首页 > 最新文献

Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia最新文献

英文 中文
Comparative analysis of methods for determining the air objects’ coordinates using wide-area multilateration systems 利用广域多星系统确定空中目标坐标方法的比较分析
IF 0.3 Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.16
I. Svyd, Valerii V. Semenets, O. Maltsev, M. Tkach, S.V. Starokozhev, O.O. Datsenko, I. Shevtsov
The presented work considers the place and role of wide-area multi-position airspace surveillance in the information support of airspace control and air traffic control systems. Classification of methods for estimating the coordinates of air objects using various primary measurements of the parameters of received signals in multi-position observation is given. A quantitative assessment of the accuracy in determining the air objects’ coordinates by the considered methods is also given. The capabilities of wide-area multi-position surveillance systems increase significantly when using the principles of constructing a secondary surveillance radar as a non-synchronous network, and an aircraft responder as an open single-channel queuing system with servicing the first correctly received request signal. An unauthorized request from an aircraft responder makes it possible to switch from completely passive methods for detecting and determining the coordinates of an air object to active-passive ones, which provide an increase in the accuracy of solving a coordinate task by dozens of times while maintaining the energy secrecy of a wide-area multi-position observation system. It is shown that the use of active and passive methods for constructing wide-area multi-position observation systems makes it possible to implement goniometric, difference-range, goniometer-range, total-range and goniometer-total-range methods for determining the coordinates of an air object. This increases significantly the number of options for estimating the coordinates of an air object. As a result, it allows improving the quality of information support for users by choosing the optimal method for estimating the coordinates of the observed air objects using various primary measurements of the received signals parameters.
本文研究了广域多位置空域监视在空域管制和空中交通管制系统信息支持中的地位和作用。给出了利用多位置观测中接收信号参数的各种初级测量估计空中目标坐标的方法分类。最后对所考虑的方法确定空中目标坐标的精度进行了定量评价。当使用构建作为非同步网络的二次监视雷达和作为开放单通道排队系统的飞机应答器的原理并为第一个正确接收到的请求信号提供服务时,广域多位置监视系统的能力显着增加。飞机应答者未经授权的请求可以使探测和确定空中目标坐标的方法从完全被动的方法转换为主动被动的方法,在保持广域多位置观测系统能量保密性的同时,将求解坐标任务的精度提高数十倍。研究表明,利用主动和被动方法构建广域多位置观测系统,可以实现角法、差距法、角距法、全距法和角距-全距法确定空中目标的坐标。这大大增加了估算空中物体坐标的选项数量。因此,它可以通过选择使用各种接收信号参数的主要测量来估计观测到的空中物体的坐标的最佳方法,从而提高对用户的信息支持质量。
{"title":"Comparative analysis of methods for determining the air objects’ coordinates using wide-area multilateration systems","authors":"I. Svyd, Valerii V. Semenets, O. Maltsev, M. Tkach, S.V. Starokozhev, O.O. Datsenko, I. Shevtsov","doi":"10.30837/rt.2022.2.209.16","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.16","url":null,"abstract":"The presented work considers the place and role of wide-area multi-position airspace surveillance in the information support of airspace control and air traffic control systems. Classification of methods for estimating the coordinates of air objects using various primary measurements of the parameters of received signals in multi-position observation is given. A quantitative assessment of the accuracy in determining the air objects’ coordinates by the considered methods is also given. The capabilities of wide-area multi-position surveillance systems increase significantly when using the principles of constructing a secondary surveillance radar as a non-synchronous network, and an aircraft responder as an open single-channel queuing system with servicing the first correctly received request signal. An unauthorized request from an aircraft responder makes it possible to switch from completely passive methods for detecting and determining the coordinates of an air object to active-passive ones, which provide an increase in the accuracy of solving a coordinate task by dozens of times while maintaining the energy secrecy of a wide-area multi-position observation system. It is shown that the use of active and passive methods for constructing wide-area multi-position observation systems makes it possible to implement goniometric, difference-range, goniometer-range, total-range and goniometer-total-range methods for determining the coordinates of an air object. This increases significantly the number of options for estimating the coordinates of an air object. As a result, it allows improving the quality of information support for users by choosing the optimal method for estimating the coordinates of the observed air objects using various primary measurements of the received signals parameters.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79054949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of ARX encryption schemes resistance to the integral attack and impracticable differentials attack ARX加密方案抗积分攻击和不可行的微分攻击的分析
IF 0.3 Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.06
V. Ruzhentsev, O. Fediushyn, S. Kokhan
Common ARX (Addition-Rotation-XOR) encryption algorithms are analyzed. These algorithms are Chacha, Speckey, Simon, Chaskey, Sparkle. These algorithms use three basic operations: modular addition, XOR addition, and rotation. 16-bit reduced models of these algorithms are developed, methods of analysis are selected and developed, and the analysis of the resistance of these algorithms to the most effective attacks (integral attack and attack of impossible differentials) for this class of algorithms is performed. According to the selected indicator – the number of elementary operations that is necessary to obtain parameters of random substitution and the absence of impossible differentials and integrals – the most effective ARX algorithms are determined. These are Speckey, which operates on two 8-bit subblocks and requires 36 elementary operations, and Chaskey, which operates on four 4-bit subblocks and requires 72 elementary operations. If we assume that one 8-bit operation is equivalent to two 4-bit operations, then these schemes are equal in terms of the chosen indicator. The worst performers were the 8-bit Simon scheme and the 4-bit ChaCha scheme, which require almost twice as many operations as the best schemes. A conclusion was also made about the importance of using not one, but several XOR operations of key addition for the overall cryptographic strength of ARX algorithms.
分析了常用的ARX (Addition-Rotation-XOR)加密算法。这些算法是Chacha Speckey Simon Chaskey Sparkle。这些算法使用三种基本运算:模加法、异或加法和旋转。开发了这些算法的16位简化模型,选择和开发了分析方法,并分析了这些算法对这类算法最有效的攻击(积分攻击和不可能微分攻击)的抵抗力。根据所选择的指标-获得随机替换参数所需的初等运算次数和不存在不可能的微分和积分-确定最有效的ARX算法。Speckey在两个8位子块上运行,需要36个基本运算;Chaskey在四个4位子块上运行,需要72个基本运算。如果我们假设一个8位操作相当于两个4位操作,那么这些方案在选择的指标方面是相等的。性能最差的是8位的Simon方案和4位的ChaCha方案,它们需要的操作几乎是最佳方案的两倍。还得出结论,对于ARX算法的整体加密强度,使用不是一个,而是多个密钥相加的异或操作的重要性。
{"title":"Analysis of ARX encryption schemes resistance to the integral attack and impracticable differentials attack","authors":"V. Ruzhentsev, O. Fediushyn, S. Kokhan","doi":"10.30837/rt.2021.4.207.06","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.06","url":null,"abstract":"Common ARX (Addition-Rotation-XOR) encryption algorithms are analyzed. These algorithms are Chacha, Speckey, Simon, Chaskey, Sparkle. These algorithms use three basic operations: modular addition, XOR addition, and rotation. 16-bit reduced models of these algorithms are developed, methods of analysis are selected and developed, and the analysis of the resistance of these algorithms to the most effective attacks (integral attack and attack of impossible differentials) for this class of algorithms is performed. According to the selected indicator – the number of elementary operations that is necessary to obtain parameters of random substitution and the absence of impossible differentials and integrals – the most effective ARX algorithms are determined. These are Speckey, which operates on two 8-bit subblocks and requires 36 elementary operations, and Chaskey, which operates on four 4-bit subblocks and requires 72 elementary operations. If we assume that one 8-bit operation is equivalent to two 4-bit operations, then these schemes are equal in terms of the chosen indicator. The worst performers were the 8-bit Simon scheme and the 4-bit ChaCha scheme, which require almost twice as many operations as the best schemes. A conclusion was also made about the importance of using not one, but several XOR operations of key addition for the overall cryptographic strength of ARX algorithms.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72411196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complexing of information channels of UAV detection and observation systems from the statistic solutions theory standpoint 基于统计解理论的无人机探测观测系统信息通道复杂性研究
IF 0.3 Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.11
V. Kartashov, V.O. Pososhenko, V.I. Kolisnyk, A. Kapusta, M. Rybnykov, Y.V. Pershyn, V. Kizka
Currently, unmanned aerial vehicles (UAVs) provide a wide range of useful tasks for humanity, but, on the other hand, they pose a serious threat in economic, military and other areas of human activity. Difficulties in observing UAVs using modern technical means, as well as their relatively low cost, lead to an expansion of the scope of UAVs based illegal actions. Therefore, the protection of various objects against UAVs is a serious scientific and technical task of today. Since the possibilities of the known methods of UAV detection are different, the joint use of systems of different types is realized in practice nowadays, in order to increase the informativeness of the obtained data by their joint (complex) processing. The number of publications in this field is constantly increasing, and considerable attention is paid to integrated systems built on the basis of various physical sensors. However, the efficiency of multi-sensor systems with integrated processing of the output signals of the channels in practice remains insufficient. This article is devoted to the study of methods for the synthesis of new, more efficient algorithms for complexing radar, acoustic, optical and infrared information channels of integrated UAV detection and recognition systems, which are performed from the standpoint of statistical theory of radio system optimization. This approach allows synthesizing the optimal (according to the selected quality criterion) complex information processing system, which ensures obtaining the maximum amount of information from the vector process observed at the inputs of information channels. There shown the possibility of constructing an optimal UAV detector with the use of the late strategy of combining information at the level of decisions made in individual channels of the system.
目前,无人驾驶飞行器(uav)为人类提供了广泛的有用任务,但另一方面,它们在经济、军事和其他人类活动领域构成了严重威胁。利用现代技术手段观察无人机的困难,以及它们相对较低的成本,导致无人机非法行为的范围扩大。因此,保护各种物体免受无人机攻击是当今一项严肃的科学技术任务。由于已知的无人机探测方法的可能性不同,目前在实践中实现了不同类型系统的联合使用,通过对所获得数据的联合(复杂)处理来增加数据的信息量。该领域的出版物数量不断增加,在各种物理传感器的基础上构建的集成系统受到了相当大的关注。然而,在实际应用中,对各通道输出信号进行综合处理的多传感器系统的效率仍然不足。本文从无线电系统优化统计理论的角度出发,研究了综合无人机探测识别系统中雷达、声、光、红外信息通道复杂化的新型、高效算法的合成方法。该方法允许合成最优(根据选定的质量标准)复杂信息处理系统,确保从信息通道输入处观察到的矢量过程中获得最大数量的信息。显示了使用在系统的各个通道中做出决策的级别上组合信息的后期策略构建最佳UAV探测器的可能性。
{"title":"Complexing of information channels of UAV detection and observation systems from the statistic solutions theory standpoint","authors":"V. Kartashov, V.O. Pososhenko, V.I. Kolisnyk, A. Kapusta, M. Rybnykov, Y.V. Pershyn, V. Kizka","doi":"10.30837/rt.2021.4.207.11","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.11","url":null,"abstract":"Currently, unmanned aerial vehicles (UAVs) provide a wide range of useful tasks for humanity, but, on the other hand, they pose a serious threat in economic, military and other areas of human activity. Difficulties in observing UAVs using modern technical means, as well as their relatively low cost, lead to an expansion of the scope of UAVs based illegal actions. Therefore, the protection of various objects against UAVs is a serious scientific and technical task of today. \u0000Since the possibilities of the known methods of UAV detection are different, the joint use of systems of different types is realized in practice nowadays, in order to increase the informativeness of the obtained data by their joint (complex) processing. \u0000The number of publications in this field is constantly increasing, and considerable attention is paid to integrated systems built on the basis of various physical sensors. However, the efficiency of multi-sensor systems with integrated processing of the output signals of the channels in practice remains insufficient. \u0000This article is devoted to the study of methods for the synthesis of new, more efficient algorithms for complexing radar, acoustic, optical and infrared information channels of integrated UAV detection and recognition systems, which are performed from the standpoint of statistical theory of radio system optimization. \u0000This approach allows synthesizing the optimal (according to the selected quality criterion) complex information processing system, which ensures obtaining the maximum amount of information from the vector process observed at the inputs of information channels. There shown the possibility of constructing an optimal UAV detector with the use of the late strategy of combining information at the level of decisions made in individual channels of the system.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78055613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Substantiation and proposals for the selection, improvement and standardization of the post-quantum electronic signature mechanism at the national and international levels 国家和国际层面后量子电子签名机制选择、完善和标准化的实证与建议
IF 0.3 Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.01
I. Gorbenko, O. Kachko, O. Potii, Y. Gorbenko, V. Ponomar, M. Yesina, I. V. Stelnik, S.O. Kandiy, К.O. Kuznetsova
At present and in the future, mathematical methods, mechanisms and algorithms of standardized asymmetric cryptotransformations such as electronic signature (ES) are and will be used for information cryptographic protection. Electronic signature is the main and essential component of cybersecurity, in terms of providing quality information security services such as integrity, irresistibility and authenticity of information and data processed. However, there are well-founded suspicions that in the post-quantum period the existing ES standards will be broken and compromised using classical and quantum cryptanalytic systems with appropriate mathematical, software and hardware-software. An analysis was performed, which confirms that quantum computers have already been developed, manufactured and used. It is believed that the actual state of development and use of powerful quantum computers and their mathematical and software is obviously strictly confidential and secure, and only publicly known data on quantum computers and their applications in cryptology are disclosed. A preliminary analysis has been carried out showing that in Ukraine there is an understanding of the existence of threats to cybersecurity and information security in the case of using available standardized ES in the transition and post-quantum periods. Currently, development and adoption of post-quantum ES standards is also one of the main issues in ensuring the necessary levels of security in the transition and post-quantum periods. The objective of this article is to substantiate, compare alternatives and develop proposals for the selection and standardization of post-quantum ES standards at the international and national levels, taking into account the results of the 2nd and 3rd rounds of the NIST US competition and national researches.
目前和将来,标准化的非对称密码转换(如电子签名(ES))的数学方法、机制和算法已经并将用于信息密码保护。电子签名是网络安全的主要和必不可少的组成部分,可以提供所处理的信息和数据的完整性、不可抗拒性和真实性等优质信息安全服务。然而,有充分的理由怀疑,在后量子时期,现有的ES标准将被打破和破坏,使用经典和量子密码分析系统与适当的数学,软件和硬件软件。一项分析证实,量子计算机已经被开发、制造和使用。人们认为,强大的量子计算机及其数学和软件的开发和使用的实际状态显然是严格保密和安全的,只有公开的量子计算机及其在密码学中的应用数据才会被披露。初步分析表明,在乌克兰,在过渡和后量子时期使用可用的标准化ES的情况下,存在对网络安全和信息安全的威胁。目前,制定和采用后量子ES标准也是确保过渡和后量子时期必要的安全水平的主要问题之一。本文的目的是考虑到第二轮和第三轮NIST美国竞赛和国家研究的结果,为国际和国家层面的后量子ES标准的选择和标准化提供证据,比较替代方案并提出建议。
{"title":"Substantiation and proposals for the selection, improvement and standardization of the post-quantum electronic signature mechanism at the national and international levels","authors":"I. Gorbenko, O. Kachko, O. Potii, Y. Gorbenko, V. Ponomar, M. Yesina, I. V. Stelnik, S.O. Kandiy, К.O. Kuznetsova","doi":"10.30837/rt.2021.4.207.01","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.01","url":null,"abstract":"At present and in the future, mathematical methods, mechanisms and algorithms of standardized asymmetric cryptotransformations such as electronic signature (ES) are and will be used for information cryptographic protection. Electronic signature is the main and essential component of cybersecurity, in terms of providing quality information security services such as integrity, irresistibility and authenticity of information and data processed. However, there are well-founded suspicions that in the post-quantum period the existing ES standards will be broken and compromised using classical and quantum cryptanalytic systems with appropriate mathematical, software and hardware-software. An analysis was performed, which confirms that quantum computers have already been developed, manufactured and used. It is believed that the actual state of development and use of powerful quantum computers and their mathematical and software is obviously strictly confidential and secure, and only publicly known data on quantum computers and their applications in cryptology are disclosed. A preliminary analysis has been carried out showing that in Ukraine there is an understanding of the existence of threats to cybersecurity and information security in the case of using available standardized ES in the transition and post-quantum periods. Currently, development and adoption of post-quantum ES standards is also one of the main issues in ensuring the necessary levels of security in the transition and post-quantum periods. The objective of this article is to substantiate, compare alternatives and develop proposals for the selection and standardization of post-quantum ES standards at the international and national levels, taking into account the results of the 2nd and 3rd rounds of the NIST US competition and national researches.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75318333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengths and weaknesses of the algorithm based on multidimensional rainbow transformations and its ability to block attacks by third party channel 基于多维彩虹变换的算法优缺点及其对第三方信道攻击的阻断能力
IF 0.3 Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.07
D. Harmash
The paper considers the analysis of the essence and possibilities to protect the Rainbow post-quantum cryptographic algorithm. The main properties of algorithms based on multidimensional quadratic transformations are considered. Mathematical schemes and operations used by the Rainbow algorithm are given. The perspective of using algorithms based on multidimensional quadratic transformations in post-quantum time is estimated. An estimate of what resources and computing energy are required for the successful use of algorithms based on multidimensional quadratic transformations is given. The main positive aspects of the algorithm and its weaknesses are outlined. Analyzes are given regarding the ability of the algorithm to protect against attack by third-party channels.
本文分析了彩虹后量子密码算法的本质和保护的可能性。考虑了基于多维二次变换的算法的主要性质。给出了彩虹算法的数学方案和操作。展望了基于多维二次变换的后量子时间算法的应用前景。给出了成功使用基于多维二次变换的算法所需的资源和计算能量的估计。概述了该算法的主要优点和缺点。分析了该算法抵御第三方信道攻击的能力。
{"title":"Strengths and weaknesses of the algorithm based on multidimensional rainbow transformations and its ability to block attacks by third party channel","authors":"D. Harmash","doi":"10.30837/rt.2021.4.207.07","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.07","url":null,"abstract":"The paper considers the analysis of the essence and possibilities to protect the Rainbow post-quantum cryptographic algorithm. The main properties of algorithms based on multidimensional quadratic transformations are considered. Mathematical schemes and operations used by the Rainbow algorithm are given. The perspective of using algorithms based on multidimensional quadratic transformations in post-quantum time is estimated. An estimate of what resources and computing energy are required for the successful use of algorithms based on multidimensional quadratic transformations is given. The main positive aspects of the algorithm and its weaknesses are outlined. Analyzes are given regarding the ability of the algorithm to protect against attack by third-party channels.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72551262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical foundations for constructing effective codewords for the code-controlled information embedding steganographic method 为码控信息嵌入隐写方法构造有效码字的理论基础
IF 0.3 Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.02
A. Kobozeva, A. Sokolov
Steganography is an important component of modern information security systems. At the same time, in the conditions of modern cyberspace, it is relevant to develop high-performance steganographic methods that would have a high level of resistance to possible attacks by compression, noise, and blur. One of such methods is the steganographic method with code-controlled information embedding, based on the idea of preliminary coding of the information being embedded using binary codewords, for which the transformants of the Walsh-Hadamard transform have the specified properties. A specific localization of disturbances in the Walsh-Hadamard transform domain of the container takes place because of the information embedding. In this paper, a theoretical basis has been formed for further improvement of the codewords used in the code-controlled information embedding steganographic method. It is shown that despite the fact that these codewords have an ideal effect only on a given transformant of the Walsh-Hadamard transform, they affect several transformants at once in the domain of the discrete cosine transform (DCT). The concept of the selectivity coefficient is introduced to estimate the level of selectivity of the impact on a given DCT transformant. It has been established that with an increase in the size of the blocks used, a tendency is observed to a decrease in the selectivity coefficient due to the presence of the “close neighbor” effect. This trend is conditioned by the involvement of the DCT transformants with similar frequencies that have similar resistance to possible attacks on the embedded message. In this case, the ratio of the sum of absolute values of low-frequency DCT transformants to the sum of absolute values of all other DCT transformants increases with the size of the codeword. In this paper it has been proven and practically confirmed that an increase in the size of a codeword leads to an increase in the resistance of the code-controlled information embedding steganographic method. Possible ways of further practical improvement of codewords used in the code-controlled information embedding steganographic method are theoretically substantiated.
隐写技术是现代信息安全系统的重要组成部分。与此同时,在现代网络空间的条件下,开发高性能的隐写方法是相关的,这种方法可以对可能的压缩、噪声和模糊攻击具有高水平的抵抗力。其中一种方法是编码控制信息嵌入的隐写方法,它基于用二进制码字对嵌入的信息进行初步编码的思想,其中沃尔什-阿达玛变换的变换具有特定的性质。由于信息嵌入,干扰在容器的Walsh-Hadamard变换域中有特定的定位。本文为进一步改进码控信息嵌入隐写方法中使用的码字奠定了理论基础。结果表明,尽管这些码字仅对Walsh-Hadamard变换的一个给定变换具有理想的效果,但它们在离散余弦变换(DCT)域中同时影响多个变换。引入了选择性系数的概念来估计对给定DCT变换的影响的选择性程度。由于“近邻”效应的存在,随着所用块体尺寸的增加,观察到选择性系数有下降的趋势。这种趋势是由具有相似频率的DCT变换的参与所决定的,这些变换对嵌入信息的可能攻击具有相似的抵抗力。在这种情况下,低频DCT变换的绝对值之和与所有其他DCT变换的绝对值之和的比值随着码字的大小而增加。本文证明并实际证实了码字长度的增加会导致码控信息嵌入隐写方法的抗扰性增加。从理论上论证了进一步改进码控信息嵌入隐写方法中码字的可行方法。
{"title":"Theoretical foundations for constructing effective codewords for the code-controlled information embedding steganographic method","authors":"A. Kobozeva, A. Sokolov","doi":"10.30837/rt.2021.4.207.02","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.02","url":null,"abstract":"Steganography is an important component of modern information security systems. At the same time, in the conditions of modern cyberspace, it is relevant to develop high-performance steganographic methods that would have a high level of resistance to possible attacks by compression, noise, and blur. One of such methods is the steganographic method with code-controlled information embedding, based on the idea of preliminary coding of the information being embedded using binary codewords, for which the transformants of the Walsh-Hadamard transform have the specified properties. A specific localization of disturbances in the Walsh-Hadamard transform domain of the container takes place because of the information embedding. In this paper, a theoretical basis has been formed for further improvement of the codewords used in the code-controlled information embedding steganographic method. It is shown that despite the fact that these codewords have an ideal effect only on a given transformant of the Walsh-Hadamard transform, they affect several transformants at once in the domain of the discrete cosine transform (DCT). The concept of the selectivity coefficient is introduced to estimate the level of selectivity of the impact on a given DCT transformant. It has been established that with an increase in the size of the blocks used, a tendency is observed to a decrease in the selectivity coefficient due to the presence of the “close neighbor” effect. This trend is conditioned by the involvement of the DCT transformants with similar frequencies that have similar resistance to possible attacks on the embedded message. In this case, the ratio of the sum of absolute values of low-frequency DCT transformants to the sum of absolute values of all other DCT transformants increases with the size of the codeword. In this paper it has been proven and practically confirmed that an increase in the size of a codeword leads to an increase in the resistance of the code-controlled information embedding steganographic method. Possible ways of further practical improvement of codewords used in the code-controlled information embedding steganographic method are theoretically substantiated.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84050343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software quality model based on SQuaRE standards 基于SQuaRE标准的软件质量模型
IF 0.3 Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.17
N. Shtefan, O. Zaporozhets
Quality is one of the factors that ensure the commercial success and safety of using the software. Quality is understood as conformity the explicit and implicit requirements of various stakeholders. It is necessary to ensure a joint understanding between developers and users, engineers need to understand the meaning of the concept of quality, characteristics and importance of quality for the developed or maintained software. Measurements are the basis for quality assurance. They are the main tool for managing the life cycle of software products, assessing the implementation of plans and monitoring. To quantify quality, it is necessary to measure the characteristics of the software. Standardization provides unification of requirements for quality, its measurement and assessment. The use of standards has many potential benefits for any organization, especially in key areas such as measuring the quality of software products, information and measurement systems. Recognized international standards organizations have published the ISO/IEC 25000 series of standards for systems and software quality requirements and evaluation SQuaRE, which is gaining widespread practical application. The paper discusses a series of international standards SQuaRE, analyzes the relationship between the quality model, quality characteristics, quality measures and a new concept – a quality measure element of the software, presents the measurement of quality based on these standards.
质量是保证商业成功和安全使用软件的因素之一。质量被理解为各种利益相关者的显性和隐性需求的一致性。确保开发人员和用户之间的共同理解是必要的,工程师需要理解质量概念的含义、特征和质量对开发或维护的软件的重要性。测量是质量保证的基础。它们是管理软件产品生命周期、评估计划实施和监控的主要工具。为了量化质量,有必要度量软件的特性。标准化提供了质量、测量和评价要求的统一。标准的使用对任何组织都有许多潜在的好处,特别是在关键领域,如测量软件产品、信息和测量系统的质量。国际公认的标准组织已经发布了ISO/IEC 25000系列系统和软件质量要求和评价标准SQuaRE,并得到了广泛的实际应用。本文讨论了一系列国际标准SQuaRE,分析了质量模型、质量特征、质量度量与软件质量度量元素的关系,提出了基于这些标准的质量度量方法。
{"title":"Software quality model based on SQuaRE standards","authors":"N. Shtefan, O. Zaporozhets","doi":"10.30837/rt.2021.4.207.17","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.17","url":null,"abstract":"Quality is one of the factors that ensure the commercial success and safety of using the software. Quality is understood as conformity the explicit and implicit requirements of various stakeholders. It is necessary to ensure a joint understanding between developers and users, engineers need to understand the meaning of the concept of quality, characteristics and importance of quality for the developed or maintained software. Measurements are the basis for quality assurance. They are the main tool for managing the life cycle of software products, assessing the implementation of plans and monitoring. To quantify quality, it is necessary to measure the characteristics of the software. Standardization provides unification of requirements for quality, its measurement and assessment. The use of standards has many potential benefits for any organization, especially in key areas such as measuring the quality of software products, information and measurement systems. Recognized international standards organizations have published the ISO/IEC 25000 series of standards for systems and software quality requirements and evaluation SQuaRE, which is gaining widespread practical application. The paper discusses a series of international standards SQuaRE, analyzes the relationship between the quality model, quality characteristics, quality measures and a new concept – a quality measure element of the software, presents the measurement of quality based on these standards.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80023955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operational control of the parameters of liquid fuels and lubricants with impurities 含杂质液体燃料和润滑油参数的操作控制
IF 0.3 Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.18
B.V. Zhukov, S.I. Borbulev, A. Odnovol
The possibilities of operational control of the parameters of liquid fuels and lubricants with impurities using the resonator method of microwave dielectrometry are considered. Preliminary studies of liquid fuels and lubricants (gasolines, diesel fuels, kerosene, oils) showed that the values ​​of the real and imaginary components of the complex dielectric constant of the listed fuels and lubricants are in the operating range of the resonator microwave dielectrometer. The high resolution of the microwave resonator method determines the prospects of using this method for analyzing the complex dielectric constant of mixtures of fuels and lubricants with various impurities, including water, alcohols, benzene, etc. For a mixture of gasoline with benzene, it was experimentally established that with a small addition of benzene (no more than 15%), an increase in the real component of the complex dielectric constant of the mixture is observed, and with a benzene content exceeding 15%, an increase in both components of the complex dielectric constant of the mixture takes place. The process has also been installed, but the NHF dielectrometer has made it possible to identify the transformer in real time due to the presence of water in the amount of 14, 28 and 56 grams per ton of oil. The research results indicate that the microwave dielectrometry method can be considered promising for monitoring the quality of transformer oil both during the filling process and for monitoring its quality during the operation of high-voltage transformers. The results of the initial stage of research on alcohol gasolines have not yet revealed the predominant effect of the alcohol additive on the location of the experimental points on the complex plane. This circumstance is most likely due to the fact that alcohol gasolines with a close octane number can have a significantly different chemical composition.
讨论了用微波介质测量的谐振腔方法对含杂质液体燃料和润滑油的参数进行操作控制的可能性。对液体燃料和润滑油(汽油、柴油、煤油、机油)的初步研究表明,所列燃料和润滑油复介电常数的实虚分量值均在谐振腔微波介电计的工作范围内。微波谐振器方法的高分辨率决定了用该方法分析含有水、醇、苯等各种杂质的燃料和润滑油混合物的复介电常数的前景。对于汽油与苯的混合物,通过实验确定,当苯的添加量很小(不超过15%)时,混合物的复介电常数实分量增加,当苯的含量超过15%时,混合物的复介电常数两个分量都增加。该过程也已安装,但由于每吨油中存在14克、28克和56克的水,NHF介电计使实时识别变压器成为可能。研究结果表明,微波介电法在高压变压器充注过程和运行过程中均可用于变压器油质量监测。酒精汽油的初步研究结果尚未揭示酒精添加剂对复合平面上实验点位置的主要影响。这种情况很可能是由于辛烷值相近的酒精汽油具有明显不同的化学成分。
{"title":"Operational control of the parameters of liquid fuels and lubricants with impurities","authors":"B.V. Zhukov, S.I. Borbulev, A. Odnovol","doi":"10.30837/rt.2021.4.207.18","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.18","url":null,"abstract":"The possibilities of operational control of the parameters of liquid fuels and lubricants with impurities using the resonator method of microwave dielectrometry are considered. Preliminary studies of liquid fuels and lubricants (gasolines, diesel fuels, kerosene, oils) showed that the values ​​of the real and imaginary components of the complex dielectric constant of the listed fuels and lubricants are in the operating range of the resonator microwave dielectrometer. \u0000The high resolution of the microwave resonator method determines the prospects of using this method for analyzing the complex dielectric constant of mixtures of fuels and lubricants with various impurities, including water, alcohols, benzene, etc. \u0000For a mixture of gasoline with benzene, it was experimentally established that with a small addition of benzene (no more than 15%), an increase in the real component of the complex dielectric constant of the mixture is observed, and with a benzene content exceeding 15%, an increase in both components of the complex dielectric constant of the mixture takes place. \u0000The process has also been installed, but the NHF dielectrometer has made it possible to identify the transformer in real time due to the presence of water in the amount of 14, 28 and 56 grams per ton of oil. The research results indicate that the microwave dielectrometry method can be considered promising for monitoring the quality of transformer oil both during the filling process and for monitoring its quality during the operation of high-voltage transformers. \u0000The results of the initial stage of research on alcohol gasolines have not yet revealed the predominant effect of the alcohol additive on the location of the experimental points on the complex plane. This circumstance is most likely due to the fact that alcohol gasolines with a close octane number can have a significantly different chemical composition.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90620478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Specific features of immunity control of survey radar under its suppression by active interference and interfering information effects 测量雷达在有源干扰和干扰信息抑制下的抗扰度控制特点
IF 0.3 Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.10
V. Kantsedal, А.A. Mogyla
The features of goal-setting control while ensuring the information stability of the sounding modes of a surveillance radar when it is suppressed by active interference and interfering information influences are considered. Overcoming the complexity of goal-setting processes, the validity and efficiency of decision-making with a shortage of time for its adoption is associated with insuring the consistency of goal-setting processes, increasing the levels of their intellectualization and formalization. This will contribute to imparting the desired properties, synthesized during the conflict, to the multipurpose strategies and the situational law of the control of the REP processes and the coordination of actions. An increase in the level of intellectualization of goal-setting processes is ensured by: - decomposition of the general goal-setting problem into separate, simpler subtasks with effective solutions, implemented in the corresponding subsystems of the ACSstab (or basic associations of its functional elements) at stages of information support, preparation, adoption and implementation of the decision  at the stages of hierarchical levels of management; - cognitive analysis of goals and reflexive synthesis of goal-setting processes using the capabilities of a specialized intelligent decision support system to enhance the creative-reflexive abilities of the subject of management and increase the level of his professional competencies; - combining the universality of the stages of rational management of the synthesis of the strategy for managing the REP processes with the specifics of conflict situations, subjectivity, cognition and reflexivity nature of intellectual control. Methods and means for partial formalization of goal-setting processes are presented, when the structuring of the main goal is carried out taking into account belonging to the strategies of internal and external control of the REP, the decomposition of the two-sided dynamic model of the conflict between the systems of the RES complex and the radar, the hierarchy of management levels, various approaches applied to goal-setting in a crisis management, as well as methods of justifying goals, resource costs and control of achieving the goals. These features can significantly reduce the degree of subjectivity of management for goal-setting and achieve their validity, completeness, consistency.
考虑了监视雷达探测模式在受到有源干扰和干扰信息影响的情况下,在保证探测模式信息稳定性的同时进行目标设定控制的特点。克服目标制定过程的复杂性,保证目标制定过程的一致性,提高目标制定过程的智能化和形式化水平,是解决决策实施时间不足问题的有效途径。这将有助于赋予在冲突中综合的期望属性,以多目的策略和REP过程控制和行动协调的情境规律。目标设定过程的智能化水平的提高是通过以下方式保证的:-将一般目标设定问题分解为具有有效解决方案的单独的、更简单的子任务,在ACSstab的相应子系统(或其功能要素的基本关联)中在信息支持、准备、采用和执行决策的层次管理阶段实施;-利用专业智能决策支持系统的能力,对目标进行认知分析和目标设定过程的反射性综合,以增强管理主体的创造性反射能力,提高其专业能力水平;-将管理REP过程战略综合的理性管理阶段的普遍性与智力控制的冲突情况、主观性、认知性和反身性的特殊性相结合。本文提出了目标设定过程部分形式化的方法和手段,在进行主要目标的构建时,考虑到属于REP的内部和外部控制策略,RES复杂系统与雷达之间冲突的双边动态模型的分解,管理层次的层次结构,在危机管理中应用于目标设定的各种方法以及证明目标的方法。实现目标的资源成本和控制。这些特征可以显著降低目标设定管理的主观性,实现目标设定的有效性、完整性、一致性。
{"title":"Specific features of immunity control of survey radar under its suppression by active interference and interfering information effects","authors":"V. Kantsedal, А.A. Mogyla","doi":"10.30837/rt.2021.4.207.10","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.10","url":null,"abstract":"The features of goal-setting control while ensuring the information stability of the sounding modes of a surveillance radar when it is suppressed by active interference and interfering information influences are considered. Overcoming the complexity of goal-setting processes, the validity and efficiency of decision-making with a shortage of time for its adoption is associated with insuring the consistency of goal-setting processes, increasing the levels of their intellectualization and formalization. This will contribute to imparting the desired properties, synthesized during the conflict, to the multipurpose strategies and the situational law of the control of the REP processes and the coordination of actions. \u0000An increase in the level of intellectualization of goal-setting processes is ensured by: \u0000- decomposition of the general goal-setting problem into separate, simpler subtasks with effective solutions, implemented in the corresponding subsystems of the ACSstab (or basic associations of its functional elements) at stages of information support, preparation, adoption and implementation of the decision  at the stages of hierarchical levels of management; \u0000- cognitive analysis of goals and reflexive synthesis of goal-setting processes using the capabilities of a specialized intelligent decision support system to enhance the creative-reflexive abilities of the subject of management and increase the level of his professional competencies; \u0000- combining the universality of the stages of rational management of the synthesis of the strategy for managing the REP processes with the specifics of conflict situations, subjectivity, cognition and reflexivity nature of intellectual control. \u0000Methods and means for partial formalization of goal-setting processes are presented, when the structuring of the main goal is carried out taking into account belonging to the strategies of internal and external control of the REP, the decomposition of the two-sided dynamic model of the conflict between the systems of the RES complex and the radar, the hierarchy of management levels, various approaches applied to goal-setting in a crisis management, as well as methods of justifying goals, resource costs and control of achieving the goals. \u0000These features can significantly reduce the degree of subjectivity of management for goal-setting and achieve their validity, completeness, consistency.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89481479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of ways to increase stability of cryptographic algorithms on algebraic lattices against time attacks 代数格上提高密码算法抗时间攻击稳定性的方法分析
IF 0.3 Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.05
О.E. Petrenko, О.S. Petrenko, Оleksand Sievierinov, О.І. Fiediushyn, А.V. Zubrych, D.V. Shcherbina
The aim of this work is to study the algorithms, the stability of which is based on the search for a short lattice vector, as well as to obtain time-resistant parameters of these algorithms. Existing methods for generating keys and choosing parameters for cryptographic transformations on algebraic lattices resistant to time attacks are considered. It is shown that the uniform distribution of coefficients for generating the NTRU algorithm keys has certain shortages, namely, a limited number of parameters suitable for use in cryptographical transformations. This is due to the vulnerability of this algorithm to time attacks. The possibility of using a discrete normal (Gaussian) distribution to form a key pair, which will prevent the sensitivity of the algorithm to time attacks, is considered. This method of generation requires checking the obtained sample for compliance with the properties of the normal distribution. The usage of SAGA tests has been proposed. They make it possible to check the Gaussian samples obtained using the discrete normal distribution. The verification result shows whether or not the sample has properties that are inherent in the normal distribution. The application of the SAGA statistical tests to the NTRU cryptographic transformation polynomials allowed us to conclude that the discrete Gaussian sample makes it possible to generate time-resistant parameters using the norm or the length of the short basis (vector) of the lattice as the mean-square deviation.
本工作的目的是研究这些算法的稳定性,这些算法的稳定性是基于对短晶格向量的搜索,并获得这些算法的抗时参数。考虑了现有的抗时间攻击代数格上密码变换的密钥生成和参数选择方法。结果表明,用于生成NTRU算法密钥的系数均匀分布存在一定的不足,即适合用于密码变换的参数数量有限。这是由于该算法容易受到时间攻击。考虑了使用离散正态(高斯)分布形成密钥对的可能性,这将防止算法对时间攻击的敏感性。这种生成方法需要检查得到的样本是否符合正态分布的性质。提出了SAGA试验的使用方法。它们使检验使用离散正态分布得到的高斯样本成为可能。验证结果表明样品是否具有正态分布固有的性质。SAGA统计测试对NTRU密码变换多项式的应用使我们能够得出这样的结论:离散高斯样本可以使用格的范数或短基(向量)的长度作为均方差来生成抗时间参数。
{"title":"Analysis of ways to increase stability of cryptographic algorithms on algebraic lattices against time attacks","authors":"О.E. Petrenko, О.S. Petrenko, Оleksand Sievierinov, О.І. Fiediushyn, А.V. Zubrych, D.V. Shcherbina","doi":"10.30837/rt.2021.4.207.05","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.05","url":null,"abstract":"The aim of this work is to study the algorithms, the stability of which is based on the search for a short lattice vector, as well as to obtain time-resistant parameters of these algorithms. Existing methods for generating keys and choosing parameters for cryptographic transformations on algebraic lattices resistant to time attacks are considered. It is shown that the uniform distribution of coefficients for generating the NTRU algorithm keys has certain shortages, namely, a limited number of parameters suitable for use in cryptographical transformations. This is due to the vulnerability of this algorithm to time attacks. The possibility of using a discrete normal (Gaussian) distribution to form a key pair, which will prevent the sensitivity of the algorithm to time attacks, is considered. This method of generation requires checking the obtained sample for compliance with the properties of the normal distribution. The usage of SAGA tests has been proposed. They make it possible to check the Gaussian samples obtained using the discrete normal distribution. The verification result shows whether or not the sample has properties that are inherent in the normal distribution. The application of the SAGA statistical tests to the NTRU cryptographic transformation polynomials allowed us to conclude that the discrete Gaussian sample makes it possible to generate time-resistant parameters using the norm or the length of the short basis (vector) of the lattice as the mean-square deviation.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80938753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1