Pub Date : 2022-09-28DOI: 10.30837/rt.2022.3.210.08
V. Kartashov, M. Rybnykov, A. Kartashov, V.A. Pososhenko
Currently, classical means of detecting objects do not provide the necessary efficiency for detecting small UAVs, and acoustic location among the known methods for their observation is the most cost-effective solution. The article analyzes the well-known methods of direction finding of acoustic signals in order to select algorithms for processing UAV signals. Obtaining qualitative indicators of the analyzed algorithms was carried out by the method of statistical computer modeling in the Matlab environment. Based on the simulation results, it is shown that classical methods are the most stable under conditions of low signal-to-noise ratios. The GCC-PHAT direction finding algorithm, based on determining the difference in the time of arrival of a signal at spaced points, is computationally economical and simple enough to determine the direction to the UAV, but it is not capable of distinguishing more than one radiation source within the diagram orientation. Beamforming methods are also relatively easy to implement and computationally efficient, and are more robust at low signal-to-noise ratios. The SRP-NAM algorithm has a greater accuracy in determining angles than SRP-PHAT, so it can be an adequate replacement for the SRP-PHAT algorithm. High-resolution methods provide better directional resolution than classical methods, which, in the case of a limited microphone array aperture, is a positive factor in the design of an UAV direction finding station. High resolution methods were considered: non-coherent MUSIC, non-coherent normalized MUSIC and TOPS method. It is shown that incoherent MUSIC gives poor results in distinguishing close UAV signals, since unequal estimates of the entire frequency range are concentrated during bearing formation. The incoherent normalized MUSIC algorithm is able to efficiently use the entire frequency range of the UAV acoustic signal. The TOPS algorithm is inferior to the incoherent normalized MUSIC algorithm, and on the other hand, it does not require a priori estimates of the number of radiation sources.
{"title":"Analysis of acoustic direction finding methods for unmanned aerial vehicles","authors":"V. Kartashov, M. Rybnykov, A. Kartashov, V.A. Pososhenko","doi":"10.30837/rt.2022.3.210.08","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.08","url":null,"abstract":"Currently, classical means of detecting objects do not provide the necessary efficiency for detecting small UAVs, and acoustic location among the known methods for their observation is the most cost-effective solution. \u0000The article analyzes the well-known methods of direction finding of acoustic signals in order to select algorithms for processing UAV signals. Obtaining qualitative indicators of the analyzed algorithms was carried out by the method of statistical computer modeling in the Matlab environment. \u0000Based on the simulation results, it is shown that classical methods are the most stable under conditions of low signal-to-noise ratios. The GCC-PHAT direction finding algorithm, based on determining the difference in the time of arrival of a signal at spaced points, is computationally economical and simple enough to determine the direction to the UAV, but it is not capable of distinguishing more than one radiation source within the diagram orientation. Beamforming methods are also relatively easy to implement and computationally efficient, and are more robust at low signal-to-noise ratios. The SRP-NAM algorithm has a greater accuracy in determining angles than SRP-PHAT, so it can be an adequate replacement for the SRP-PHAT algorithm. \u0000High-resolution methods provide better directional resolution than classical methods, which, in the case of a limited microphone array aperture, is a positive factor in the design of an UAV direction finding station. High resolution methods were considered: non-coherent MUSIC, non-coherent normalized MUSIC and TOPS method. It is shown that incoherent MUSIC gives poor results in distinguishing close UAV signals, since unequal estimates of the entire frequency range are concentrated during bearing formation. The incoherent normalized MUSIC algorithm is able to efficiently use the entire frequency range of the UAV acoustic signal. The TOPS algorithm is inferior to the incoherent normalized MUSIC algorithm, and on the other hand, it does not require a priori estimates of the number of radiation sources.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"199 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76956878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.30837/rt.2022.3.210.12
V. Borshchov, O. Listratenko, M. Protsenko, I. Tymchuk, O. Kravchenko, O.V. Syddia, M. Slipchenko, B. Chichkov
This review is devoted to analysis of works in the field of creating electrically insulating heat-conducting polyimide composite films based on powders of micro-, submicro- or nano-sized fillers with high dielectric and heat-conducting properties for use as effective thermal interface materials in various electronic devices in instrument making. Particular attention is paid to studies on the influence of the size of nano- and microparticles of inorganic fillers on the heat-nducting, dielectric, and physical-mechanical properties of nanocomposite polyimide materials. The analysis of the results of work on the study of the dependence of thermal conductivity on the ratios of micron and nanosized particles in mixtures and their number in polyimides and on the conditions of their polymerization was carried out to confirm the possibility of increasing the thermal conductivity values of promising polyimide materials from 0.12 W/(m•K) up to 5¸10 W/ (m•K). It is noted that the highest thermal conductivity of industrially produced modern polyimide films on market does not exceed 0.75¸0.8 W/(m•K). The task of creating inexpensive, but high-quality heat-conductive polyimide composite materials with sufficiently high thermal conductivity without deteriorating their strength and ductility characteristics is currently relevant and technically in demand.
{"title":"High-thermally conductive composite polyimide materials","authors":"V. Borshchov, O. Listratenko, M. Protsenko, I. Tymchuk, O. Kravchenko, O.V. Syddia, M. Slipchenko, B. Chichkov","doi":"10.30837/rt.2022.3.210.12","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.12","url":null,"abstract":"This review is devoted to analysis of works in the field of creating electrically insulating heat-conducting polyimide composite films based on powders of micro-, submicro- or nano-sized fillers with high dielectric and heat-conducting properties for use as effective thermal interface materials in various electronic devices in instrument making. Particular attention is paid to studies on the influence of the size of nano- and microparticles of inorganic fillers on the heat-nducting, dielectric, and physical-mechanical properties of nanocomposite polyimide materials. The analysis of the results of work on the study of the dependence of thermal conductivity on the ratios of micron and nanosized particles in mixtures and their number in polyimides and on the conditions of their polymerization was carried out to confirm the possibility of increasing the thermal conductivity values of promising polyimide materials from 0.12 W/(m•K) up to 5¸10 W/ (m•K). It is noted that the highest thermal conductivity of industrially produced modern polyimide films on market does not exceed 0.75¸0.8 W/(m•K). The task of creating inexpensive, but high-quality heat-conductive polyimide composite materials with sufficiently high thermal conductivity without deteriorating their strength and ductility characteristics is currently relevant and technically in demand.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"53 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91150566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.30837/rt.2022.3.210.10
V. Kartashov, V.M. Oleynikov, I.S. Seleznyov, O.V. Kartashov
When solving the urgent task of detecting small unmanned aerial vehicles (UAVs) by their acoustic radiation (AR), there is a need to study the AR characteristics of UAVs. Therefore, considerable attention is paid in the literature to theoretical and experimental studies of the structure and parameters of the sound field created by UAVs. This article is devoted to the experimental study of the directional diagrams of the acoustic radiation from the DJI Phantom 3 unmanned aerial vehicle. The UAV AR recording experiment was conducted in a "silenced" chamber, the walls of which are covered with sound-absorbing panels with a surface of a special geometric shape. The experimental setup includes the UAV mounted on a boom, a microphone for sound recording, and a boom for the microphone. Studies of the structure and parameters of the sound field of the quadcopter have shown that the spectra of the emitted signal have pronounced harmonic components with frequencies multiples of the propeller rotation frequency. The spectral components have the greatest power in the frequency range up to 500 Hz, where the first harmonic has the largest amplitude, and then the spectrum components decrease to the ambient noise level. Obtained two-dimensional and three-dimensional directional diagrams of the UAV AR with and without propellers when only the aircraft engine is operating. It is shown that in the absence of screws, the acoustic radiation is much weaker in level. The experimental data was also presented in the form of three-dimensional AR diagrams for the four harmonics of the acoustic signal, and it was analyzed what changes in the spatial orientation of the UAV AR are observed based on changes in the three-dimensional figure for each of the radiation harmonics. It is shown that the spatial distribution of both the total energy (over the entire frequency range) of the acoustic signal and the energy of its individual spectral (harmonic) components is significantly anisotropic. It follows from this conclusion that the range of UAV detection and observation in real conditions is a statistical value that depends on the angle of its observation.
{"title":"Directional diagrams of acoustic radiation from unmanned aerial vehicles","authors":"V. Kartashov, V.M. Oleynikov, I.S. Seleznyov, O.V. Kartashov","doi":"10.30837/rt.2022.3.210.10","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.10","url":null,"abstract":"When solving the urgent task of detecting small unmanned aerial vehicles (UAVs) by their acoustic radiation (AR), there is a need to study the AR characteristics of UAVs. Therefore, considerable attention is paid in the literature to theoretical and experimental studies of the structure and parameters of the sound field created by UAVs. \u0000This article is devoted to the experimental study of the directional diagrams of the acoustic radiation from the DJI Phantom 3 unmanned aerial vehicle. The UAV AR recording experiment was conducted in a \"silenced\" chamber, the walls of which are covered with sound-absorbing panels with a surface of a special geometric shape. The experimental setup includes the UAV mounted on a boom, a microphone for sound recording, and a boom for the microphone. \u0000Studies of the structure and parameters of the sound field of the quadcopter have shown that the spectra of the emitted signal have pronounced harmonic components with frequencies multiples of the propeller rotation frequency. The spectral components have the greatest power in the frequency range up to 500 Hz, where the first harmonic has the largest amplitude, and then the spectrum components decrease to the ambient noise level. \u0000Obtained two-dimensional and three-dimensional directional diagrams of the UAV AR with and without propellers when only the aircraft engine is operating. It is shown that in the absence of screws, the acoustic radiation is much weaker in level. The experimental data was also presented in the form of three-dimensional AR diagrams for the four harmonics of the acoustic signal, and it was analyzed what changes in the spatial orientation of the UAV AR are observed based on changes in the three-dimensional figure for each of the radiation harmonics. \u0000It is shown that the spatial distribution of both the total energy (over the entire frequency range) of the acoustic signal and the energy of its individual spectral (harmonic) components is significantly anisotropic. It follows from this conclusion that the range of UAV detection and observation in real conditions is a statistical value that depends on the angle of its observation.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"37 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80180302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.30837/rt.2022.3.210.01
I. Gorbenko, Ye.G. Kachko, M. Yesina, V. Ponomar
In recent years, there has been a significant amount of research related to the development of quantum computers. If such a computer were to be built, it would be able to break existing public-key cryptosystems that are currently used for many purposes. This will seriously affect the privacy and integrity of digital communications, etc. That is why special attention is currently being paid to post-quantum cryptography, the main goal of which is the development of cryptographic systems that are protected from both quantum and classical attacks, and will also be able to interact with existing communication protocols and networks. In view of the significant importance of the practical application of directional encryption algorithms, at the international and state level, special attention was paid to the implementation of the proposed requirements for key encapsulation protocols. Key-establishment algorithms (KEA) form a common secret – the key for a symmetric encryption algorithm. The paper considers two KEA algorithms that use algebraic lattices: one of the finalists of the 3rd round Crystals-Kyber and the Skelya algorithm (DSTU 8961-2019). The Kyber algorithm first performs asymmetric encryption of a 32-byte message, and then generates a shared secret. The Skelya algorithm performs the same actions, but for asymmetric encryption, it uses messages of any length that do not exceed the maximum possible. That is why the last algorithm can be used not only as a KEA algorithm, but also as an asymmetric encryption algorithm. According to the NIST Security level, the Kyber algorithm provides cryptographic 1, 3, and 5 security levels, and the Rock algorithm provides cryptographic 3, 5, and 7 security levels. The cryptographic stability that is ensured for both algorithms is determined by a set of parameters. Thus, the purpose of this work is to review the details of the implementation of each of the mentioned algorithms, to compare the speed of the key generation, encapsulation and decapsulation algorithms for the Kyber and Skelya algorithms in terms of key data lengths, and the encapsulation result and computational complexity of both algorithms.
{"title":"Comparative characteristics of Crystals-Kyber and Skelya key encapsulation algorithms (DSTU 8961-2019)","authors":"I. Gorbenko, Ye.G. Kachko, M. Yesina, V. Ponomar","doi":"10.30837/rt.2022.3.210.01","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.01","url":null,"abstract":"In recent years, there has been a significant amount of research related to the development of quantum computers. If such a computer were to be built, it would be able to break existing public-key cryptosystems that are currently used for many purposes. This will seriously affect the privacy and integrity of digital communications, etc. That is why special attention is currently being paid to post-quantum cryptography, the main goal of which is the development of cryptographic systems that are protected from both quantum and classical attacks, and will also be able to interact with existing communication protocols and networks. In view of the significant importance of the practical application of directional encryption algorithms, at the international and state level, special attention was paid to the implementation of the proposed requirements for key encapsulation protocols. Key-establishment algorithms (KEA) form a common secret – the key for a symmetric encryption algorithm. The paper considers two KEA algorithms that use algebraic lattices: one of the finalists of the 3rd round Crystals-Kyber and the Skelya algorithm (DSTU 8961-2019). The Kyber algorithm first performs asymmetric encryption of a 32-byte message, and then generates a shared secret. The Skelya algorithm performs the same actions, but for asymmetric encryption, it uses messages of any length that do not exceed the maximum possible. That is why the last algorithm can be used not only as a KEA algorithm, but also as an asymmetric encryption algorithm. According to the NIST Security level, the Kyber algorithm provides cryptographic 1, 3, and 5 security levels, and the Rock algorithm provides cryptographic 3, 5, and 7 security levels. The cryptographic stability that is ensured for both algorithms is determined by a set of parameters. Thus, the purpose of this work is to review the details of the implementation of each of the mentioned algorithms, to compare the speed of the key generation, encapsulation and decapsulation algorithms for the Kyber and Skelya algorithms in terms of key data lengths, and the encapsulation result and computational complexity of both algorithms.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"55 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84228970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.30837/rt.2022.3.210.11
I. Svyd, M. Tkach, A. Sierikov, O.V. Korotich, S. Datsko, D.O. Sukhorukov, T.S. Machonis
The presented paper examines the principles and methods for processing of information from airspace surveillance radar networks. Information technologies allow implementing automatic collection, processing, storage, transmission and issuance of radar information to users. In this work, the synthesis and analysis of the optimal structure of the interstage processing of signal data and radar information of primary processing in the network of airspace surveillance radar systems is carried out. The quality of information from radar networks of airspace surveillance systems affects almost all indicators of the quality of the radar systems network functioning. The stages of radar information processing in radar systems networks are analyzed. The importance of specifying the above stages for creating a complete picture of the air situation in the area of responsibility is shown. To improve the quality of information support for consumers, a network of radar systems requires information processing at all stages. At each stage of information processing, information processing quality indicators were analyzed. This made it possible to show that the staged implementation of information processing, on the one hand, simplified the optimization of processing within each processing stage, but on the other hand, it made it difficult to carry out compatible optimization of both the detection of an aerial object and the measurement of the coordinates of an aerial object. The synthesized structure of processing radar information of the network of radar systems of airspace surveillance, which in its turn made it possible to carry out interstage optimization of processing of both signal data and primary processing information. Calculations have shown that the method of information processing, in which the combination of information is carried out at the level of decision-making on the detection of airborne objects in each signal data processing channel, has some advantages in the quality of information processing of the network of radar systems compared to the one currently used. time option combination information at the stage of signal processing. At the same time, for the method of combining information at the level of decision-making about the detection of aerial objects, the flow of transmitted information to the joint processing point is significantly reduced. All this allows improving the quality of information processing in the airspace control system.
{"title":"Processing of information from networks of airspace surveillance radar systems","authors":"I. Svyd, M. Tkach, A. Sierikov, O.V. Korotich, S. Datsko, D.O. Sukhorukov, T.S. Machonis","doi":"10.30837/rt.2022.3.210.11","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.11","url":null,"abstract":"The presented paper examines the principles and methods for processing of information from airspace surveillance radar networks. Information technologies allow implementing automatic collection, processing, storage, transmission and issuance of radar information to users. In this work, the synthesis and analysis of the optimal structure of the interstage processing of signal data and radar information of primary processing in the network of airspace surveillance radar systems is carried out. The quality of information from radar networks of airspace surveillance systems affects almost all indicators of the quality of the radar systems network functioning. The stages of radar information processing in radar systems networks are analyzed. The importance of specifying the above stages for creating a complete picture of the air situation in the area of responsibility is shown. To improve the quality of information support for consumers, a network of radar systems requires information processing at all stages. At each stage of information processing, information processing quality indicators were analyzed. This made it possible to show that the staged implementation of information processing, on the one hand, simplified the optimization of processing within each processing stage, but on the other hand, it made it difficult to carry out compatible optimization of both the detection of an aerial object and the measurement of the coordinates of an aerial object. The synthesized structure of processing radar information of the network of radar systems of airspace surveillance, which in its turn made it possible to carry out interstage optimization of processing of both signal data and primary processing information. Calculations have shown that the method of information processing, in which the combination of information is carried out at the level of decision-making on the detection of airborne objects in each signal data processing channel, has some advantages in the quality of information processing of the network of radar systems compared to the one currently used. time option combination information at the stage of signal processing. At the same time, for the method of combining information at the level of decision-making about the detection of aerial objects, the flow of transmitted information to the joint processing point is significantly reduced. All this allows improving the quality of information processing in the airspace control system.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"12 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74306919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.30837/rt.2022.3.210.14
V. Tikhonov, V. Kartashov, O.V. Kartashov, V.A. Pososhenko
The work examines methods and mathematical models that provide the possibility of researching the statistical characteristics of complex and non-stationary random processes describing a wide class of physical phenomena. The proposed models can be used to study the processes observed in various fields of human activity, namely, to analyze the trajectories of unmanned aerial vehicles, their acoustic signals, meteorological processes reflecting the state of the atmosphere. Real and simulated non-stationary random processes considered in the work are represented by the complex vector random process (CVRP) model. In this case, the length of the subvector is equal to the period of the seasonal component. In fact, in such a representation, the time series readings are replaced by their aggregate, i.e. subvectors. Statistical relationships are analyzed for subvectors, and not, as usual, for process counts. If the length of the subvector is equal to one, all operations in the SVVP representation are equivalent to the usual operations for time series. The mathematical apparatus developed in the article was used to analyze changes in time series of atmospheric temperature observed over a long period of time; average annual temperatures were estimated with subsequent smoothing with a low-pass filter. The results obtained can be used to analyze medium-term and long-term changes in atmospheric conditions, refine the results obtained by traditional methods of mathematical statistics, analyze and predict data flows in mobile communication networks, as well as in other areas of human activity.
{"title":"Mathematical models of non-stationary random processes in the SVVP representation","authors":"V. Tikhonov, V. Kartashov, O.V. Kartashov, V.A. Pososhenko","doi":"10.30837/rt.2022.3.210.14","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.14","url":null,"abstract":"The work examines methods and mathematical models that provide the possibility of researching the statistical characteristics of complex and non-stationary random processes describing a wide class of physical phenomena. The proposed models can be used to study the processes observed in various fields of human activity, namely, to analyze the trajectories of unmanned aerial vehicles, their acoustic signals, meteorological processes reflecting the state of the atmosphere. \u0000Real and simulated non-stationary random processes considered in the work are represented by the complex vector random process (CVRP) model. In this case, the length of the subvector is equal to the period of the seasonal component. In fact, in such a representation, the time series readings are replaced by their aggregate, i.e. subvectors. Statistical relationships are analyzed for subvectors, and not, as usual, for process counts. If the length of the subvector is equal to one, all operations in the SVVP representation are equivalent to the usual operations for time series. \u0000The mathematical apparatus developed in the article was used to analyze changes in time series of atmospheric temperature observed over a long period of time; average annual temperatures were estimated with subsequent smoothing with a low-pass filter. The results obtained can be used to analyze medium-term and long-term changes in atmospheric conditions, refine the results obtained by traditional methods of mathematical statistics, analyze and predict data flows in mobile communication networks, as well as in other areas of human activity.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"20 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91220084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.30837/rt.2022.3.210.09
V. Oleynikov, V. Kartashov, S. Sheiko, O. Zubkov, E.I. Oleynikova
The features of the acoustic method for determining the location of the UAV using microphone arrays are considered: classical methods, super-resolution methods and the method of the difference in the arrival time of acoustic oscillations. A description of a sodar with a minimum number of microphones is given. The factors influencing the magnitude of the error in determining the coordinates of the UAV are analyzed. Estimates of the instrumental location error and errors caused by the Doppler effect were obtained by simulation modeling for a given configuration of the sodar microphone array. Using the considered sodar, the coordinates of a moving UAV were measured in open areas. Processing of field measurement results shows that the absolute values of errors in determining the coordinates of the UAV obtained using sodar at a distance of up to 100 m in 95% of cases do not exceed 3 m and in determining the height of no more than 1 m. Measurements of the azimuth and elevation angle are quite accurate at the same time high resolution.
{"title":"Determining the location of small unmanned aerial vehicles by acoustic radiation","authors":"V. Oleynikov, V. Kartashov, S. Sheiko, O. Zubkov, E.I. Oleynikova","doi":"10.30837/rt.2022.3.210.09","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.09","url":null,"abstract":"The features of the acoustic method for determining the location of the UAV using microphone arrays are considered: classical methods, super-resolution methods and the method of the difference in the arrival time of acoustic oscillations. A description of a sodar with a minimum number of microphones is given. The factors influencing the magnitude of the error in determining the coordinates of the UAV are analyzed. Estimates of the instrumental location error and errors caused by the Doppler effect were obtained by simulation modeling for a given configuration of the sodar microphone array. Using the considered sodar, the coordinates of a moving UAV were measured in open areas. Processing of field measurement results shows that the absolute values of errors in determining the coordinates of the UAV obtained using sodar at a distance of up to 100 m in 95% of cases do not exceed 3 m and in determining the height of no more than 1 m. Measurements of the azimuth and elevation angle are quite accurate at the same time high resolution.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"25 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77222929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.04
Yaroslav Derevianko, Y. Gorbenko, О.О. Kuznetsov
Modern cryptographic applications use cryptographic algorithms with a symmetric key. They provide high conversion rates and resistance to crypto-graphic attacks. To complicate the plaintext – cipher-text ratio, symmetric ciphers usually use nonlinear substitutions (S-boxes). S-boxes cryptographic metrics play a crucial role in ensuring resilience to most known attacks (differential, linear, algebraic, and other cryptanalysis methods). However, generating efficient s-boxes is a challenge. Even for small input/output sizes, there are an extremely large number of possible solutions. Usually, the substitution is represented as a set of Boolean functions. This allows you to apply discrete transformations, for example, Walsh-Hadamard, to evaluate cryptographic indicators. However, methods for generating s-boxes by selecting suitable Boolean functions are extremely complex. Therefore, it is necessary to study new mathematical methods for representing nonlinear substitutions, studying their cryptographic properties, and developing generation algorithms. In this paper, we propose applying factorial number systems to represent nonlinear substitutions. Each substitution can be represented in a unique way through a set of inversions, which, in turn, can be transformed into a factorial number. That is, we can naturally arrange all substitutions by numbering them in the factorial number system. We give examples of such numbering and investigate the cryptographic characteristics of S-boxes with their initial numbers. In particular, we show how the variable functions used in heuristic algorithms for generating non-linear substitutions change. The results obtained can be used to simplify heuristic methods in order to speed up the generation of non-linear substitutions.
{"title":"Factorial number system for nonlinear substitutions generation","authors":"Yaroslav Derevianko, Y. Gorbenko, О.О. Kuznetsov","doi":"10.30837/rt.2022.2.209.04","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.04","url":null,"abstract":"Modern cryptographic applications use cryptographic algorithms with a symmetric key. They provide high conversion rates and resistance to crypto-graphic attacks. To complicate the plaintext – cipher-text ratio, symmetric ciphers usually use nonlinear substitutions (S-boxes). S-boxes cryptographic metrics play a crucial role in ensuring resilience to most known attacks (differential, linear, algebraic, and other cryptanalysis methods). However, generating efficient s-boxes is a challenge. Even for small input/output sizes, there are an extremely large number of possible solutions. Usually, the substitution is represented as a set of Boolean functions. This allows you to apply discrete transformations, for example, Walsh-Hadamard, to evaluate cryptographic indicators. However, methods for generating s-boxes by selecting suitable Boolean functions are extremely complex. Therefore, it is necessary to study new mathematical methods for representing nonlinear substitutions, studying their cryptographic properties, and developing generation algorithms. In this paper, we propose applying factorial number systems to represent nonlinear substitutions. Each substitution can be represented in a unique way through a set of inversions, which, in turn, can be transformed into a factorial number. That is, we can naturally arrange all substitutions by numbering them in the factorial number system. We give examples of such numbering and investigate the cryptographic characteristics of S-boxes with their initial numbers. In particular, we show how the variable functions used in heuristic algorithms for generating non-linear substitutions change. The results obtained can be used to simplify heuristic methods in order to speed up the generation of non-linear substitutions.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89241452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.02
О.О. Kuznetsov, Yu.I. Горбенко, М.О. Poluyanenko, S. Kandiy, E.D. Matveeva
To ensure the security of information technology, cryptographic information protection tools are used, in particular block and stream encryption algorithms with a symmetric key. Reliability and cryptographic strength of cryptoalgorithms is provided by the properties of the applied primitives. For example, non-linear substitutions (S-boxes) are used as the main component of modern symmetric ciphers. Therefore, generation of substitutions is an important scientific task directly related to the security of information technology and improvement of modern symmetric ciphers. The paper investigates the properties of iterative algorithms for generating non-linear substitutions and special cost functions, which play a decisive role in the heuristic search for S-boxes with the required properties. We consider the cost function of the WCF (Cost Function of the content of the Walsh-Hadamard spectrum) and optimize its parameters. The obtained optimization results in combination with the Hill Climbing iterative search algorithm can reduce significantly the number of iterations. In particular, we show that for a substitution search with a non-linearity of 104, on average, we reduce the computational complexity of generation by more than 20%. In addition, it is possible to increase the success rate of the heuristic search. In particular, for the selected settings, in 100% of cases, a beaktive S-box with a non-linearity of 104 was found.
{"title":"Properties of the cost function in the iterative algorithm for generating nonlinear substitution","authors":"О.О. Kuznetsov, Yu.I. Горбенко, М.О. Poluyanenko, S. Kandiy, E.D. Matveeva","doi":"10.30837/rt.2022.2.209.02","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.02","url":null,"abstract":"To ensure the security of information technology, cryptographic information protection tools are used, in particular block and stream encryption algorithms with a symmetric key. Reliability and cryptographic strength of cryptoalgorithms is provided by the properties of the applied primitives. For example, non-linear substitutions (S-boxes) are used as the main component of modern symmetric ciphers. Therefore, generation of substitutions is an important scientific task directly related to the security of information technology and improvement of modern symmetric ciphers. The paper investigates the properties of iterative algorithms for generating non-linear substitutions and special cost functions, which play a decisive role in the heuristic search for S-boxes with the required properties. We consider the cost function of the WCF (Cost Function of the content of the Walsh-Hadamard spectrum) and optimize its parameters. The obtained optimization results in combination with the Hill Climbing iterative search algorithm can reduce significantly the number of iterations. In particular, we show that for a substitution search with a non-linearity of 104, on average, we reduce the computational complexity of generation by more than 20%. In addition, it is possible to increase the success rate of the heuristic search. In particular, for the selected settings, in 100% of cases, a beaktive S-box with a non-linearity of 104 was found.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"3 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90186333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.05
D. Harmash
The essence and possibilities of protecting the Rainbow post-quantum cryptographic algorithm are considered. The main properties of algorithms based on multidimensional quadratic transformations are studied. An assessment is given of what resources and computational energy are needed for the successful use of algorithms based on multidimensional quadratic transformations. The ability to protect the algorithm against attacks by third-party channels is analyzed. It is studied how successfully a cryptographic algorithm based on Rainbow multivariate quadratic transformations can withstand RBS attacks. A detailed description of the steps used to build an attack on a cryptographic algorithm based on Rainbow multivariate quadratic transforms is given. A structural analysis of the Rainbow algorithm is performed. Detailed conclusions are made regarding the performed analyzes. An assessment of the stability and complexity of the cryptographic encryption algorithm and electronic signature based on multivariate quadratic transformations is given.
{"title":"RAINBOW algorithm and its ability to resist RBS attacks and third party channels","authors":"D. Harmash","doi":"10.30837/rt.2022.2.209.05","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.05","url":null,"abstract":"The essence and possibilities of protecting the Rainbow post-quantum cryptographic algorithm are considered. The main properties of algorithms based on multidimensional quadratic transformations are studied. An assessment is given of what resources and computational energy are needed for the successful use of algorithms based on multidimensional quadratic transformations. The ability to protect the algorithm against attacks by third-party channels is analyzed. It is studied how successfully a cryptographic algorithm based on Rainbow multivariate quadratic transformations can withstand RBS attacks. A detailed description of the steps used to build an attack on a cryptographic algorithm based on Rainbow multivariate quadratic transforms is given. A structural analysis of the Rainbow algorithm is performed. Detailed conclusions are made regarding the performed analyzes. An assessment of the stability and complexity of the cryptographic encryption algorithm and electronic signature based on multivariate quadratic transformations is given.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"33 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83032756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}