首页 > 最新文献

Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia最新文献

英文 中文
Evaluation of radar image processing efficiency based on intelligent analysis of processes 基于过程智能分析的雷达图像处理效率评价
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.09
V. Zhyrnov, S. Solonskaya, I. Shubin
The paper presents results of development of the method and experimental studies of the system for automatic detection of radar signals of aerial objects and their recognition with the processing of real records in surveillance radars. The relevance of this work consists in creation of algorithms for automatic information processing to ensure effective detection of useful signals due to accumulation of signal (energy) and semantic information. The method is based on the definition of semantic components at the stage of formation and analysis of the symbolic model of signals from point and extended air objects. Signal information is described by the predicate function of process knowledge of the formation and analysis of a symbolic model of a burst of impulse signals from point-like mobile aircraft such as an airplane, a helicopter, a UAV, and from extended atmospheric formations such as angel-echoes, clouds. As a result of semantic analysis of symbolic images of signal marks, classification distinctive features of air objects were obtained. The semantic components of the decision-making algorithm, similar to the decision-making algorithms used by the operator, have been investigated. In the developed algorithm, signal information is described by a predicate function on the set of signal mark pulse amplitudes that have exceeded a certain threshold value. Recognizing of aerial objects is carried out by solving the developed equations of predicate operations. The verification of the developed method was carried out on real data obtained on a survey radar of the centimeter range (pulse duration was 1 μs, probing frequency wass 365 Hz, survey period was 10 s). Based on these data, the types of characteristic marks of radar signals are modeled. According to the results of the experiments, they were all correctly identified.
本文介绍了监控雷达对空中目标雷达信号的自动检测及实录处理识别系统的开发方法和实验研究成果。这项工作的相关性在于创建自动信息处理算法,以确保由于信号(能量)和语义信息的积累而有效检测有用的信号。该方法基于在形成阶段对语义成分的定义和对点和扩展空中物体信号符号模型的分析。信号信息通过过程知识的谓词函数来描述,并对来自点状移动飞行器(如飞机、直升机、无人机)和来自扩展的大气结构(如天使回波、云)的脉冲信号突发的符号模型进行分析。通过对信号标记符号图像的语义分析,得到了空中目标的分类特征。研究了决策算法的语义成分,类似于算子使用的决策算法。在所开发的算法中,信号信息由超过一定阈值的信号标记脉冲幅值集合上的谓词函数来描述。空中目标的识别是通过求解已开发的谓词运算方程来实现的。利用厘米级测量雷达(脉冲持续时间为1 μs,探测频率为365 Hz,测量周期为10 s)的实际数据对所提出的方法进行了验证,并在此基础上建立了雷达信号特征标记类型的模型。根据实验结果,它们都被正确地识别出来了。
{"title":"Evaluation of radar image processing efficiency based on intelligent analysis of processes","authors":"V. Zhyrnov, S. Solonskaya, I. Shubin","doi":"10.30837/rt.2021.4.207.09","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.09","url":null,"abstract":"The paper presents results of development of the method and experimental studies of the system for automatic detection of radar signals of aerial objects and their recognition with the processing of real records in surveillance radars. The relevance of this work consists in creation of algorithms for automatic information processing to ensure effective detection of useful signals due to accumulation of signal (energy) and semantic information. The method is based on the definition of semantic components at the stage of formation and analysis of the symbolic model of signals from point and extended air objects. Signal information is described by the predicate function of process knowledge of the formation and analysis of a symbolic model of a burst of impulse signals from point-like mobile aircraft such as an airplane, a helicopter, a UAV, and from extended atmospheric formations such as angel-echoes, clouds. As a result of semantic analysis of symbolic images of signal marks, classification distinctive features of air objects were obtained. The semantic components of the decision-making algorithm, similar to the decision-making algorithms used by the operator, have been investigated. In the developed algorithm, signal information is described by a predicate function on the set of signal mark pulse amplitudes that have exceeded a certain threshold value. Recognizing of aerial objects is carried out by solving the developed equations of predicate operations. The verification of the developed method was carried out on real data obtained on a survey radar of the centimeter range (pulse duration was 1 μs, probing frequency wass 365 Hz, survey period was 10 s). Based on these data, the types of characteristic marks of radar signals are modeled. According to the results of the experiments, they were all correctly identified.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"20 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73878336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of radar signals scattered by acoustic disturbances generated by UAVs 探测由无人机产生的声干扰散射的雷达信号
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.12
V. Kartashov, V.A. Pososhenko, V. Kolesnik, I.S. Seleznjov, R.I. Bobnev, A. Kapusta
The problem of UAV radar monitoring by its acoustic radiation is considered. It is shown that in a number of practical cases such an approach is preferable to observation by radar methods directly from the UAV airframe. It is noted that the radio signals scattered by acoustic packets from the UAV are characterized by an unknown in advance complex envelope, which does not allow the use of optimal filtering methods for their detection and estimation. It is shown that to solve these problems, it is advisable to use the principle of accumulation over the observation interval of the energy of a narrow-band random process reduced to the noise dispersion, using the statistical differences between noise fluctuations and the additive "signal-plus-noise" mixture. It is shown that the energy estimate reduced to noise has either a central or an off-center "chi-square" distribution with a certain number of degrees of freedom and an off-center parameter greater than or equal to zero. As a result of comparing the current value of the no centrality parameter with the threshold value, a decision is made on the presence or absence of a useful signal in the observation interval with minimal a priori information about its parameters. It is noted that the well-known expressions for the differential probability densities of the central and non-central chi-square distributions allow one to obtain qualitative estimates of the synthesized detector. A practical structural diagram of a detector using processing of received oscillations in quadrature channels is proposed.
研究了利用声辐射对无人机雷达进行监测的问题。结果表明,在许多实际情况下,这种方法比直接从无人机机身上使用雷达方法进行观测更可取。值得注意的是,由来自无人机的声包散射的无线电信号具有未知的预先复杂包络的特征,这不允许使用最佳滤波方法进行它们的检测和估计。为了解决这些问题,可以利用噪声波动和加性“信加噪声”混合的统计差异,将窄带随机过程的能量在观测区间内的积累原理简化为噪声色散。结果表明,降噪后的能量估计具有中心或偏离中心的“卡方”分布,具有一定数量的自由度,偏离中心参数大于或等于零。通过将无中心性参数的当前值与阈值进行比较,可以在最小的参数先验信息的情况下,对观测区间内有用信号的存在与否做出判断。值得注意的是,众所周知的中心和非中心卡方分布的微分概率密度表达式允许人们获得合成检测器的定性估计。提出了一种利用正交信道接收振荡处理的检测器的实用结构图。
{"title":"Detection of radar signals scattered by acoustic disturbances generated by UAVs","authors":"V. Kartashov, V.A. Pososhenko, V. Kolesnik, I.S. Seleznjov, R.I. Bobnev, A. Kapusta","doi":"10.30837/rt.2021.4.207.12","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.12","url":null,"abstract":"The problem of UAV radar monitoring by its acoustic radiation is considered. It is shown that in a number of practical cases such an approach is preferable to observation by radar methods directly from the UAV airframe. It is noted that the radio signals scattered by acoustic packets from the UAV are characterized by an unknown in advance complex envelope, which does not allow the use of optimal filtering methods for their detection and estimation. It is shown that to solve these problems, it is advisable to use the principle of accumulation over the observation interval of the energy of a narrow-band random process reduced to the noise dispersion, using the statistical differences between noise fluctuations and the additive \"signal-plus-noise\" mixture. It is shown that the energy estimate reduced to noise has either a central or an off-center \"chi-square\" distribution with a certain number of degrees of freedom and an off-center parameter greater than or equal to zero. As a result of comparing the current value of the no centrality parameter with the threshold value, a decision is made on the presence or absence of a useful signal in the observation interval with minimal a priori information about its parameters. It is noted that the well-known expressions for the differential probability densities of the central and non-central chi-square distributions allow one to obtain qualitative estimates of the synthesized detector. A practical structural diagram of a detector using processing of received oscillations in quadrature channels is proposed.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"5 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90889611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The use of non-steady state noise interferences to counteract passive eavesdropping devices 利用非稳态噪声干扰来抵消无源窃听装置
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.14
S. P. Serhiienko, V. Krizhanovski, D. Chernov, L. Zagoruiko
The use of noise interference has become a common practice for information security. Recently appeared publications showing a potential possibility to use the noise radio frequency interference for information skimming by passive radio eavesdropping device. In particular, the vulnerability of the premises protected from eavesdropping devices is increased, if the radio frequency noising is switched on when confidential negotiations are being conducted. The use of radio noise waves energy for eavesdropping makes such devices invisible to nonlinear locators for listening devices if they activated only by noise signals. The paper shows that the use of non-steady state noise allows counteracting the unauthorized pickup of information. The analysis of non-steady state radio frequency noise effectiveness was carried out using the correlation receiver model. The correlation receiver has the highest sensitivity, and it works more efficiently with noise-like signals. It is shown that for counteracting the information pickup, it is necessary to use a noise, amplitude modulated by a random signal, whose spectrum coincides with a spectrum of a potential informational signal. Imposition a more powerful modulation noise to a weak informational signal makes impossible the information transfer. It is shown on the example of changing the power of a monochromatic signal while “beetle” transmits using steady-state and non-steady state noises, that due to the signal energy parametric redistribution over the non-steady-state noise modulation spectrum, the power of monochromatic signal is reduced by more than 10 dB compared to the transmission of the same signal using a steady-state noise. It can be concluded that the use of non-steady state noise signals for radio frequency suppression makes impossible their use for passive eavesdropping devices operation.
利用噪声干扰已成为信息安全的一种普遍做法。最近出现的一些出版物显示了利用噪声射频干扰进行无源无线电窃听装置信息浏览的潜在可能性。特别是,如果在进行机密谈判时开启无线电频率噪音,受保护而不受窃听装置窃听的房地更容易受到攻击。利用无线电波噪声波能量进行窃听,如果非线性定位器只被噪声信号激活,就不会发现这些设备。本文表明,使用非稳态噪声可以抵消未经授权的信息采集。利用相关接收机模型对非稳态射频噪声有效性进行了分析。相关接收机具有最高的灵敏度,对类噪声信号的处理效率更高。结果表明,为了抵消信息拾取,有必要使用由随机信号调制振幅的噪声,其频谱与潜在信息信号的频谱重合。对微弱的信息信号施加更强的调制噪声会使信息传输变得不可能。以“甲虫”使用稳态和非稳态噪声传输单色信号的功率变化为例表明,由于信号能量在非稳态噪声调制频谱上的参数重新分配,单色信号的功率比使用稳态噪声传输相同信号降低了10 dB以上。可以得出结论,使用非稳态噪声信号进行射频抑制使得它们不可能用于无源窃听装置的操作。
{"title":"The use of non-steady state noise interferences to counteract passive eavesdropping devices","authors":"S. P. Serhiienko, V. Krizhanovski, D. Chernov, L. Zagoruiko","doi":"10.30837/rt.2021.4.207.14","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.14","url":null,"abstract":"The use of noise interference has become a common practice for information security. Recently appeared publications showing a potential possibility to use the noise radio frequency interference for information skimming by passive radio eavesdropping device. In particular, the vulnerability of the premises protected from eavesdropping devices is increased, if the radio frequency noising is switched on when confidential negotiations are being conducted. The use of radio noise waves energy for eavesdropping makes such devices invisible to nonlinear locators for listening devices if they activated only by noise signals. The paper shows that the use of non-steady state noise allows counteracting the unauthorized pickup of information. The analysis of non-steady state radio frequency noise effectiveness was carried out using the correlation receiver model. The correlation receiver has the highest sensitivity, and it works more efficiently with noise-like signals. It is shown that for counteracting the information pickup, it is necessary to use a noise, amplitude modulated by a random signal, whose spectrum coincides with a spectrum of a potential informational signal. Imposition a more powerful modulation noise to a weak informational signal makes impossible the information transfer. It is shown on the example of changing the power of a monochromatic signal while “beetle” transmits using steady-state and non-steady state noises, that due to the signal energy parametric redistribution over the non-steady-state noise modulation spectrum, the power of monochromatic signal is reduced by more than 10 dB compared to the transmission of the same signal using a steady-state noise. It can be concluded that the use of non-steady state noise signals for radio frequency suppression makes impossible their use for passive eavesdropping devices operation.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"102 41 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77630205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation of the relative throughput of aircraft transponders of secondary airspace surveillance radar systems 二次空域监视雷达系统飞机应答器相对吞吐量的估计
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.13
M. Tkach
Secondary radar systems for monitoring airspace play a significant role in the information support of airspace control systems and air traffic control. These systems provide radar surveillance of airborne objects equipped with aircraft transponders and provide two-way communication via data request and response channels between ground radar stations and airborne objects. The paper assesses the relative throughput of aircraft transponders of secondary radar systems for monitoring airspace under the influence of correlated and uncorrelated interference in the request channel. The assessment of the throughput of the aircraft transponder shows that the aircraft transponder does not reach the maximum load included in the existing identification system under the influence of deliberate correlated interference. This indicates a sub-optimal determination of the aircraft transponder load factor of the existing secondary radar system. Incorrect determination of the maximum load of the aircraft transponder leads to a decrease in the noise immunity of both the aircraft transponder and the entire secondary radar system. At the same time, it should be noted that the interested party has the possibility of unauthorized use of an aircraft transponder to obtain information or paralyze the latter when applying interference of the required intensity.
空域监测二次雷达系统在空域管制系统和空中交通管制的信息保障中发挥着重要作用。这些系统提供配备飞机应答器的机载物体的雷达监视,并通过地面雷达站和机载物体之间的数据请求和响应通道提供双向通信。本文评估了在请求信道中相关和不相关干扰影响下,用于空域监测的二次雷达系统应答机的相对吞吐量。对飞机应答器吞吐量的评估表明,在故意相关干扰的影响下,飞机应答器没有达到现有识别系统所包含的最大负载。这表明现有二次雷达系统的飞机应答器负载系数的确定不是最优的。飞机应答器最大载荷的确定不正确,会导致飞机应答器和整个二次雷达系统的抗噪能力下降。同时,应指出,有关方面有可能在施加所需强度的干扰时,未经授权使用飞机应答器来获取信息或使后者瘫痪。
{"title":"Estimation of the relative throughput of aircraft transponders of secondary airspace surveillance radar systems","authors":"M. Tkach","doi":"10.30837/rt.2021.4.207.13","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.13","url":null,"abstract":"Secondary radar systems for monitoring airspace play a significant role in the information support of airspace control systems and air traffic control. These systems provide radar surveillance of airborne objects equipped with aircraft transponders and provide two-way communication via data request and response channels between ground radar stations and airborne objects. \u0000The paper assesses the relative throughput of aircraft transponders of secondary radar systems for monitoring airspace under the influence of correlated and uncorrelated interference in the request channel. The assessment of the throughput of the aircraft transponder shows that the aircraft transponder does not reach the maximum load included in the existing identification system under the influence of deliberate correlated interference. This indicates a sub-optimal determination of the aircraft transponder load factor of the existing secondary radar system. Incorrect determination of the maximum load of the aircraft transponder leads to a decrease in the noise immunity of both the aircraft transponder and the entire secondary radar system. At the same time, it should be noted that the interested party has the possibility of unauthorized use of an aircraft transponder to obtain information or paralyze the latter when applying interference of the required intensity.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"87 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77865019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One approach to the design of individual mathematical models of security in wireless sensor networks 无线传感器网络安全数学模型设计的一种方法
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.08
Y. Kotukh, V. Lyubchak, O. Strakh
The current level of development of engineering and technology is characterized by a constant expansion of the variety and complexity of mechanical and controlled objects, the operation of which occurs in a continuous-discrete time mode. One of these objects is the process of spreading malicious software in wireless sensor networks, the constant growth of trends towards which is due to their use as a single type of self-organized data transmission network with the least labor intensity and low cost. The concept of building sensor networks has not been formed at all. Therefore, the study of certain properties of such networks is very important for both domestic and world science. Moreover, for the strategically important sectors of the country, in particular defense, the protection of wireless sensor networks is a very important component. A new model of malware distribution is proposed, which is described by some boundary value problem for an impulsive dynamical system on a time scale.
当前工程和技术发展水平的特点是机械和控制对象的种类和复杂性不断扩大,其操作发生在连续-离散时间模式中。其中一个目标是在无线传感器网络中传播恶意软件的过程,这一趋势的不断增长是由于无线传感器网络作为一种单一类型的自组织数据传输网络,具有最小的劳动强度和低成本。构建传感器网络的概念还没有形成。因此,研究此类网络的某些性质对国内外的科学研究都是非常重要的。此外,对于国家的战略重要部门,特别是国防,无线传感器网络的保护是一个非常重要的组成部分。提出了一种新的恶意软件分布模型,该模型用时间尺度上脉冲动力系统的边值问题来描述。
{"title":"One approach to the design of individual mathematical models of security in wireless sensor networks","authors":"Y. Kotukh, V. Lyubchak, O. Strakh","doi":"10.30837/rt.2021.4.207.08","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.08","url":null,"abstract":"The current level of development of engineering and technology is characterized by a constant expansion of the variety and complexity of mechanical and controlled objects, the operation of which occurs in a continuous-discrete time mode. One of these objects is the process of spreading malicious software in wireless sensor networks, the constant growth of trends towards which is due to their use as a single type of self-organized data transmission network with the least labor intensity and low cost. \u0000The concept of building sensor networks has not been formed at all. Therefore, the study of certain properties of such networks is very important for both domestic and world science. Moreover, for the strategically important sectors of the country, in particular defense, the protection of wireless sensor networks is a very important component. \u0000A new model of malware distribution is proposed, which is described by some boundary value problem for an impulsive dynamical system on a time scale.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"52 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79821662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation of the computational cost of the CSIDH algorithm on supersingular twisted and quadratic Edwards curves CSIDH算法在超奇异扭曲和二次Edwards曲线上的计算代价估计
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.03
A. Bessalov, O. Tsygankova, S. Abramov
The properties of twisted and quadratic supersingular Edwards curves that form pairs of quadratic torsion with order p+1  over a prime field Fp are considered. A modification of the CSIDH algorithm based on the isogenies of these curves instead of the traditional arithmetic of curves in the Montgomery form is presented. The parameters of these two classes of supersingular Edwards curves for p=239 are calculated and tabulated. An example of the isogenies of these curves in the implementation of the CSIDH algorithm as a non-interactive secret sharing scheme based on the secret and public keys of Alice and Bob is given. It is shown that the sequences of parameters ±d(i) of isogeny chains for quadratic and twisted supersingular Edwards curves, respectively, have a reverse nature on the period of the sequence. A recurrent algorithm for calculating the coordinates of points that form the kernels of isogenies of odd degrees is proposed, and its implementation in various coordinate systems is considered. A comparative analysis of the cost of calculating the parameter d´ of the isogenic curve E´ using the Farashakhi-Hosseini (W : Z) - coordinates and classical projective coordinates (X : Y : Z) is given. It is noted that all calculations in the CSIDH algorithm necessary to calculate the shared secret dAB are reduced only to the calculation of the isogenic curve E´ parameter d´ and are performed by field operations and the scalar multiplication of the point. The controversial issue of refusal to calculate the isogenic function ϕ(R) of a curve point R in the CSIDH algorithm is discussed.
研究了在素数域Fp上形成p+1阶二次扭转对的扭曲和二次超奇异Edwards曲线的性质。本文提出了一种改进的CSIDH算法,该算法基于这些曲线的等同源性,而不是传统的Montgomery形式曲线算法。对p=239时这两类超奇异Edwards曲线的参数进行了计算和制表。给出了基于Alice和Bob私钥和公钥的CSIDH算法的非交互式秘密共享方案实现中这些曲线的同生性的一个例子。结果表明,二次型和扭转型超奇异Edwards曲线的等同链参数±d(i)序列在序列周期上具有逆性质。提出了一种计算奇次等同性核点坐标的递归算法,并考虑了该算法在各种坐标系下的实现。比较分析了用Farashakhi-Hosseini (W: Z) -坐标和经典投影坐标(X: Y: Z)计算等源曲线E´参数d´的代价。值得注意的是,CSIDH算法中计算共享秘密dAB所需的所有计算都简化为等基因曲线E '参数d '的计算,并通过场运算和点的标量乘法来执行。讨论了CSIDH算法中拒绝计算曲线点R的等基因函数φ (R)的争议问题。
{"title":"Estimation of the computational cost of the CSIDH algorithm on supersingular twisted and quadratic Edwards curves","authors":"A. Bessalov, O. Tsygankova, S. Abramov","doi":"10.30837/rt.2021.4.207.03","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.03","url":null,"abstract":"The properties of twisted and quadratic supersingular Edwards curves that form pairs of quadratic torsion with order p+1  over a prime field Fp are considered. A modification of the CSIDH algorithm based on the isogenies of these curves instead of the traditional arithmetic of curves in the Montgomery form is presented. The parameters of these two classes of supersingular Edwards curves for p=239 are calculated and tabulated. An example of the isogenies of these curves in the implementation of the CSIDH algorithm as a non-interactive secret sharing scheme based on the secret and public keys of Alice and Bob is given. It is shown that the sequences of parameters ±d(i) of isogeny chains for quadratic and twisted supersingular Edwards curves, respectively, have a reverse nature on the period of the sequence. A recurrent algorithm for calculating the coordinates of points that form the kernels of isogenies of odd degrees is proposed, and its implementation in various coordinate systems is considered. A comparative analysis of the cost of calculating the parameter d´ of the isogenic curve E´ using the Farashakhi-Hosseini (W : Z) - coordinates and classical projective coordinates (X : Y : Z) is given. It is noted that all calculations in the CSIDH algorithm necessary to calculate the shared secret dAB are reduced only to the calculation of the isogenic curve E´ parameter d´ and are performed by field operations and the scalar multiplication of the point. The controversial issue of refusal to calculate the isogenic function ϕ(R) of a curve point R in the CSIDH algorithm is discussed.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"11 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86742247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Methods and means of deanonymization of transactions in blockchain b区块链中交易去匿名化的方法和手段
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.04
V.V. Dubina, R. Oliynykov
This paper presents the results of a study of the properties of transactions formation and processing of in blockchain systems, aimed to identify existing barriers to the secure functioning of the network, processing and transmission of data between users, and to determine possible means of deanonymizing transactions. The anonymity of the network is one of the reasons for cryptocurrencies popularity and widespread use of blockchain technology. However, its presence is the basis for unscrupulous transactions, criminal actions of fraudsters and attacks on the system. Therefore, one of the main issues today is to ensure the reliable storage of information and the ability to track suspicious activity and timely protection of users in blockchain systems. The article examines known methods of increasing anonymity and maintaining confidentiality in modern networks based on the principles of blockchain technology, the threats arising from their use and the possible ways of tracking the actions of system participants. A comparative description of known tracking tools and possible means of de-anonymization of the history of completed transactions is given. As a result of the study, it was proposed to use a separate platform to analyze the network in real time, identify threats and their timely elimination, with the ability to visualize relationships and build address graphs as a result of tracking the entire chain of transactions. The tool makes it possible to implement a search among cryptocurrency addresses, blocks, transactions and tags, as well as to identify clusters associated with a particular address. The system analyzes the network in real time to gain insight into the statistics. Particular attention is paid to detecting so-called anomalies, i.e., the identification of transactions that deviate from standard structures. This allows identifying and tracking potentially malicious activities at an early stage.
本文介绍了区块链系统中交易形成和处理属性的研究结果,旨在确定网络安全运行、用户之间数据处理和传输的现有障碍,并确定可能的去匿名化交易手段。网络的匿名性是加密货币流行和区块链技术广泛使用的原因之一。然而,它的存在是肆无忌惮的交易、诈骗者的犯罪行为和对系统的攻击的基础。因此,当今的主要问题之一是确保区块链系统中信息的可靠存储和跟踪可疑活动的能力以及及时保护用户的能力。本文研究了基于区块链技术原理的现代网络中增加匿名性和保持机密性的已知方法,使用它们所产生的威胁以及跟踪系统参与者行为的可能方法。给出了已知跟踪工具和完成交易历史去匿名化的可能手段的比较描述。研究的结果是,建议使用一个单独的平台来实时分析网络,识别威胁并及时消除,并具有可视化关系和构建地址图的能力,从而跟踪整个交易链。该工具可以实现加密货币地址、区块、交易和标签之间的搜索,以及识别与特定地址相关的集群。该系统对网络进行实时分析,以了解统计数据。特别注意发现所谓的异常情况,即查明偏离标准结构的交易。这允许在早期阶段识别和跟踪潜在的恶意活动。
{"title":"Methods and means of deanonymization of transactions in blockchain","authors":"V.V. Dubina, R. Oliynykov","doi":"10.30837/rt.2021.4.207.04","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.04","url":null,"abstract":"This paper presents the results of a study of the properties of transactions formation and processing of in blockchain systems, aimed to identify existing barriers to the secure functioning of the network, processing and transmission of data between users, and to determine possible means of deanonymizing transactions. The anonymity of the network is one of the reasons for cryptocurrencies popularity and widespread use of blockchain technology. However, its presence is the basis for unscrupulous transactions, criminal actions of fraudsters and attacks on the system. Therefore, one of the main issues today is to ensure the reliable storage of information and the ability to track suspicious activity and timely protection of users in blockchain systems. The article examines known methods of increasing anonymity and maintaining confidentiality in modern networks based on the principles of blockchain technology, the threats arising from their use and the possible ways of tracking the actions of system participants. A comparative description of known tracking tools and possible means of de-anonymization of the history of completed transactions is given. As a result of the study, it was proposed to use a separate platform to analyze the network in real time, identify threats and their timely elimination, with the ability to visualize relationships and build address graphs as a result of tracking the entire chain of transactions. The tool makes it possible to implement a search among cryptocurrency addresses, blocks, transactions and tags, as well as to identify clusters associated with a particular address. The system analyzes the network in real time to gain insight into the statistics. Particular attention is paid to detecting so-called anomalies, i.e., the identification of transactions that deviate from standard structures. This allows identifying and tracking potentially malicious activities at an early stage.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"49 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73541566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence of ferrimagnetic resonance on conversion of electromagnetic energy by a YIG resonator into mechanical one 铁磁共振对YIG谐振器将电磁能转化为机械能的影响
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.16
G. Komarova
Using the method of physical modeling, an algorithm for calculating the force with which a standing electromagnetic wave acts on a ferrite sphere of arbitrary diameter placed in a constant magnetic field is obtained. The value of constant magnetic field intensity provides appearance of ferrimagnetic resonance. Dependence of the magnetic field of an electromagnetic wave in the middle of a ferrite sphere on the size of its resonant radius and spherical coordinates are studied. In the center of the ferrite sphere, the resonance radius of which is 4.2634 mm, the microwave magnetic field strength is 83796 times greater than the magnetic field strength in the incident plane polarized wave. Mean-square value of the magnetic field strength over the volume of the sphere increases 4.8 times. Standing wave, formed in a free space with power flow density of 622 kW/m2 and wavelength of 3.2 cm, reflects from metallic shield placed at a distance of λo/8 + nλo/2, n = 0, 1, 2, 3… measured from the center of ferrite sphere and impacts with force of 0,12 N on ferrite sphere with resonance radius of 4,2634 mm. The results of the calculated force acting on the YIG – resonator coincide with the experimental results given in the well-known works (the power flux density is 43 kW/m2, the radius of the ferrite sphere is 1.775 mm, the force is 6 ± 0.5 μN) within the measurement error. Application of spatial resonance, standing electromagnetic wave and YIG resonator allows to increase of energy conversion factor of microwave energy conversion into mechanic one 8,6·104 times in compare to application of ferrite cylinder only in known papers. The research results can be used by the developers of converters of microwave energy into mechanical energy.
利用物理建模的方法,得到了恒定磁场下驻波作用于任意直径铁氧体球时的力的计算算法。恒定磁场强度的值提供了铁磁共振的外观。研究了铁氧体球中心电磁波的磁场与球的共振半径和球坐标的关系。在谐振半径为4.2634 mm的铁氧体球中心,微波磁场强度是入射面极化波磁场强度的83796倍。磁场强度在球体体积上的均方值增加4.8倍。驻波在自由空间内形成,功率流密度为622 kW/m2,波长为3.2 cm,从距离铁氧体球中心测得的距离为λo/8 + nλo/2, n = 0,1,2,3…处的金属屏蔽反射,以0.12 n的力作用在铁氧体球上,共振半径为4,2634 mm。计算得到的作用在YIG -谐振腔上的力在测量误差范围内与实验结果(功率磁通密度为43 kW/m2,铁氧体球半径为1.775 mm,力为6±0.5 μN)吻合。空间共振、驻波和YIG谐振器的应用使微波能量转化为机械能的能量转换系数比已知文献中仅应用铁氧体圆柱体的能量转换系数提高了8.6·104倍。研究结果可为微波能转换为机械能的开发人员提供参考。
{"title":"Influence of ferrimagnetic resonance on conversion of electromagnetic energy by a YIG resonator into mechanical one","authors":"G. Komarova","doi":"10.30837/rt.2021.4.207.16","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.16","url":null,"abstract":"Using the method of physical modeling, an algorithm for calculating the force with which a standing electromagnetic wave acts on a ferrite sphere of arbitrary diameter placed in a constant magnetic field is obtained. The value of constant magnetic field intensity provides appearance of ferrimagnetic resonance. Dependence of the magnetic field of an electromagnetic wave in the middle of a ferrite sphere on the size of its resonant radius and spherical coordinates are studied. In the center of the ferrite sphere, the resonance radius of which is 4.2634 mm, the microwave magnetic field strength is 83796 times greater than the magnetic field strength in the incident plane polarized wave. Mean-square value of the magnetic field strength over the volume of the sphere increases 4.8 times. Standing wave, formed in a free space with power flow density of 622 kW/m2 and wavelength of 3.2 cm, reflects from metallic shield placed at a distance of λo/8 + nλo/2, n = 0, 1, 2, 3… measured from the center of ferrite sphere and impacts with force of 0,12 N on ferrite sphere with resonance radius of 4,2634 mm. The results of the calculated force acting on the YIG – resonator coincide with the experimental results given in the well-known works (the power flux density is 43 kW/m2, the radius of the ferrite sphere is 1.775 mm, the force is 6 ± 0.5 μN) within the measurement error. Application of spatial resonance, standing electromagnetic wave and YIG resonator allows to increase of energy conversion factor of microwave energy conversion into mechanic one 8,6·104 times in compare to application of ferrite cylinder only in known papers. The research results can be used by the developers of converters of microwave energy into mechanical energy.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"100 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85803991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of the possibilities to use keyboard handwriting for the tasks of identifying students in e-learning systems 研究在电子学习系统中使用键盘手写识别学生的可能性
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-12-24 DOI: 10.30837/rt.2021.4.207.15
D. Gorelov, O. Ivanova, O.V. Lytvynenko, A.A. Dovbnia, D.O. Minin
When using distance education systems, the problem of information security of the educational process arises, which, in addition to external ones, also implies internal threats. One of these threats can be a legitimate user who paid a fraudster to take tests and give visibility to educational activities under his own name. The use of traditional identification methods has two significant drawbacks: firstly, the ambiguity of the identified user, because the identification of the user occurs by the entered pair login-password; secondly, the inability to detect the substitution of an identified user in the process of working with the system. These disadvantages are eliminated by using biometric methods of covert and continuous monitoring. In the first part of the work the different types of control knowledge tests are analyzed. Taking into account the specifics of the use of covert keyboard monitoring algorithms, the following is proposed: 1) to use tests that do not contain answers; 2) use tests after each learning activities in order to form a user’s biometric vector; 3) use tests with numerical answers in order to minimize the analyzed keystroke digraphs. An algorithm for user’s profile formation and its identification is proposed in the second part of the work. Its combine qualitative (distribution of the frequencies of using numeric keys groups, comma-separated keys, “plus” and “minus” keys on the main and additional keyboard units) and quantitative (analysis of statistical properties of keystroke digraphs) approaches. The experimentally obtained estimates of the identification accuracy of the proposed algorithm: FAR=4.64% and FRR=6.25%.
在使用远程教育系统的过程中,产生了教育过程的信息安全问题,除了外部威胁之外,还隐含着内部威胁。其中一种威胁可能是合法用户付钱给欺诈者参加考试,并以自己的名义公开教育活动。使用传统的身份识别方法有两个明显的缺点:首先,被识别用户的模糊性,因为用户的身份识别是通过输入对登录密码进行的;其次,在使用系统的过程中无法检测已识别用户的替换。通过使用隐蔽和连续监测的生物识别方法消除了这些缺点。第一部分分析了控制知识测试的不同类型。考虑到使用隐蔽键盘监控算法的具体情况,建议如下:1)使用不包含答案的测试;2)在每次学习活动后进行测试,形成用户的生物特征向量;3)使用带有数字答案的测试,以尽量减少分析的击键图。第二部分提出了一种用户轮廓的生成和识别算法。它结合了定性(使用数字键组、逗号分隔键、主键盘和附加键盘单元上的“加号”和“减号”键的频率分布)和定量(击键有向图的统计特性分析)方法。实验得到了该算法的识别准确率估计:FAR=4.64%, FRR=6.25%。
{"title":"Study of the possibilities to use keyboard handwriting for the tasks of identifying students in e-learning systems","authors":"D. Gorelov, O. Ivanova, O.V. Lytvynenko, A.A. Dovbnia, D.O. Minin","doi":"10.30837/rt.2021.4.207.15","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.15","url":null,"abstract":"When using distance education systems, the problem of information security of the educational process arises, which, in addition to external ones, also implies internal threats. One of these threats can be a legitimate user who paid a fraudster to take tests and give visibility to educational activities under his own name. The use of traditional identification methods has two significant drawbacks: firstly, the ambiguity of the identified user, because the identification of the user occurs by the entered pair login-password; secondly, the inability to detect the substitution of an identified user in the process of working with the system. These disadvantages are eliminated by using biometric methods of covert and continuous monitoring. \u0000In the first part of the work the different types of control knowledge tests are analyzed. Taking into account the specifics of the use of covert keyboard monitoring algorithms, the following is proposed: 1) to use tests that do not contain answers; 2) use tests after each learning activities in order to form a user’s biometric vector; 3) use tests with numerical answers in order to minimize the analyzed keystroke digraphs. \u0000An algorithm for user’s profile formation and its identification is proposed in the second part of the work. Its combine qualitative (distribution of the frequencies of using numeric keys groups, comma-separated keys, “plus” and “minus” keys on the main and additional keyboard units) and quantitative (analysis of statistical properties of keystroke digraphs) approaches. The experimentally obtained estimates of the identification accuracy of the proposed algorithm: FAR=4.64% and FRR=6.25%.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"20 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87781048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method for dealing with non-stationary natural and simulating interference in intellectual surveillance radars 智能监视雷达中非平稳自然干扰和模拟干扰的处理方法
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2021-09-24 DOI: 10.30837/rt.2021.3.206.10
V. Zhyrnov, S. Solonskaya, V. Zarytskyi
The article discusses a method for dealing with non-stationary natural and simulating interference in intelligent surveillance radars. When creating simulating marks, the introduction of amplitude modulation into the relayed radar sounding signal is used. As a result of the analysis, it was possible to find out that in the imitating noise, in this case, the so-called "intelligent" fluctuations of the burst structure of false marks appear, which differ from the fluctuations of the packs of real marks and can be easily detected by a human operator. The method is based on the definition of semantic components at the stage of formation and analysis of a symbolic model of amplitude fluctuations of a burst of signals from non-stationary natural and simulating interference and from real moving objects. In this case, the semantic features of amplitude fluctuations are determined by solving predicate equations for transforming these fluctuations into symbolic images of noise marks and real mobile aircraft. As a result of semantic analysis of the amplitude fluctuations of the burst in the time domain, classification distinctive features of fluctuations in the burst of signals from natural imitating noise and air objects were obtained. The semantic components of the decision-making algorithm are investigated, which are similar to the decision-making algorithms by a human operator. Process knowledge of transforming radar signals into symbolic images of amplitude fluctuations of a burst in the time domain is formalized. The formalization of the processing of symbolic images includes a system of predicate equations, by solving which the types of amplitude fluctuations of the burst are identified. Based on the results of experimental data, the transformations of real radar signals into symbolic images of burst fluctuations were carried out on the basis of the algebra of finite predicates. The authors also managed to propose these transformations to be used as the basis of an effective toolkit for obtaining classification distinctive features of packet fluctuations from interference and from aircraft.
讨论了智能监视雷达中非平稳自然干扰和模拟干扰的处理方法。在创建模拟标记时,将调幅引入到中继雷达探测信号中。通过分析可以发现,在模拟噪声中,虚假标记的突发结构出现了所谓的“智能”波动,这种波动不同于真实标记包的波动,并且很容易被人工操作员检测到。该方法基于在形成阶段对语义分量的定义,并对来自非平稳自然干扰和模拟干扰以及来自真实运动物体的突发信号的幅度波动的符号模型进行分析。在这种情况下,通过求解谓词方程来确定振幅波动的语义特征,将这些波动转换为噪声标记和真实移动飞机的符号图像。通过对突发信号幅度波动的时域语义分析,得到了自然模拟噪声和空气物体信号突发波动的分类特征。研究了决策算法的语义组成,这些语义组成与人工算子的决策算法相似。将雷达信号转化为时域突发幅度波动符号图像的过程知识形式化。符号图像处理的形式化包括一个谓词方程系统,通过求解该方程组可以识别突发振幅波动的类型。在实验数据的基础上,利用有限谓词代数将实际雷达信号转换为突发波动的符号图像。作者还设法提出将这些转换作为有效工具包的基础,用于从干扰和飞机中获得包波动的分类独特特征。
{"title":"Method for dealing with non-stationary natural and simulating interference in intellectual surveillance radars","authors":"V. Zhyrnov, S. Solonskaya, V. Zarytskyi","doi":"10.30837/rt.2021.3.206.10","DOIUrl":"https://doi.org/10.30837/rt.2021.3.206.10","url":null,"abstract":"The article discusses a method for dealing with non-stationary natural and simulating interference in intelligent surveillance radars. When creating simulating marks, the introduction of amplitude modulation into the relayed radar sounding signal is used. As a result of the analysis, it was possible to find out that in the imitating noise, in this case, the so-called \"intelligent\" fluctuations of the burst structure of false marks appear, which differ from the fluctuations of the packs of real marks and can be easily detected by a human operator. The method is based on the definition of semantic components at the stage of formation and analysis of a symbolic model of amplitude fluctuations of a burst of signals from non-stationary natural and simulating interference and from real moving objects. In this case, the semantic features of amplitude fluctuations are determined by solving predicate equations for transforming these fluctuations into symbolic images of noise marks and real mobile aircraft. As a result of semantic analysis of the amplitude fluctuations of the burst in the time domain, classification distinctive features of fluctuations in the burst of signals from natural imitating noise and air objects were obtained. The semantic components of the decision-making algorithm are investigated, which are similar to the decision-making algorithms by a human operator. Process knowledge of transforming radar signals into symbolic images of amplitude fluctuations of a burst in the time domain is formalized. The formalization of the processing of symbolic images includes a system of predicate equations, by solving which the types of amplitude fluctuations of the burst are identified. Based on the results of experimental data, the transformations of real radar signals into symbolic images of burst fluctuations were carried out on the basis of the algebra of finite predicates. The authors also managed to propose these transformations to be used as the basis of an effective toolkit for obtaining classification distinctive features of packet fluctuations from interference and from aircraft.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"95 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79451697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1