Radiotekhnika
http://rt.nure.ua/
<p style="text-align: justify;">All-Ukrainian Interdepartmental Scientific and Technical Journal «<strong>Radiotekhnika</strong>» was founded and has been published since 1965. Founder – Kharkov Institute of Mining Machinery, Automation and Computer Engineering, now Kharkiv National University of Radio Electronics (NURE).</p> <p style="text-align: justify;"><a href="http://rt.nure.ua/libraryFiles/downloadPublic/2096">The Journal Radiotekhnika is Registered in the Register of Subjects in the Media Sphere of Ukraine</a>.<br />The collection is included in the List of scientific professional publications of Ukraine, category «Б», technical and physical-mathematical sciences (approved by orders of the Ministry of Education and Science: from 17.03.2020 № 409; from 02.07.2020 № 886; from 24.09.2020 № 1188).<br />The index in the Catalog of subscription editions of Ukraine is 08391.<br />Frequency of publication – 4 times a year.</p> <p>Specialties on which the editorial board of the Journal publishes articles:</p> <p>105 – Applied Physics and Nanomaterials<br />125 – Cybersecurity<br />163 – Biomedical Engineering<br />171 – Electronics<br />172 – <span class="HwtZe" lang="en"><span class="jCAhz ChMk0b"><span class="ryNqvb">Electronic communications</span></span></span> and Radio Engineering<br />173 – Avionics<br />174 – Automation, Computer-Integrated Technologies and Robotics<br />175 – Metrology and information-measuring technique<br />176 – Micro and Nanosystem Technology</p> <p style="text-align: justify;"><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="uk" data-phrase-index="0" data-number-of-phrases="1"><span class="Q4iAWc">Previously unpublished articles in English and Ukrainian are accepted for consideration.</span></span></span> All articles submitted to the editorial board are subject to external and internal (members of the editorial board) review.</p> <p style="text-align: justify;"><strong>Editorial <span id=":6v.co" class="tL8wMe EMoHub" dir="ltr" style="text-align: left;">Team</span>:</strong></p> <ul> <li><a href="https://nure.ua/en/staff/sergiy-sheiko">Sheiko S.O., PhD, Assoc. prof., NURE, Ukraine (Chief Editor)</a></li> </ul> <p>105 – Applied Physics and Nanomaterials</p> <ul> <li><a href="https://nure.ua/en/staff/anatoly-luchaninov">Luchaninov A.I., Dr. of Phys.-Math. Sciences, prof., prof., NURE, Ukraine</a></li> <li><a href="https://nure.ua/en/staff/volodymyr-doroshenko">Doroshenko V.O., Dr. of Phys.-Math. Sciences, prof., NURE, Ukraine</a></li> <li><a href="https://nure.ua/en/staff/oleksandr-konovalenko">Konovalenko O.O., Dr. of Phys.-Math. Sciences, prof., Academician of NASU, IRA NASU, Ukraine</a></li> <li><a href="https://nure.ua/en/staff/serhii-tarapov">Tarapov S.I., Dr. of Phys.-Math. Sciences, prof., member-cor. NASU, IRE NASU, Ukraine</a></li> <li><a href="https://nure.ua/en/staff/peter-tokarsky">Tokarsky P.L., Dr. of Phys.-Math. Sciences, prof., IRA NASU, Ukraine</a></li> </ul> <p>125 – Cybersecurity</p> <ul> <li><a href="https://nure.ua/en/staff/ivan-d-gorbenko">Gorbenko I.D., Dr. of Tech. Sciences, prof., KhNU V. N. Karazin, Ukraine</a></li> <li><a href="https://nure.ua/en/staff/hennadii-khalimov">Khalimov H.Z., Dr. of Tech. Sciences, prof., NURE, Ukraine</a></li> <li><a href="https://bit.nmu.org.ua/en/staff-eng/kotux/">Kotuh Ye.V., PhD, Assoc. prof., Dnipro University of Technology, Ukraine</a></li> </ul> <p>163 – Biomedical Engineering</p> <ul> <li><a href="https://nure.ua/en/staff/oleh-avrunin">Avrunin O.G., Dr. of Tech. Sciences, prof., NURE, Ukraine</a></li> <li><a href="https://nure.ua/en/staff/kateryna-muzyka">Muzyka K.M., Dr. of Tech. Sciences, Senior Researcher, NURE, Ukraine</a></li> <li><a href="https://nure.ua/en/staff/valerii-semenets">Semenets V.V., Dr. of Tech. Sciences, prof., NURE, Ukraine</a></li> </ul> <p>171 – Electronics</p> <ul> <li><a href="https://nure.ua/en/staff/vladimir-kartashov">Kartashov V.M., Dr. of Tech. Sciences, prof., NURE, Ukraine</a></li> <li><a href="https://nure.ua/en/staff/oleksiy-gueorguiovych-pashchenko">Pashchenko O.G., PhD, Assoc. prof., NURE, Ukraine</a></li> <li><a href="https://kkite.pnu.edu.ua/svyd-iryna-viktorivna/">Svyd I.V., PhD, Assoc. prof., PNU, Ukraine</a></li> </ul> <p>172 – Telecommunications and Radio Engineering</p> <ul> <li><a href="https://nure.ua/en/staff/dmytro-ageiev">Ageiev D.V., Dr. of Tech. Sciences, prof., NURE, Ukraine</a></li> <li><a href="https://nure.ua/en/staff/valeriy-bezruk">Bezruk V.M., Dr. of Tech. Sciences, prof., NURE, Ukraine</a></li> <li><a href="https://nure.ua/en/staff/dmytro-gretskih">Gretskih D.V., Dr. of Tech. Sciences, Assoc. prof., NURE, Ukraine</a></li> </ul> <p>173 – Avionics</p> <ul> <li><a href="https://library.khai.edu/authors/dergachov-kostyantin-yuryajovich">Dergachov K.Yu., PhD, Senior Researcher, Sciences, prof., NAU «KhAI», Ukraine</a></li> <li><a href="https://library.khai.edu/authors/kulyak-anatolyaj-stepanovich">Kulik A.S., Dr. of Tech. Sciences, prof., NAU «KhAI», Ukraine</a></li> </ul> <p>174 – Automation, Computer-Integrated Technologies and Robotics</p> <ul> <li><a href="https://nure.ua/en/staff/oleksandr-filipenko">Filipenko O.I., Dr. of Tech. Sciences, prof., NURE, Ukraine</a></li> <li><a href="https://nure.ua/ru/staff/aleksandr-mihaylovich-tsyimbal">Tsymbal O.M., Dr. of Tech. Sciences, Assoc. prof., NURE, Ukraine</a></li> </ul> <p>175 – Metrology and information-measuring technique</p> <ul> <li><a href="https://nure.ua/en/staff/igor-zakharov">Zakharov I.P., Dr. of Tech. Sciences, prof., NURE, Ukraine</a></li> <li><a href="https://nure.ua/en/staff/4131">Odarenko E.M., Dr. of Tech. Sciences, prof., NURE, Ukraine</a></li> </ul> <p>176 – Micro and Nanosystem Technology</p> <ul> <li><a href="https://nure.ua/en/staff/igor-bondarenko">Bondarenko I.M., Dr. of Phys.-Math. Sciences, prof., NURE, Ukraine</a></li> </ul> <p><span class="tlid-translation translation" lang="en"><span class="" title="">Members of the editorial board of foreign scientific institutions and educational institutions</span></span></p> <ul> <li><a href="https://www.iqo.uni-hannover.de/en/institute/staff/boris-chichkov/">Chichkov Boris, Dr. of Tech. Sciences, Professor, Gottfried Wilhelm Leibniz Universität, Hannover, Germany</a></li> <li><a href="https://www.chalmers.se/en/staff/Pages/marianna-ivashina.aspx">Ivashina Marianna, Full Professor, Senior Member IEEE, Department of Electrical Engineering, Chalmers University of Technology, Sweden</a></li> <li><a href="https://ieeexplore.ieee.org/author/37275597700">Markov Konstyantyn, Project Manager/Group Leader, Doct.-eng., Manufacturing, Electronics, RF360 Europe GmbH, Munich, Germany</a></li> <li><a href="https://www.researchgate.net/profile/Georgiy_Sevskiy">Sevskiy Georgiy, Project Manager/Group Leader, Doct.-eng., Manufacturing, Electronics, RF360 Europe GmbH, Munich, Germany</a></li> <li><a href="http://www.ime.uz.zgora.pl/InfoPracMore.aspx?idPrac=60">Titarenko Larysa, Dr. of Tech. Sciences, Professor, Institute of Metrology, Electronics and Computer Science, Zielona Góra, Poland</a></li> <li><a href="https://www.dtu.dk/english/service/phonebook/person?id=32148&tab=1">Zhurbenko Vitaliy, Associate Professor, Member IEEE, Department of Electrical Engineering, Technical University of Denmark, Denmark</a></li> <li><a href="https://risweb.st-andrews.ac.uk/portal/en/persons/iryna-vorgul(eae47558-d8cd-47fb-aadf-ed8bf2681747).html">Irena Vorgul</a>, <a href="https://www.scopus.com/authid/detail.uri?authorId=10440690000">PhD, University of St Andrews, United Kingdom</a></li> <li><a href="http://ieti.pollub.pl/index.php/m-inst/m-inst-struktura?id=77">Wójcik Waldemar</a>, <a href="https://pub.pollub.pl/author/1303/">Doctor of Sciences, Full Professor, Faculty Electrical Engineering and Computer Science, Lublin University of Technology, Poland</a></li> </ul>Kharkiv National University of Radio Electronicsen-USRadiotekhnika0485-8972<p>Authors who publish with this journal agree to the following terms:</p><p>1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by/3.0/" target="_new">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</p><p>2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</p>3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See <a href="http://opcit.eprints.org/oacitation-biblio.html" target="_new">The Effect of Open Access</a>).Information Security Risk Assessment for Personnel During Access Segregation to Company Resources
http://rt.nure.ua/article/view/324877
<p>The article addresses the problem of information security risk assessment in the context of the human factor and the specifics of restricting employees’ access to corporate resources. The aim of the study is to improve approaches to assessing information security risks for company personnel during the segregation of access to corporate information resources by developing and implementing a modified sequence of processes that considers the specifics of the human factor and helps minimize threats arising from employees’ mistakes and malicious actions. The object of the research is the process of ensuring information security while managing personnel access to corporate resources. The subject of the research consists in the methods and procedures of information security risk assessment related to personnel activities, as well as the technological sequence of their implementation to minimize threats. The authors emphasize that, on the one hand, company personnel are among its most valuable assets, and on the other hand, they can also be a potential source of threats to information security. Modern approaches to risk assessment are analyzed, including international standards that can serve as a foundation for implementing a comprehensive protection system. It is demonstrated that the key task in protecting information resources is the appropriate definition of roles and categories of personnel, considering their responsibilities and level of accountability. A nine-step sequence is proposed to optimize access segregation, encompassing resource identification and classification, auditing the current security system, proactive risk assessment, formulating recommendations, and implementing new measures. Methods of profiling employees are described, taking into consideration their competencies, behavioral characteristics, and opportunities to access confidential data. Special attention is paid to Role-Based Access Control policies and authentication methods, including password systems and more advanced technologies. The importance of regular auditing and monitoring for timely detection of new threats and vulnerabilities is highlighted. Thus, the application of the developed risk assessment model makes it possible to reduce the number of human errors, enhance the level of business process security, and optimize the management of access to critical resources. The results obtained can be integrated into the company’s information security system to ensure the continuous improvement of protective mechanisms, which positively affects the enterprise’s reputation and minimizes potential financial losses.</p>T.I. KorobeinikovaA.B. Yamnych
Copyright (c) 2024
2025-03-162025-03-1621971510.30837/rt.2024.4.219.01Application of rank approach algorithms in planning task distribution in multiprocessor systems
http://rt.nure.ua/article/view/324890
<p>The article discusses the application of rank-based algorithms in planning task distribution in multiprocessor systems, which is currently a fairly pressing issue related to the evolution of computing devices, mass transition to multi-core processor architectures, widespread use of Internet resources, and, at the same time, demand for servers and data centers. Evidence is provided of the possibility to reduce the task planning problem in multiprocessor systems to the multiple solution of the integer programming problem with Boolean variables (IPP with Bv).</p> <p>The authors consider two approximate algorithms for solving the IPP problem with Bv using the example of the classical knapsack problem. Both algorithms are based on the fundamentals of the rank approach. The operation of both is based on the work of the general procedure for constructing solution vectors A0 using the rules for cutting off unpromising paths L1, L2, L3. The logic of each of the three strategies and software options for their implementation are considered. It was found that strategies L1 and L2 can be implemented by sorting or linear search for suitable vectors for constructing vectors of the next rank. For strategy L3, which in its standard form offers cutting off paths based on their maximum potential increase in functionality, a modification is proposed that allows cutting off a larger number of paths without performing checks for each of them.The process of declaring security profiles includes several stages, such as assessing the current state of security, identifying threats and vulnerabilities, defining security requirements, developing and implementing security profiles, and regularly monitoring and updating security measures.</p> <p>The authors present the results of experimental studies, according to which, when using approximate algorithms A1 and A2, the obtained answer usually does not exceed 10% of the error from the exact one, regardless of the selected software implementation. At the same time, it is possible to reduce the number of analyzed vectors to 170,000 versus 2<sup>150</sup> in the case of a complete enumeration. Using the proposed modification for the L3 strategy allows us to reduce the number of analyzed vectors by an average of another 40,000.</p> <p>The authors conclude that among the proposed algorithms, the most advantageous is the use of A2 implemented using the L1 strategy through a linear search and a modified L3 strategy.</p>D.Yu. GolubnychiyO.S. Holovchenko
Copyright (c) 2024
2025-03-162025-03-16219162710.30837/rt.2024.4.219.02Ensuring user anonymity in online surveys
http://rt.nure.ua/article/view/324891
<p>The paper addresses the pressing issue of ensuring user anonymity during online surveys. The privacy risks associated with JavaScript are analyzed, which, on the one hand, provides interactivity and convenience of surveys, and on the other hand, creates a threat of data leakage through trackers and third-party scripts. It is noted that many survey platforms integrate third-party scripts that can collect users' personal information without their consent.</p> <p>The paper provides an overview of existing privacy protection tools. It was found that the most popular tool among users is the Adblock Plus browser extension. The most popular platforms for online surveys (Google Forms, SurveyMonkey, Typeform, Xoyondo and others) are analyzed in terms of their ability to ensure user privacy. It was found that the level of protection varies from completely blocking scripts to their almost unlimited use.</p> <p>An experimental study was conducted on the Windows 11 Pro x64 operating system using the IDE PyCharm 2024.3.1.1 (Community Edition) for writing Python code. It was found that the Ghostery tool is capable of blocking up to 87% of third-party scripts that could potentially affect user anonymity. It is shown that the Google Forms platform provides the best level of user anonymity among the considered applications. Further research on user anonymity applying machine learning methods is relevant and necessary, as it will enable more effective identification of obfuscated code.</p>І.В. ОлешкоK.O. Papazov
Copyright (c) 2025
2025-03-162025-03-16219283510.30837/rt.2024.4.219.03Application of the LINE encryption scheme in the key encapsulation mechanism for the authentication protocol in 5G networks
http://rt.nure.ua/article/view/324892
<p>The 5G network is a key driver of digital transformation and the Fourth Industrial Revolution. The services offered by the 5G platform are synergistic and scalable, allowing for significantly increased data rates across different radio access technologies (RATs). 5G technology allows companies to connect more devices with faster information exchange, which leads to increased potential vulnerabilities and significantly expanded threat and attack vectors. Security and privacy issues, such as network spoofing and lack of privacy in previous RAN generations, have been closely studied by security experts. To address these issues, the 3GPP standardization bodies have defined the AKA authentication and key management protocol and procedures. These include mutual authentication between user devices and the network, signal integrity and confidentiality, and derivation of cryptographic keys to protect U-plane and C-plane data.</p> <p>However, there are significant vulnerabilities in the 5G network APIs, in particular regarding weak protection of user personal data and the possibility of unauthorized access to IoT devices. These vulnerabilities are critical for remote control systems. The 5G-AKA protocol has been found to have shortcomings and it is generally believed that AKA does not provide adequate protection of personal data from active attackers. It is noted that AKA needs to be endowed with essential security features that are currently missing.</p> <p>The paper considers the implementation of quantum-protected encryption for the development of authentication protocols and key distribution in networks. The paper presents a key encapsulation algorithm based on the LINE cryptosystem with logarithmic signatures for the development of authentication and key coordination protocols in 5G networks. The use of LINE directional encryption offers advantages in scalability and heterogeneity, optimizing the computational and operational costs of the network.</p>Y. KotukhG. KhalimovI. DzhuraH. Hivrenko
Copyright (c) 2024
2025-03-312025-03-31219364510.30837/rt.2024.4.219.04Development and study of the algorithm for automated recognition of gas meter readings
http://rt.nure.ua/article/view/324893
<p>The relevance of developing an algorithm for automatic recognition of gas meter readings for test benches and real-time monitoring has been substantiated. A review of modern methods for recognizing readings on meter images has been conducted. The choice of the YOLOv10s neural network architecture for recognizing meter readings has been justified. The efficiency of the chosen architecture was validated after training it on a created meter images dataset. Based on the testing results, a second stage of recognition results processing was added, allowing the removal of background fragment detections and sorting the sequence of meter reading digits. In the second stage, a developed convolutional neural network was also employed, ensuring repeated verification of readings and error detection during recognition.</p>O.V. ZubkovO.C. YakovenkoC.V. StarokozevC.V. StarokozevM.V. Skorbatuk
Copyright (c) 2024
2025-03-162025-03-16219465210.30837/rt.2024.4.219.05Using the ARCore library to visualize keypoint clouds in navigation systems
http://rt.nure.ua/article/view/324894
<p>The article explores the prospects of using the ARCore to create navigation systems tailored for visually impaired individuals. The ARCore is an augmented reality platform that combines visual and inertial odometry to ensure precise device localization in space. The authors describe the key principles of the ARCore, including methods for extracting and tracking key points, integrating IMU readings, and calculating movement trajectories.</p> <p>Special attention is given to the architecture of the navigation system, which relies on smartphones to perform computational tasks such as SLAM algorithm implementation and neural network inference. The system processes data locally on the smartphone and transmits the results to a tactile feedback module via Bluetooth. This approach ensures the affordability and compactness of the final product.</p> <p>To improve data accuracy, the authors propose the use of clustering algorithms such as DBSCAN, Local Outlier Factor (LOF), and the Kalman filter. These methods are aimed at filtering out noise and stabilizing data, which is particularly crucial for building effective navigation systems.</p> <p>In conclusion, the authors highlight that combining the ARCore with neural networks and modern data processing algorithms opens new possibilities for creating accessible and functional solutions to improve the mobility of visually impaired individuals. Future research will focus on optimizing algorithms, training neural networks on specialized datasets, and experimentally testing the system in real-world conditions.</p>A.A. SokolovA.A. SokolovA.A. SokolovO.G. Avrunin
Copyright (c) 2024
2025-03-162025-03-16219535810.30837/rt.2024.4.219.06Аналіз зондувальних сигналів систем радіоакустичного зондування атмосфери в функціональному просторі
http://rt.nure.ua/article/view/324895
<p>Systems of radio acoustic sounding (RAS) of the atmosphere provide information on the state of processes occurring in the lower layers of the atmosphere. They allow measuring vertical profiles of atmospheric temperature, wind speed, and air humidity. The obtained information is used in applied tasks to ensure the takeoff and landing of aircraft, weather forecasting, and the study of atmospheric processes. However, the effectiveness of the existing radio-acoustic means is insufficient, and there are practical needs for the development of appropriate promising structures and algorithms that will be implemented during the construction of specific stations.</p> <p>The article presents new approaches and a new mathematical apparatus developed for use in the analysis and synthesis of probing signals of the RAS systems. The process of interaction of acoustic and electromagnetic signals in the environment is described using functional analysis and abstract mathematical spaces, which will make it possible to consider such signals together, use visual geometric representations, and generally increase the effectiveness of the tasks of research and synthesis of such complex, heterogeneous signals.</p> <p>The features of the distance surfaces for different pairs of probing signals were studied using the method of mathematical modeling. The general regularities of the studied surfaces of signal distances are as follows: there is a certain main lobe of the surface in which the connection of sounding acoustic and electromagnetic signals of different physical nature is significant. As the values of the parameters of the functional space increase, the degree of signal communication decreases, and depending on the shape of the contour signals, side lobes of the surface can be observed, the sizes of which depend on the characteristic features of the contours.</p> <p>The obtained research results will provide the possibility of setting up and solving the actual problems of analysis and synthesis of sounding signals using the mathematical apparatus of functional analysis.</p>A.P. ShamraiI.E. Kondrashov
Copyright (c) 2024
2025-03-162025-03-16219596710.30837/rt.2024.4.219.07Improving the level of formalization of management processes at the main stages of electronic countermeasures against small unmanned aircraft systems to obtain conflict advantages
http://rt.nure.ua/article/view/324897
<p>The possibilities are shown to achieve the RES complex conflict advantages in the dynamics of the conflict with a small unmanned system by rising its controllability as a result of improving the level of formalization of the processes for ensuring effectiveness at the main stages of its functioning. Along with the general features of the formalization of cycles within the stage-by-stage cognitive situational management of the REP complex, a number of its differences in the construction of control loops for individual stages are considered. They concern obtaining a high-quality information description of conflict situations when forming situational awareness, a well-founded choice of composition and optimization of the procedure for applying effective technical executive means of intelligence and various types of suppression in the contours of their management cycles. At the same time, a certain list of private performance characteristics and the values of their indicators, which are critically important for the UAS and the RES complex, is used as a systemic formalization tool for formalizing the description of conflict situations and management cycles for their resolution, which has certain features and relationships at individual stages.</p> <p>The formed list of indicators of key private performance characteristics objectively reflects the conditions and results of the use of means of observation and counteraction of the RES complex to small UAS at the main stages of its functioning. The sequence of their application comprehensively covers the main components that affect the quality of functioning of the corresponding means of the circuits of the cycles of the internal stage situational control of the RES complex.</p> <p>Increasing requirements for private performance characteristics, consistent with the vulnerabilities of UAVs, and restrictions on material resource costs and time shortages are sources of finding ways to effectively solve the problems of timely (early) detection of small UAVs and the phased implementation of various types of their suppression, which are increasingly strengthened, taking into account the specifics and tactics of using UAS.</p>V.M. Kantsedal
Copyright (c) 2024
2025-03-162025-03-16219688110.30837/rt.2024.4.219.08Mathematical modelling of unmanned aerial vehicle based wideband spectrum sensing
http://rt.nure.ua/article/view/324899
<p>The number of low-power radio electronic devices is constantly increasing in modern information society. The detection of such radio frequency sources (RFS), their localization and parameters estimation using stationary radio monitoring equipment, especially in cities, is ineffective. By placing a sensor on an unmanned aerial vehicle (UAV), it is possible to collect data about spatial, frequency and time parameters of RFS in a certain volume by flying around it and analyzing received signals. The absence or incompleteness of a priori information about the RFS and the radio wave propagation medium requires the creation of an appropriate mathematical model that will take into account the unknown parameters of RFS and the radio wave propagation medium, as well as the movement of radio sensor. The aim of the article is to optimize the process of analyzing the electromagnetic environment using a panoramic spectrum sensor placed on UAVs by developing a mathematical model of the received signal that takes into account the effects of radio wave propagation caused by UAVs’ movement. It was found that the change of received signal strength depends on distance between the transmitter and the receiver is determined by propagation losses, shadowing, fading due to multipath propagation and the non-isotropy of the directional patterns of the RFS. Processing received signal strength, taking into account the terrain and the location of other objects on the UAV flight trajectory, will allow us to approximately estimate the location of RFS provided that its position remains unchanged. An increase in the number of flights along different routes will increase the accuracy of estimating the coordinates of RFS. In result of the research, a mathematical model was obtained that describes the received signal strength under the influence of multi-scale fading and takes into account the scanning mode of the radio sensor, its movement, and unknown shape of the RFS antenna pattern. in modern information society, Proposals were made to separate fading components using low-pass filtering. This will make it possible to estimate the location of the RFS in the case of joint processing of the measured values of the received signal strength and the UAV flight trajectory.</p>M.V. Buhaiov
Copyright (c) 2024
2025-03-162025-03-16219829110.30837/rt.2024.4.219.09New approaches to creating ultralight solar arrays for ultrasmall spacecrafts
http://rt.nure.ua/article/view/324900
<p>New approaches to selecting design-technological solutions of improved relatively flexible ul-tralight solar modules based on aluminium-polyimide boards using the most novel thin multi-junction GaAs solar cells of a new generation with an efficiency of 30% – 32% were developed in this work. The developed approaches confirm principal possibility of manufacturing ultralight solar modules with an area of about 250 cm<sup>2</sup> with specific power per area about 336 – 364 W/m<sup>2</sup> and significantly increased specific power per mass not less than 309 – 453 W/kg (for solar cells 30% and 32% efficiency respectively) at BOL for solar arrays of ultra-small CubeSat-class spacecrafts, as well as for solar modules for solar arrays of stratospheric drone (quasi-satellites).</p> <p>The technology proposed by the authors’ team is used for manufacturing reliably protected solar arrays on carbon-plastic ultralight panels and relatively flexible aluminium-polyimide solar modules based on thin 3G30C – Advanced solar cells 80 microns thick with efficiency 30% from AZUR SPACE Solar Power company for CubeSat – 3U class spacecrafts. The developed new approaches allow manufacturing solar arrays with their total thickness up to 840 microns and mass no more than 42 g, what is 2,5 times less than for domestic ultra-small CubeSat – 3U spacecraft "GS-1" type from Yuzhnoye design office. At the same time, the estimated specific energy efficiency of such solar arrays at BOL for AM0 conditions, T = 25ºС over the area can be about 336 W/m<sup>2</sup>. The estimated specific energy efficiency of the arrays by mass can be at least 200 W/kg with a specific mass of the solar arrays by area about 1,55 kg/m<sup>2</sup>.</p>V.M. BorshchovO.M. ListratenkoM.A. ProtsenkoI.T. TymchukO.V. KravchenkoK.G. BilousovI.T. Perekopskyi
Copyright (c) 2024
2025-03-162025-03-162199210310.30837/rt.2024.4.219.10Study of Flocke-Bloch waves depending on the spectral parameter for a one-dimensional photonic crystal
http://rt.nure.ua/article/view/324902
<p>The presence of forbidden and permitted bands in the parameters of diffraction processes on crystal structures is one of the main phenomena, thanks to which the latter have mostly proven their practical application. An understanding of the nature of the appearance of such forbidden bands for one-dimensional photonic crystals is provided by dispersion equations. One of the forms of this dispersion equation can be written through the solution of the spectral equation taken in the context of the Sturm-Liouville problem, posed accordingly for a one-dimensional photonic crystal (the Sturm-Liouville problem arises in connection with the application of the method of separation of variables to the wave equation).</p> <p>The current work is a continuation of the work on finding the 1st and 2nd derivatives by the spectral parameter from the solution of the spectral equation. In previous works, it was found that the 1st derivative of the solution of the spectral equation in terms of the spectral parameter is represented linearly through the solution itself and its derivative, but in terms of the spatial variable. This circumstance prompted us later to think about the possibility of writing down the 2nd derivative in a similar form. In this work, the dispersion equation for a one-dimensional photonic crystal is derived. According to the form of the equation obtained in such aoway, it is fair to assign an important role to the functions that are the solution of the spectral equation in connection with the desire to develop an alternative view of the dispersion equation itself. It is also shown that it is possible to represent linearly the 2nd derivative of the solution of the spectral equation. The authors state that the coefficients of the 2nd derivative are relatively uncomplicated for functions bearing linearity (the function itself and its derivative with respect to the spatial variable). Finally, a linear differential equation of the 2nd order is written with respect to the solution of the spectral equation of the function as a function of the spectral parameter.</p>O.V. KazankoO.Ye. Penkina
Copyright (c) 2024
2025-03-162025-03-1621910411110.30837/rt.2024.4.219.11Analysis of digital interfaces data transmission in communication channels of computer systems
http://rt.nure.ua/article/view/324904
<p>This work demonstrates that digital data transmission interfaces in communication channels of computer systems directly affect the speed and quality of data transmission. It provides an overview and analysis of the main encoding methods for synchronous and asynchronous data transmission, along with an example of encoding two bits of information using a quadrature-phase modulator. The text encoding system (IRA) and the American Standard Code for Information Interchange (ASCII) are analyzed. The main methods of data transmission in synchronous and asynchronous modes are reviewed, and their key characteristics, advantages, and disadvantages when used in data transmission interfaces in computer systems are identified. This article examines two of the most important interface types: V.24/EIA-232F and ISDN. This is demonstrated through an analysis of an information transmission system, with a detailed description of the equipment that can be used under specific conditions and requirements. The article also provides details on the use of different network configurations. The main principles of programming modems and multiplexers for digital information transmission using a digital communication channel for defined usage scenarios are also presented.</p>V.V. DovhijA.I. TerletskyV.M. HryhaI.V. Svyd
Copyright (c) 2024
2025-03-162025-03-1621911212310.30837/rt.2024.4.219.12Directions for implementing the graphic style of the Armed Forces of Ukraine in the design of an electronic multimedia training manual on tactical training
http://rt.nure.ua/article/view/324905
<p>The main problems of introducing a graphic style in the visual communication of the Armed Forces of Ukraine into the design of an electronic multimedia training publication on tactical training were analyzed: the use of single colors for the structural formations of the Armed Forces of Ukraine for the design of all types of military publications; application for the development of design and layout of all types of media exclusively of one (basic) font UAF Sans.</p> <p>As a result of the conducted analysis, it was established that when developing the design of an electronic educational publication on tactical training, this approach does not fully meet the requirements for its compliance with the interests of the target audience and the connection with the subject matter of the material. Based on the experience of creating an electronic multimedia training manual "Tactical training (mechanized detachment)", a not quite successful implementation of the literal approach, in terms of requirements for the graphic style of the Armed Forces of Ukraine, was demonstrated when creating the color scheme of the main screen.</p> <p>The results of the research conducted by the team of marketers and designers of the dissidend creative agency on the study of the psychology of color and its impact on consumers of different ages and genders are presented, which confirm the inconsistency of the established colors with the preferences of the target audience – young people, mainly males.</p> <p>Ways to solve the problems of introducing the graphic style of the Armed Forces of Ukraine into the design of the electronic multimedia training manual "General Tactics (Mechanized Division)" are proposed, taking into account the topic of the publication and the interest of the target audience: using a combination of colors close in saturation to create a color gamut of the publication's screens (creating a contrast in saturation ) "Uniform" and "Step" by the method of radial gradient filling of the background of the screens or the contrast of diametrically opposite colors: yellow, blue and green; application for emphasis when creating the typography of the basic communication font of the Armed Forces of Ukraine UAF Sans of various sizes and changing its drawings, creating italics using the features of the Figma program regarding the inclination of letters.</p> <p>As a result of the study, based on the proposed approaches, created examples of the cover and the main screen of the educational publication are presented.</p>A.V. BiziukN.G. Zmiivska
Copyright (c) 2024
2025-03-162025-03-1621912413010.30837/rt.2024.4.219.13On the issue of substantiating mathematical models of technical and economic indicators of gas distribution systems under conditions of uncertainty
http://rt.nure.ua/article/view/324906
<p>The issues of reliability of gas transportation systems and their functioning in conditions of uncertainty are very relevant today. This is due to the fact that in the last few years the political and economic situation in the country has changed significantly, the quantitative and qualitative composition of the population, and logistics routes have changed. There has also been a rapid growth in modern technology and equipment. Because of these factors, it is necessary to change the approach to the structure of the entire heat and power supply system as a whole, to the choice of energy carrier, as well as to the elements of gas transportation systems, for example, gas distribution systems. When solving these problems, certain problems arise that are difficult or impossible to solve using traditional methods of optimization calculations.</p> <p>One of the ways to reliably provide energy resources to end consumers is the decentralization of such systems, the construction of new ones, reconstruction and maintenance of the reliable functioning of individual elements and components. The purpose of this work is to consider ways to improve the efficiency of design, redesign and reconstruction of gas distribution systems and to substantiate mathematical models of technical and economic indicators of gas distribution systems under conditions of uncertainty.</p> <p>The article explores the issue of determining the optimal construction sequence and the procedure for putting into operation a new system (or reconstruction of an existing system), in which the total costs during construction (reconstruction) would be minimal. At the same time, determining the priority of construction (reconstruction) of gas distribution systems should be carried out taking into account the characteristic features, including taking into account the directions and areas of consumer location, types and existing energy distribution schemes.</p> <p>A mathematical model of the heat and power supply system for a certain territorial unit (region, settlement, district, etc.) or a single group of consumers is also given. Transportation of energy carriers is carried out through “logistics” points. This model allows for comparison of different (from the point of view of routing) schemes for providing a territorial unit with the same energy carrier, provided that they have different energy carriers.</p> <p>The issues discussed in the article will make it possible to further improve the process of creating and operating models, methods and information technologies for monitoring the condition of gas distribution systems under conditions of uncertainty.</p>A. PaleyevV. KotukhY. HusievaK. Paleyeva
Copyright (c) 2024
2025-03-162025-03-1621913113710.30837/rt.2024.4.219.14