识别(类型确定);分别评估每架飞机的坐标;组份组成的确定(同质、异质);确定小组的专业化并揭示其任务的性质。
{"title":"Features of the tasks of identifying and observing groups of unmanned letter vehicles","authors":"V. Kartashov, V.A. Pososhenko, A. Kapusta, M. Rybnykov, E.V. Pershin","doi":"10.30837/rt.2022.4.211.06","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.06","url":null,"abstract":"The current trend towards increasing the efficiency of UAV use is the transition from their single use to group use. In accordance with this, when building a complex integrated system for detecting and monitoring UAVs, including various information channels, it is advisable to take into account the features of the system functioning associated with the detection of groups of UAVs. \u0000The article discusses the information, energy and search capabilities of individual detection tools being a part of the integrated UAV surveillance system in order to build an effective algorithm for joint processing of incoming input signals, taking into account various capabilities of individual channels (in terms of range, recognition, etc.). \u0000An optimal algorithm for detecting groups of UAVs in a complex integrated system combining detection decisions made in private channels is synthesized. According to the synthesized algorithm, complex processing consists in summing up the solutions of individual detectors with some weights determined by the quality of the decisions made in the channels. The quality of solutions, in turn, depends on the technical means used in the channels and the conditions of observation. \u0000A sequence for solving a set of interrelated tasks in a complex integrated UAV surveillance system as the group target approaches the protected object is proposed. The sequence includes the following operations: identification of a group target (energy detection); estimation of coordinates of a group of objects; spatial resolution and determination of the number of vehicles in a group; recognition (type determination) of each individual device; assessment of the coordinates of each aircraft separately; determination of the composition of the group (homogeneous, heterogeneous); determination of the specialization of the group and revealing the nature of its tasks.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"134 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77378233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of DSTU 8961:2019 in random oracle model DSTU 8961:2019在随机oracle模型中的分析
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.02
S.O. Kandiy
The paper provides a proof in the IND-CCA2 random oracle model of the security of the asymmetric encryption scheme described in the DSTU 8961:2019 standard, and the IND-CCA2 security of the corresponding key encapsulation mechanism. Since the standard contains only a technical description of transformations, a formalized mathematical model was introduced in Chapter 4 without unnecessary technical details that do not affect safety assessments. Since the system-wide parameters in the standard were chosen in such a way that the scheme did not contain decryption errors, it was possible to simplify significantly the proof. Section 5 provides a schematic overview of possible attack vectors on the DSTU 8961:2019, but a detailed analysis is the subject of further research. In addition to safety, the analysis also showed that the DSTU 8961:2019 has a certain disadvantage in terms of safety. The design can be significantly simplified and accelerated without loss of safety. Security, on the contrary, can be significantly increased.
本文在IND-CCA2随机oracle模型中证明了DSTU 8961:2019标准中描述的非对称加密方案的安全性,以及相应密钥封装机制的IND-CCA2安全性。由于该标准仅包含转换的技术描述,因此在第4章中引入了一个形式化的数学模型,没有不必要的技术细节,不会影响安全评估。由于标准中的系统范围参数的选择方式使该方案不包含解密错误,因此有可能大大简化证明。第5节提供了DSTU 8961:2019上可能的攻击向量的示意图概述,但详细分析是进一步研究的主题。除了安全性之外,分析还表明,DSTU 8961:2019在安全性方面存在一定的劣势。设计可以大大简化和加速,而不会失去安全性。相反,安全性可以显著提高。
{"title":"Analysis of DSTU 8961:2019 in random oracle model","authors":"S.O. Kandiy","doi":"10.30837/rt.2022.4.211.02","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.02","url":null,"abstract":"The paper provides a proof in the IND-CCA2 random oracle model of the security of the asymmetric encryption scheme described in the DSTU 8961:2019 standard, and the IND-CCA2 security of the corresponding key encapsulation mechanism. Since the standard contains only a technical description of transformations, a formalized mathematical model was introduced in Chapter 4 without unnecessary technical details that do not affect safety assessments. Since the system-wide parameters in the standard were chosen in such a way that the scheme did not contain decryption errors, it was possible to simplify significantly the proof. Section 5 provides a schematic overview of possible attack vectors on the DSTU 8961:2019, but a detailed analysis is the subject of further research. In addition to safety, the analysis also showed that the DSTU 8961:2019 has a certain disadvantage in terms of safety. The design can be significantly simplified and accelerated without loss of safety. Security, on the contrary, can be significantly increased.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"122 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78442239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical investigation of injection-locked differential oscillator 注入锁紧差分振荡器的理论研究
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.11
V. Rapin
A preliminary analysis of published works on this topic showed that at present there is no sufficiently substantiated theory of such devices, and the approximate approaches used are rough and do not always meet the requirements of practice. The proposed transition from a differential self-oscillator to an equivalent single-circuit oscillator has not received a convincing justification. This article presents a methodology for studying a synchronized differential oscillator using rigorous methods. A mathematical model of such oscillator is presented in the form of nonlinear differential equations obtained on the basis of Kirchhoff's laws. Their analysis made it possible to substantiate the transition to the model of a single circuit LC oscillator, equivalent to a differential one. A technique for such a transition is proposed, including the procedure for determining the nonlinear characteristics of the amplifying element of this self-oscillator, based on the nonlinear characteristics of two amplifying elements of the differential oscillator. The mathematical model of an equivalent oscillator is represented by a non-linear differential Van der Pol equation in a dimensionless form, it is simple and accurate. This form of representation made it possible to single out a small parameter and estimate its value. In the case of small values of the small parameter, as is known, traditional methods can be used for its analysis. Thus, the task of studying the synchronization process of a differential oscillator is reduced to the study of the synchronization process of a Van der Pol oscillator. The presented results can be useful in the development of various devices based on synchronized differential oscillators.
通过对已发表的有关这一主题的著作的初步分析表明,目前还没有充分证实这类装置的理论,而且所使用的近似方法是粗糙的,并不总是符合实践的要求。提出的从微分自振荡器到等效单电路振荡器的过渡尚未得到令人信服的理由。本文提出了一种用严谨的方法研究同步差动振荡器的方法。在基尔霍夫定律的基础上,用非线性微分方程的形式建立了该振子的数学模型。他们的分析证实了向单电路LC振荡器模型的过渡,相当于差分振荡器。提出了一种过渡技术,包括基于差分振荡器两个放大元件的非线性特性确定该自振荡器放大元件非线性特性的方法。等效振荡器的数学模型用非线性无量纲微分范德波方程表示,简单准确。这种表示形式使得挑选出一个小参数并估计其值成为可能。众所周知,在小参数值较小的情况下,可以使用传统方法对其进行分析。这样,研究差分振荡器的同步过程的任务就简化为研究范德波尔振荡器的同步过程。所提出的结果可用于开发各种基于同步差分振荡器的器件。
{"title":"Theoretical investigation of injection-locked differential oscillator","authors":"V. Rapin","doi":"10.30837/rt.2022.4.211.11","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.11","url":null,"abstract":"A preliminary analysis of published works on this topic showed that at present there is no sufficiently substantiated theory of such devices, and the approximate approaches used are rough and do not always meet the requirements of practice. The proposed transition from a differential self-oscillator to an equivalent single-circuit oscillator has not received a convincing justification. \u0000This article presents a methodology for studying a synchronized differential oscillator using rigorous methods. A mathematical model of such oscillator is presented in the form of nonlinear differential equations obtained on the basis of Kirchhoff's laws. Their analysis made it possible to substantiate the transition to the model of a single circuit LC oscillator, equivalent to a differential one. A technique for such a transition is proposed, including the procedure for determining the nonlinear characteristics of the amplifying element of this self-oscillator, based on the nonlinear characteristics of two amplifying elements of the differential oscillator. \u0000The mathematical model of an equivalent oscillator is represented by a non-linear differential Van der Pol equation in a dimensionless form, it is simple and accurate. This form of representation made it possible to single out a small parameter and estimate its value. In the case of small values of the small parameter, as is known, traditional methods can be used for its analysis. Thus, the task of studying the synchronization process of a differential oscillator is reduced to the study of the synchronization process of a Van der Pol oscillator. The presented results can be useful in the development of various devices based on synchronized differential oscillators.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"11 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82901677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The main categories of NewSQL databases and their features 介绍了NewSQL数据库的主要类别及其特性
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.03
V. Yesin, V. Vilihura
In the modern world, the problem of working with big data and workloads is becoming more and more acute. For more than forty years, relational databases have been the main leading systems for storing, searching and managing data. However, despite their great popularity, application experience and universality, traditional relational DBMS, due to the growing needs for scalability and performance, often cannot meet modern requirements. This has led to the emergence of new alternative data management systems, including NewSQL systems. NewSQL is a class of modern relational database management systems that provide performance comparable to NoSQL systems while maintaining the data consistency guarantees inherent in traditional database systems. The growing interest in NewSQL technology in recent times has led to an increase number of evaluations and comparisons among competing NewSQL technologies. However, today there is still a certain lack of work devoted to the study of the features of NewSQL solutions and their capabilities in comparison with other technologies. This paper discusses the main features of the most famous NewSQL products of different categories and the identified problems associated with them. To overcome the certain ambiguity in the names and translations of some terms related to the subject area under consideration, which takes place in numerous relevant sources, additional explanations are given. For comparison, the paper presents the values of important characteristics inherent in NewSQL, traditional relational and NoSQL database systems. This paper can help researchers and people from the industry choose the best storage solutions for their needs.
在现代世界,处理大数据和工作量的问题变得越来越尖锐。四十多年来,关系数据库一直是存储、搜索和管理数据的主要系统。然而,尽管传统的关系数据库管理系统具有很高的知名度、应用经验和通用性,但由于对可伸缩性和性能的需求日益增长,传统的关系数据库管理系统往往不能满足现代的要求。这导致了新的可选数据管理系统的出现,包括NewSQL系统。NewSQL是一类现代关系数据库管理系统,它提供与NoSQL系统相当的性能,同时保持传统数据库系统固有的数据一致性保证。最近,人们对NewSQL技术的兴趣越来越大,这导致了对NewSQL技术之间的评估和比较的增加。然而,目前仍然缺乏专门研究NewSQL解决方案的特性及其与其他技术的比较能力的工作。本文讨论了不同类别的最著名的NewSQL产品的主要特性以及与它们相关的已识别问题。为了克服与所审议的主题领域有关的一些术语的名称和翻译中的某些歧义,这种情况发生在许多相关来源中,因此给出了额外的解释。为了进行比较,本文介绍了NewSQL、传统关系数据库和NoSQL数据库系统所固有的重要特性的价值。本文可以帮助研究人员和业界人士根据他们的需求选择最佳的存储解决方案。
{"title":"The main categories of NewSQL databases and their features","authors":"V. Yesin, V. Vilihura","doi":"10.30837/rt.2022.4.211.03","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.03","url":null,"abstract":"In the modern world, the problem of working with big data and workloads is becoming more and more acute. For more than forty years, relational databases have been the main leading systems for storing, searching and managing data. However, despite their great popularity, application experience and universality, traditional relational DBMS, due to the growing needs for scalability and performance, often cannot meet modern requirements. This has led to the emergence of new alternative data management systems, including NewSQL systems. NewSQL is a class of modern relational database management systems that provide performance comparable to NoSQL systems while maintaining the data consistency guarantees inherent in traditional database systems. The growing interest in NewSQL technology in recent times has led to an increase number of evaluations and comparisons among competing NewSQL technologies. However, today there is still a certain lack of work devoted to the study of the features of NewSQL solutions and their capabilities in comparison with other technologies. This paper discusses the main features of the most famous NewSQL products of different categories and the identified problems associated with them. To overcome the certain ambiguity in the names and translations of some terms related to the subject area under consideration, which takes place in numerous relevant sources, additional explanations are given. For comparison, the paper presents the values of important characteristics inherent in NewSQL, traditional relational and NoSQL database systems. This paper can help researchers and people from the industry choose the best storage solutions for their needs.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"34 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86540729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm for estimating the energy distribution of radar signals scattering on acoustic disturbances created by UAVs 无人机声干扰下雷达信号散射能量分布估计算法
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.07
V. Kartashov, V.A. Pososhenko, K.V. Kolesnik, V. Kolesnik, R.I. Bobnev, A. Kapusta
The task of estimating the energy distribution over the observation interval of radar signals scattered on atmospheric inhomogeneities, arising as a result of UAV operation, is considered. The solution to this problem is necessary to improve detection algorithms, to classify the detected UAVs according to additional informational features, to improve the resolution when detecting several devices located at the same range during the group application of UAVs, to clarify the time parameters of the evolution of the movement of UAVs in time and space. A similar problem arises due to the need to process useful radar signals with a low signal-to-noise ratio in order to achieve the maximum possible range of reliable UAV detection. Because of this, it becomes impossible to estimate directly the energy of useful signals by the method of comparison with reference physical quantities due to a large measurement error. Therefore, an evaluation algorithm is proposed, based on the methods of the theory of ordinal statistics, which provide, instead of comparing numerical realizations with a certain standard, to form a variational series from them under the condition of a priori knowledge of the distribution function of these realizations. At the same time, the fact is used that for certain distributions of a random variable, among which there are normal and all limited ones, the variance of the estimate in the form of a mathematical expectation of certain ordinal statistics is significantly less than the variance of a direct measurement at a low signal-to-noise ratio. In order to save time and computing resources during real-time processing of received signals, it is proposed to use pre-calculated arrays of numerical values of mathematical expectation and dispersion of ordinal statistics for various parameters of the density distribution of a random variable.
考虑了无人机操作引起的大气非均匀性散射雷达信号在观测区间内的能量分布估计问题。解决这一问题需要改进检测算法,根据附加信息特征对被检测的无人机进行分类,提高在无人机群应用过程中对位于同一距离的多个设备进行检测时的分辨率,明确无人机运动在时间和空间上演化的时间参数。由于需要用低信噪比处理有用的雷达信号,为了达到可靠的无人机探测的最大可能距离,出现一个类似的问题。因此,由于测量误差大,用与参考物理量比较的方法直接估计有用信号的能量是不可能的。因此,本文提出了一种基于有序统计理论方法的评价算法,该算法不将数值实现与某一标准进行比较,而是在先验了解这些实现的分布函数的条件下,由它们形成一个变分序列。同时,利用这样一个事实,即对于随机变量的某些分布,其中有正态分布和有限分布,在低信噪比下,某些有序统计量以数学期望形式估计的方差明显小于直接测量的方差。为了在接收信号的实时处理过程中节省时间和计算资源,提出对随机变量密度分布的各个参数,采用预先计算好的有序统计的数学期望和离散数值阵列。
{"title":"Algorithm for estimating the energy distribution of radar signals scattering on acoustic disturbances created by UAVs","authors":"V. Kartashov, V.A. Pososhenko, K.V. Kolesnik, V. Kolesnik, R.I. Bobnev, A. Kapusta","doi":"10.30837/rt.2022.4.211.07","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.07","url":null,"abstract":"The task of estimating the energy distribution over the observation interval of radar signals scattered on atmospheric inhomogeneities, arising as a result of UAV operation, is considered. The solution to this problem is necessary to improve detection algorithms, to classify the detected UAVs according to additional informational features, to improve the resolution when detecting several devices located at the same range during the group application of UAVs, to clarify the time parameters of the evolution of the movement of UAVs in time and space. A similar problem arises due to the need to process useful radar signals with a low signal-to-noise ratio in order to achieve the maximum possible range of reliable UAV detection. Because of this, it becomes impossible to estimate directly the energy of useful signals by the method of comparison with reference physical quantities due to a large measurement error. Therefore, an evaluation algorithm is proposed, based on the methods of the theory of ordinal statistics, which provide, instead of comparing numerical realizations with a certain standard, to form a variational series from them under the condition of a priori knowledge of the distribution function of these realizations. At the same time, the fact is used that for certain distributions of a random variable, among which there are normal and all limited ones, the variance of the estimate in the form of a mathematical expectation of certain ordinal statistics is significantly less than the variance of a direct measurement at a low signal-to-noise ratio. In order to save time and computing resources during real-time processing of received signals, it is proposed to use pre-calculated arrays of numerical values of mathematical expectation and dispersion of ordinal statistics for various parameters of the density distribution of a random variable.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"22 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80200341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using a fingerprint scanner to protect data in medical information systems 使用指纹扫描仪保护医疗信息系统中的数据
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.12
O.I. Dovnar, M. Babakov, V.I. Cherkis
Since the beginning of hostilities, medical institutions have suffered from cyber attacks, the number of which is not decreasing. The load on the servers even before the start of the war was already quite significant. Since Ukraine suffered severe restrictions due to Covid-19, in part, most institutions were transferred to global medical databases, but with a serious breakthrough, digital capacities did not have time to grow. Even small cyber attacks in the medical field can be critical, so it is necessary to identify accurately medical personnel for access and implement a special application, which will not allow other people to get it, this makes it possible to block immediately all other requests without processing, and this is one of the ways to optimize and increasing security. The task can be solved by standard means of authorization, but they are quite easy to bypass, ordinary software can also be reprogrammed, identification by phone number can be too expensive, so a combined method is proposed: special equipment for reading fingerprints and the corresponding software application. This method is sufficiently reliable and simple to implement (medical personnel will only need to put their finger to the sensor), as well as economical and not demanding. The developed prototype for authorization on the Arduino hardware platform provides the necessary functionality and meets the task. The sensor recognizes more than 100 people, and the convenient mini USB allows you to connect conveniently the device to any computer port. A special algorithm will block the device in case of intervention by a person who does not have access to the corresponding resource. Can be easily reprogrammed and configured to the required equipment, and the case can be printed according to the necessary requirements.
自敌对行动开始以来,医疗机构就遭受了网络攻击,这种攻击的数量并没有减少。甚至在战争开始之前,服务器上的负载就已经相当大了。由于乌克兰因Covid-19受到严重限制,部分原因是大多数机构被转移到全球医疗数据库,但随着重大突破,数字容量没有时间增长。即使是医疗领域的小型网络攻击也可能是至关重要的,因此有必要准确识别医务人员的访问权限并实施特殊的应用程序,这将不允许其他人获得它,这使得可以立即阻止所有其他请求而不进行处理,这是优化和提高安全性的方法之一。该任务可以通过标准的授权手段解决,但它们很容易被绕过,普通软件也可以重新编程,通过电话号码识别可能过于昂贵,因此提出了一种组合方法:用于读取指纹的专用设备和相应的软件应用程序。这种方法是足够可靠和简单的实施(医务人员只需要把他们的手指放在传感器),以及经济和不要求。开发的Arduino硬件平台授权原型提供了必要的功能,满足了任务要求。传感器可识别100多人,方便的迷你USB可以方便地将设备连接到任何计算机端口。如果没有访问相应资源的人进行干预,一种特殊的算法会阻止设备。可以很容易地重新编程和配置到所需的设备,并可以根据必要的要求打印的情况下。
{"title":"Using a fingerprint scanner to protect data in medical information systems","authors":"O.I. Dovnar, M. Babakov, V.I. Cherkis","doi":"10.30837/rt.2022.4.211.12","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.12","url":null,"abstract":"Since the beginning of hostilities, medical institutions have suffered from cyber attacks, the number of which is not decreasing. The load on the servers even before the start of the war was already quite significant. Since Ukraine suffered severe restrictions due to Covid-19, in part, most institutions were transferred to global medical databases, but with a serious breakthrough, digital capacities did not have time to grow. Even small cyber attacks in the medical field can be critical, so it is necessary to identify accurately medical personnel for access and implement a special application, which will not allow other people to get it, this makes it possible to block immediately all other requests without processing, and this is one of the ways to optimize and increasing security. \u0000The task can be solved by standard means of authorization, but they are quite easy to bypass, ordinary software can also be reprogrammed, identification by phone number can be too expensive, so a combined method is proposed: special equipment for reading fingerprints and the corresponding software application. This method is sufficiently reliable and simple to implement (medical personnel will only need to put their finger to the sensor), as well as economical and not demanding. \u0000The developed prototype for authorization on the Arduino hardware platform provides the necessary functionality and meets the task. The sensor recognizes more than 100 people, and the convenient mini USB allows you to connect conveniently the device to any computer port. A special algorithm will block the device in case of intervention by a person who does not have access to the corresponding resource. Can be easily reprogrammed and configured to the required equipment, and the case can be printed according to the necessary requirements.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"31 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89779347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless power transmission technologies 无线电力传输技术
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.09
V. Alieksieiev, D. Gretskih, D. S. Gavva, V. Lykhograi
The article consists of three parts. The analysis of existing technologies of wireless power transfer (WPT) is carried out in the first part. It is noted that one of the factors that determines the choice of one or another WPT technology is the distance over which the power is transmitted and the type of electromagnetic (EM) energy used. The essence of WPT technologies in the near zone, Fresnel zone and Fraunhofer zone is explained. A generalized block diagram of the WPT system is presented. Areas of application and trends in the further development of the WPT technologies over short distances using induction and resonance methods, the WPT technologies over long distances, the technology of EM energy harvesting from the surrounding space and its conversion into direct current for powering low-power devices are considered. The achievements of the team of the antenna laboratory of the Kharkiv National University of Radio Electronics (KhNURE) in the area of WPT are presented in the second part of the article. Namely, the electrodynamics’ approach is considered which is based on a single idea about the functioning of WPT systems and which include antennas and their circuits and ways of excitation with nonlinear elements. The stages of building a nonlinear mathematical model (MM) of the electrodynamics’ level of the WPT system are presented, according to which the entire WPT system, which generally includes the transmitting subsystem and the receiving subsystem, is considered as a single multi-input antenna system with nonlinear characteristics. The proposed MM provides a complete representation of the WPT systems operation of a wide class and purpose, in which fundamentally different WPT technologies are used. The third part of the article presents new results related to continued research. The analysis of the adequacy of the developed MM of WPT system is carried out. The results of simulation of WPT systems with the induction method of energy transfer (near zone) and their comparison with theoretical and experimental data of other authors showed the reliability and universality of the proposed approach and the MM of WPT system developed on its basis.
本文由三部分组成。第一部分对现有的无线电力传输技术进行了分析。值得注意的是,决定选择一种或另一种WPT技术的因素之一是传输功率的距离和使用的电磁(EM)能量的类型。阐述了近区、菲涅耳区和弗劳恩霍夫区的WPT技术的本质。给出了WPT系统的广义框图。讨论了利用感应和共振方法的短距离WPT技术的应用领域和进一步发展的趋势,远距离WPT技术,从周围空间收集EM能量并将其转换为直流为低功率器件供电的技术。哈尔科夫国立无线电电子大学(KhNURE)天线实验室团队在WPT领域的成就在文章的第二部分中进行了介绍。也就是说,考虑了电动力学方法,它基于对WPT系统功能的单一想法,包括天线及其电路和非线性元件的激励方式。提出了建立WPT系统电动力学水平非线性数学模型的步骤,据此将整个WPT系统(一般包括发射分系统和接收分系统)视为一个具有非线性特性的单多输入天线系统。所建议的MM提供了广泛类别和用途的WPT系统操作的完整表示,其中使用了根本不同的WPT技术。文章的第三部分介绍了与继续研究相关的新结果。对所开发的WPT系统模型的充分性进行了分析。用感应能量传递法(近区)对水运系统进行了仿真,并与其他作者的理论和实验数据进行了比较,结果表明了该方法的可靠性和通用性,并在此基础上建立了水运系统的模型。
{"title":"Wireless power transmission technologies","authors":"V. Alieksieiev, D. Gretskih, D. S. Gavva, V. Lykhograi","doi":"10.30837/rt.2022.4.211.09","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.09","url":null,"abstract":"The article consists of three parts. The analysis of existing technologies of wireless power transfer (WPT) is carried out in the first part. It is noted that one of the factors that determines the choice of one or another WPT technology is the distance over which the power is transmitted and the type of electromagnetic (EM) energy used. The essence of WPT technologies in the near zone, Fresnel zone and Fraunhofer zone is explained. A generalized block diagram of the WPT system is presented. Areas of application and trends in the further development of the WPT technologies over short distances using induction and resonance methods, the WPT technologies over long distances, the technology of EM energy harvesting from the surrounding space and its conversion into direct current for powering low-power devices are considered. \u0000The achievements of the team of the antenna laboratory of the Kharkiv National University of Radio Electronics (KhNURE) in the area of WPT are presented in the second part of the article. Namely, the electrodynamics’ approach is considered which is based on a single idea about the functioning of WPT systems and which include antennas and their circuits and ways of excitation with nonlinear elements. The stages of building a nonlinear mathematical model (MM) of the electrodynamics’ level of the WPT system are presented, according to which the entire WPT system, which generally includes the transmitting subsystem and the receiving subsystem, is considered as a single multi-input antenna system with nonlinear characteristics. The proposed MM provides a complete representation of the WPT systems operation of a wide class and purpose, in which fundamentally different WPT technologies are used. \u0000The third part of the article presents new results related to continued research. The analysis of the adequacy of the developed MM of WPT system is carried out. The results of simulation of WPT systems with the induction method of energy transfer (near zone) and their comparison with theoretical and experimental data of other authors showed the reliability and universality of the proposed approach and the MM of WPT system developed on its basis.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"3 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74766393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1