<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Method of Detecting Radio Signals Using the Approximation of Spectral Function</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Laptiev</string-name>
          <email>oalaptiev@knu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valentyn Sobchuk</string-name>
          <email>v.v.sobchuk@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Igor Subach</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Barabash</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivanna Salanda</string-name>
          <email>salanda.ivanna@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”</institution>
          ,
          <addr-line>Victory Avenue, 37, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska St., 60, Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Ternopil Regional Council Taras Shevchenko Regional Humanitarian-Pedagogical Academy of Kremenets</institution>
          ,
          <addr-line>prov. Lyceiny, 1, Kremenets, Ternopil region, 47003</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>52</fpage>
      <lpage>61</lpage>
      <abstract>
        <p>The article has developed a new method of detecting radio signals of unspoken information that is used to transmit intercepted information via radio channels. The novelty of the method is the synergy of two different methods. The first method of differential transformations and the second is the method of optimizing the spectral function, which is based on the use of functions of transmission of resonance units of the second order. The first method is the method of differential transformations, used directly to solve nonlinear equations of radio signal models, its advantage, is the fact that this method allows the resolution of the equation without preliminary linearization. This method is used to determine the range of radio signals. That is, using the differential transformation method, we get a signal spectrum. The second pronounced method is used to obtain radio signal parameters on which an unknown radio signal is detected. It is for the detection of signs of solid information. The main advantage of the general method developed is the significant decrease in the quantity of computing. This reduces the time of analysis of the parameters of radio signals and allows to detection short -term, impulse signals that can be radio signals of unspoken information. Mathematical modeling was performed in order to test the developed methodology. The exponential function signal was selected as a simulator signal. The results of the modeling are obtained in the form of adequate graphic materials and the efficiency of the developed method to identify radio signals as the means of silent information.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Approximation</kwd>
        <kwd>integral transformations</kwd>
        <kwd>spectrum</kwd>
        <kwd>signal modeling</kwd>
        <kwd>formant</kwd>
        <kwd>linearization</kwd>
        <kwd>resonant links</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The study of information technologies leads not only to positive but also to negative consequences. The
role of the information component in the life of society and the state is growing sharply. Ensuring the safety
of society and the state as a whole depends on the information component. In this connection, the importance
and value of information increase. As the value of information grows, so does the importance of protecting it.
In addition, now information has a large economic component. Violation of confidentiality or integrity of
information will lead to material losses. One of the directions for obtaining confidential information is the use
of means of secretly obtaining information. The rapid development of technologies and element bases made it
possible to take a big step in the development of devices and means of secretly obtaining information. For
example, this refers to the actively used in the modern period means of secretly obtaining information with the
accumulation of intercepted information, its compression, and subsequent extremely short transmission in
time. The study of the elemental base for household devices simultaneously leads to the use of the same
elemental base for the means of tacitly obtaining information. That is, the next danger is that the means of
secretly obtaining information work in the general radio range and are disguised under known radio
transmission standards.</p>
      <p>Under channels of DECT, Bluetooth, Wi-Fi, GSM, etc. standards. The existing hardware and software
and other complexes of detection and localization of these means do not always keep up with the intelligence
of the means of covertly obtaining information. Therefore, there is a contradiction between the existing
scientific and methodological support of hardware and software complexes for the detection and localization
of means of covertly obtaining information and new principles and methods of the possibility of obtaining
confidential information by means of covertly obtaining information. To solve this urgent scientific problem,
a method of detecting signals of the means of covert information acquisition has been developed, based on the
synergy of two methods of differential transformation of a function and approximation of a spectral function
based on the transfer functions of second order resonant links.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review and problem statement</title>
      <p>Currently, most of the known scientific and methodological approaches and methods of modeling the
process of detecting random radio signals differ in input parameters. That is, which parameters in the
simulation are used as input information, and which parameters of the radio signals of the system are
calculated. Derived for the purpose of further analysis. Most often, models are built that are based on and use
probability theory, graph theory, and fuzzy sets [1]. An attempt to develop a mathematical apparatus for
differential transformations of mathematical functions and its application to the class of random or stochastic
functions and processes was made in [2]. The mathematical apparatus of differential transformations were
applied to the vector random function, which underwent the differentiation procedure the required number of
times. This event significantly limited the possibilities of differential transformations within the local area of
the intersection of the random process for each fixed moment of time. Therefore, this application of differential
transformations provided only an approximate method of modeling random radio signals.</p>
      <p>In [3], the mathematical modeling process is considered the process of mathematical modeling of specific
parameters, but some parameters are probabilistic. Therefore, there is an error, an error that is embedded
already at the initial stage. This work does not consider the issue of correlation of input parameters when
modeling processes and the depth of their relationship in the model. But these factors of correlation and
interaction can significantly distort the modeling results and call into question the adequacy of the model and
the obtained results. That is, the process of modeling according to such principles is not final.</p>
      <p>In [4, 5] there are generalized methods of detecting signals of means of tacit information. According to the
principle of operation of these methods, all identified signals are entered into the database. Then the signals
undergo a sequential spectral or another method of analysis. However, the issue of analyzing the parameters
of complex radio signals. As a result, significant mathematical and technical resources are used. This leads to
an increase in the time of analysis and searches for dangerous radio signals, which can lead to omission and,
as a consequence, the inability to determine short-term pulse signals, which can be signals of covert means of
obtaining information. In [6], a general approach is proposed, which does not allow for accurate modeling of
random processes. This approach has a very large number of limitations. But for private cases, this possibility
of more precise determination of modeling parameters exists. It exists because differential transformations
belong to exact operational methods, but this possibility is not considered in this material.</p>
      <p>The approach to the detection of radio signals proposed in [7] significantly complicates the analysis of
modern radio monitoring in the interest of ensuring the detection of radio signals by means of clandestine
information acquisition. The problem is that today's covertly installed or embedded devices that transmit
information over a radio channel increasingly use the same information transmission standards as the signals
of devices that must work in the same radio range and are located in rooms where the means of stealth detection
and blocking are carried out obtaining information. Thus, previous radio monitoring methods are unable to
detect and identify embedded devices that are masquerading as signals from devices that are legally operating
in a given frequency range. Therefore, it is necessary to develop new devices and methods of finding secret
means of obtaining information that works in the permitted frequency ranges.</p>
      <p>The above factors allow us to conclude that at the current stage of the development of society, the process
of searching for dangerous signals is moving to a qualitatively different level. The problem is that it is very
difficult to distinguish between a legitimate device that works as intended and a classified information device.</p>
      <p>The analysis carried out in this way proved that there is a contradiction between the existing scientific and
methodological support of hardware and software complexes for detecting and localizing the means of covertly
obtaining information and new principles and methods of the possibility of obtaining confidential information
by means of covertly obtaining information. Therefore, the issue of solving this scientific and applied task is
very urgent.</p>
    </sec>
    <sec id="sec-3">
      <title>Formulation of the problem</title>
      <p>The conducted analysis proved that there is a contradiction between the existing scientific and
methodological support of the hardware and software complexes of detection and localization of means of
clandestine information acquisition and new principles and methods of the possibility of obtaining confidential
information by means of clandestine information acquisition. Therefore, the issue of solving this scientific and
applied task is very urgent.</p>
    </sec>
    <sec id="sec-4">
      <title>The main section</title>
      <p>To detect the signals of covert means of obtaining information, it is proposed to use in the first stage, in
order to obtain a spectrum of signals (spectral function), the method of differential transformations. But in the
second stage, in order to obtain the component signals, use the method of approximation of the spectral
function in the basis of the transfer functions of the resonant units of the second order.</p>
      <p>In order to determine the spectral function, random signals, which are possible and are signals of covert
means of obtaining information. We will use the method of differential transformations at the first stage [8].
Therefore, the main advantage of this method is that it can be used directly to solve nonlinear equations without
prior linearization. Allows you to get results in analytical form and reduces the amount of computational work.
In General, the differential transformations have the form:
where:
 ( )=  ( )=
¯
    ( ( )
 !
with all its derivatives, the function of the real argument  ;</p>
      <p>¯
function of the integer argument  = 0,1,2 …;
which the function  ( )is considered;
 ( )is the original, which is continuous, differentiated an infinite number of times, and limited together
 ( )and  ( )are equivalent notation of the differential image of the original, which represents a discrete
 – scale, which has the dimension of the argument  , is often chosen equal to the segment 0 ≤  ≤  , on
● is the correspondence symbol between the original  ( )and its differential image  ( )=  ( ).</p>
      <p>
        In transformations (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) to the left of the symbol ● there is a direct transformation, which allows the original
 ( )to find the image  ( ), and to the right the inverse transformation, which allows the image  ( )to obtain
a signal  ( )in the form of a power series which is nothing but a Taylor series with center at point  = 0. The
value
      </p>
      <p>must be less than the convergence radius of the series , which can be determined on the basis of the
convergence sign d’Alembert:
 = lim |
 →∞   :
  +1 | =  lim |
 →∞  ( + 1)</p>
      <p>|.
 ( )  ( + 1)
 ( )</p>
      <p>
        Transformation (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) is called differential Taylor transformations, or more simply  –transformations.
Differential images  ( )are called differential  –spectrums, and the values of  –functions  ( )at specific
values of the argument  are called discrete [9–11]. To detect signals of covert means of obtaining information,
it is proposed to determine the range of signals, i.e.  ( ). The signals of the means of covert retrieval of
information can be approximated by exponential or harmonic series [12]. Then, for further presentation of the
method, we define the differential spectrum of exponential and harmonic functions. For an exponential
function of the form  ( ) = 
= 
(
      </p>
      <p>
        ), where  is the signal frequency, using expression (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), we
obtain:
     
 ! [    ]
=
(
 !

)
      </p>
      <p>
        .
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
¯
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
 !
 !
 !
 !

)

)
sin
2
expression (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), we obtain:
or:

signals that are approximated by exponential or sinusoidal components. The second stage is to approximate
the spectral function in the basis of the transfer functions of the resonant units of the second order [13–15, 20].
The spectral slice of a random signal is defined at the first stage, we denote it –  (
,  ).
      </p>
      <p>Assume that the random signal model has the form:
where  = [ , ∞],  – signal analysis interval.
the second-order transfer units on the spectrum:</p>
      <p>
        The differential spectrum for this signal takes the form of expression (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ).
      </p>
      <p>Let us construct model  (
,  )of the function  (</p>
      <p>,  ), in the form of the product  of the modules of
   2 =
∑
2 (ln (  ,   )− 2 ln(
∑[2 ln  + ln(  2 +  2)]— [ln((  2 −  2)2 + (2    )2)] (
  
 !
)),
where   −   -th signal analysis interval.</p>
      <p>Then we get:
 (  ,   )= | (  )|2 ∏|  ( )|2 =

 =1
(   )2
 !</p>
      <p>∏
 =1
 2(  2 +  2)

( 2 +  2 −  2)2 + (2 
  )2</p>
      <p>Coefficients  ,   ,   ,   we will look by the method of least squares. The error estimate will then look like:
ln (  ,   )= 2 ln(  !
   )+</p>
      <p>∑[2 ln  + ln(  2 +  2)] −</p>
      <p>=1
[ln(( 2 +  2 −  2)2 + (2    )2)] .

 =1
  2 =
∑[ln (  ,   )− ln (  ,   )]2,
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
   2 =
 !
 !</p>
      <p>∑[2 ln  + ln(  2 +  2)] − ln((  2 −  2)2 + (2 
+
4  (  2 −  2)2 + 8 2
( 2 −  2)2 + (2 2

  2)22)),
  )2)( 2 +  2
2 
−
∑[2 ln  + ln(  2 +  2)] − [ln((  2 −  2)2 + (2</p>
      <p>)2)] ×
2 
previous work [6, 7, 15–19] proved that three components of signal approximation are enough to fully establish
Moreover, we will assume that the variables will be the frequency and variable on which we will differentiate.
Then equation (13) will take the form:
  2 = ∑2(ln (  ,  )− 2 ln(
 !</p>
      <p>! ))
− [ln(( 2 −  2)2 + (2</p>
      <p>)2)](
= (ln (  ,  )− 2ln  − ln( 2 +  2)− ln( 2 −  2 )2 − 4 2
 2)  
+ (ln (  ,  )− 4ln  − ln( 2 +  2)− ln( 2 −  2 )2 − 4 2
 2)
+ (ln (  ,  )− 6ln  − ln( 2 +  2)− ln( 2 −  2 )2 − 4 2
 2)
= (ln (  ,  )− 2ln   − ln( 2 +  2)− ln( 2 −  2 )2 − 4 2
 2)
(   )2
( 2 )3
6
× (   +
(   )2
2
+
(   )3
6
)− 2ln</p>
      <p>− 4ln 
(   )2
2
(   )3
6
(17)</p>
      <p>Let us construct a graph that will clearly show the accuracy of the approximation when calculating the
coefficient  . The graph of the similarity of a number of approximations of the function with its original is
shown in Fig. 1. This indicates the adequacy of the proposed model for estimating the parameter of
approximation  . Equation (14) will take the form:</p>
      <p>
        )2)](
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))= (ln (  ,   )− 2ln  − ln( 2 +  2)− ln( 2 −  2 )2 −
4 2
 2)1 + (ln (  ,  )− 4ln   − ln( 2 +  2)− ln( 2 −  2 )2 − 4 2
 2)1 +
(ln (  ,  )− 6ln  − ln( 2 +  2)− ln( 2 −  2 )2 − 4 2
 2)1 = (ln (  ,  )− 2ln  −
ln( 2 +  2)− ln( 2 −  2 )2 − 4 2
 2)(1 )− 6ln  .
      </p>
      <p>(18)</p>
      <p>Let us construct a graph, that will clearly show the accuracy of the approximation when calculating the
coefficient  . Graph of the similarity of the series of approximation of the function with its original. As you
can see from graph Fig. 2, for the given parameters of the first accented forms, the error does not exceed
9,5 %. This indicates the adequacy of the proposed model for estimating the parameter of approximation  .
Equation (15) will take the form:
∑2(ln (  ,  )− 2 ln(
 !
 =1

 =1
 !
− [ln(( 2 −  2)2 + (2    )2)][ 2 +  2 +
− [ln(( 2 −  2)2 + (2    )2)]
× [2 2( 2 −  2 )2 + 8 2 4 + ( 2 +  2)+ 2[4  ( 2 −  2 )+ 8 2
 2]]
( 2 +  2)[( 2 −  2 )2 + 4 2
= ln (  ,  )− 2ln(   )− 4ln( 2 )− 6ln6
− 3∑[2ln  + ln(  2 +  2)] − [ln(( 2 −  2)2 + (2</p>
      <p>)2)]
× 2 2( 2 −  2 )2 + 8 2
 4 + ( 2 +  2)+ 2[4  ( 2 −  2 )+ 8 2</p>
      <p>2].
( 2 +  2)[( 2 −  2 )2 + 4 2
(19)</p>
      <p>Let us construct a graph that will clearly show the accuracy of the approximation when calculating the
can see from graph Fig. 3, for the given parameters of the first accented forms, the error does not exceed
14,5 %. This indicates the adequacy of the proposed model for estimating the parameter of approximation  .
Equation (16) will take the form:
  
 !
 =1
∑2 (ln (  ,   )− 2 ln(</p>
      <p>∑[2 ln  + ln(  2 +  2)] − [ln(( 2 −  2)2 + (2    )2)]
×

 =1
2 2(  2 −  2 )2 + 8 2
 4 + 8 2</p>
      <p>2( 2 +  2).
( 2 +  2)[( 2 −  2 )2 + 4 2
]) = ln (  ,   )− 2 ln(   )− 4 ln( 2 )− 6ln6</p>
      <p>We construct a graph that will clearly show the accuracy of the approximation when calculating the
coefficient  . The graph of similarity of a number of approximation of function with its original is given in
not exceed 15,5%. This indicates the adequacy of the proposed model for estimating the parameter of
approximation  .</p>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion of experimental results</title>
      <p>The peculiarity of the method is that the developed method of detecting the signals of the means of covert
obtaining of information allows detecting signals with greater efficiency by approximating the spectral
function based on the transfer functions of the resonant units of the second order. The novelty of the method
is a combination of two methods, the method of differential transformations and the method of approximation
of the spectral function based on the transfer functions of resonant units of the second order. The signals of the
means of covert information retrieval can be approximated by Taylor differential transformations, or, more
simply, by T transformations. In addition, differential images are differential T spectra.</p>
      <p>An additional feature of the proposed method is that we use to detect the signals of the means of covert
information is proposed to use in the first stage to obtain a range of signals, the method of differential
transformations. In the second stage to obtain component signals using the method of approximation of the
spectral function based on the transfer functions of resonant units of the second order. The main limitation, the
use of components of the method is that we use only five components of approximations, determining the
function of the signal. We choose five components because the calculations proved the sufficiency of the three
components of the approximations, but in order to improve the results, we choose five components.</p>
      <p>This allows you to reduce the number of calculations and take advantage of both methods.</p>
      <p>The main advantage of the proposed method is that it can be applied directly to solving systems of nonlinear
equations without their prior linearization, allows solutions in analytical form, which significantly reduces the
amount of computational work, and significantly reduces the time to search for signals.</p>
      <p>Method of differential transformations. Unlike the well-known Laplace and Fourier integral
transformations, images are found by differentiation rather than integration operations. The advantage of this
method is that it can be used directly to solve systems of nonlinear equations without their prior linearization.
The method of approximation of the spectral function on the basis of the transfer functions of the second-order
resonant units allows for the calculation of the parameters of the signals on the slice of the spectral function.
Prior to that, the cut-off time or the time determined to determine the signal parameters is selected to determine
the general comparative parameters of the spectrum. The parameters for selecting the cut time are set by the
complex. It is set by selecting several parameters to determine the signals, such as exceeding the amplitude,
determining the phase deviation, the presence of the second or third harmonic, and so on.To confirm the
proposed developed method, the modeling of the method of signal detection of means of latent information
retrieval on the basis of approximation of the spectral function in the basis of the transfer functions of resonant
units of the second order is carried out. The simulation was performed in order to determine the approximation
error by the proposed method. The obtained graphical materials, fully confirming the possibility of determining
the signal of the means of concealed information by the proposed method, confirm that the approximation
error is in the range of 5.5-14.5%, which is a good result and proves the reliability of the proposed method,
proving the advantages of the developed method which exist today. Further ways to improve the method can
be done, taking into account the noise of the device and interference from search signals.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>A newly developed method of detecting modern technical means of clandestine information acquisition,
which use a radio channel to transmit intercepted information, is proposed. The method is based on the synergy
of two methods: the method of differential transformations and the method of approximation of the spectral
function based on the transfer functions of second-order resonant nodes.</p>
      <p>It is proved that the radio signals of means of covert information acquisition can be approximated by
differential Taylor transformations, or more simply by T-transformations. In addition, it is shown that the
differential images are differential T-spectra. The principle of the new method is as follows.</p>
      <p>In the first step, the signal spectrum (spectral functions) is determined. The resulting spectral function is
approximated using the transfer functions of second-order resonant nodes. This is done in order to detect signal
parameters, parameters of all radio signals. We pay special attention to short-term random signals. We are
conducting further analysis of the extraction of the components of the essential radio signal in order to
determine the signals of means of clandestine information acquisition. The obtained results make it possible
to determine the radio signals of means of covert information acquisition, which have deviations from the
signals of technical means constantly working in the given radio range.</p>
      <p>Mathematical modeling of the proposed approach was carried out according to the developed method. For
this, the MATLAB software environment was used. Signals described by an exponential function were used
as random signals imitating the signals of means of tacit information acquisition. During simulation,
approximation errors were determined, based on the simulation results, the value of the approximation error
in relative units did not exceed 10% on average. The simulation results are presented in analytical and graphical
form. The obtained results confirm the adequacy of the developed method.</p>
    </sec>
    <sec id="sec-7">
      <title>7. References</title>
      <p>
        [4] Khan, R.A., Yang, S., Fahad, S., Khan, S., Khan, J.A. A Modified Particle Swarm Optimization for the
Applications of Electromagnetic Devices Proceedings - 2021 2nd International Conference on
Electronics, Communications and Information Technology, CECIT 2021, 2021, pp. 91–96
[5] Fahad, S., Yang, S., Khan, R.A., Khan, S., Khan, S.A.A multimodal smart quantum particle swarm
optimization for electromagnetic design optimization problems Energiesthis link is disabled, 2021,
14(15), 4613
[6] Nikodem, J., Nikodem, M., Klempous, R., Gawlowski, P. Wi-Fi Communication and IoT Technologies
to Improve Emergency Triage Training. Advances in Intelligent Systems and Computing, 2020, 1173
AISC, pp. 451–460
[7] Marzec, M., Olech, M., Klempous, R., Nikodem, J., Kluwak, K., Chiu, C., Kolcz, A. Virtual reality
poststroke rehabilitation with localization algorithm enhancement.5th International Conference of the
Virtual and Augmented Reality in Education, VARE 2019, 2019, pp. 28–35
[8] Nikodem, M., Nikodem, J., Klempous, R., Gawlowski, P., Bawiec, M.A. Smart Sensors and
Communication Technologies for Triage Procedures Lecture Notes in Computer Science (including
subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)this link is disabled,
2020, 12014 LNCS, pp. 305–312
[9] Alsawwaf, M., Chaczko, Z., Kulbacki, M., Sarathy, N. In Your Face: Person Identification Through
Ratios and Distances Between Facial Features. Vietnam Journal of Computer Science, 2022, 9(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), pp.
187–202
[10] Alsawwaf, M., Chaczko, Z., Kulbacki, M. In Your Face: Person Identification Through Ratios of
Distances Between Facial Features. Lecture Notes in Computer Science (including subseries Lecture
Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)this link is disabled, 2020, 12034
LNAI, pp. 527–536
[11] Goudarzi, S., Soleymani, S.A., Anisi, M.H., et al. Real-time and intelligent flood forecasting using
UAVassisted wireless sensor network.Computers, Materials and Continuathis link is disabled, 2021, 70(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), pp.
715–738
[12] Hakim, G., Braun, R. Wireless Sensor Network Routing for Energy Efficiency. Lecture Notes in
      </p>
      <p>
        Networks and Systemsthis link is disabled, 2022, 364 LNNS, pp. 329–343
[13] Abdollahi, M., Ashtari, S., Abolhasan, M.,Shariati,N.,Lipman, J., Jamalipour, A., Ni, W. Dynamic
Routing Protocol Selection in Multi-Hop Device-to-Device Wireless Networks.IEEE Transactions on
Vehicular Technologythis link is disabled, 2022, 71(8), pp. 8796–8809
[14] Babakian, A., Monclus, P., Braun, R., Lipman, J. A Retrospective on Workload Identifiers: From Data
Center to Cloud-Native Networks. IEEE Accessthis link is disabled, 2022, 10, pp. 105518–105527System
Functioning. International Journal of Computer Network and Information Security(IJCNIS), IJCNIS Vol.
13, No. 1, Feb. 2021. pp 16–28. DOI: 10.5815/ijcnis.2021.01.02
[15] Oleksandr Laptiev, Vitalii Savchenko, Andrii Pravdyvyi, Ivan Ablazov, Rostyslav Lisnevskyi, Oleksandr
Kolos, Viktor Hudyma. Method of Detecting Radio Signals using Means of Covert by Obtaining
Information on the basis of Random Signals Model. International Journal of Communication Networks
and Information Security (IJCNIS), Vol. 13, No. 1, 2021. рр.48-54.
[16] O.Svynchuk, O. Barabash, J.Nikodem, R. Kochan, O. Laptiev. Image compression using fractal
functions.Fractal and Fractional, 2021, 5(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), 31.pp.1-14 DOI:10.3390/fractalfract5020031 - 14 Apr 2021
[17] Oleg Barabash, Oleksandr Laptiev, Valentyn Sobchuk, Ivanna Salanda, Yulia Melnychuk, Valerii
Lishchyna. Comprehensive Methods of Evaluation of Distance Learning System Functioning.
International Journal of Computer Network and Information Security (IJCNIS). Vol. 13, No. 3, Jun. 2021.
рр.62-71, DOI: 10.5815/ijcnis.2021.03.06
[18] Kochan, R., Yevseiev, S., Korolyov, R., Milevskyi, S., Ireifidzh, I. University of Bielsko-Biala, 2 Willowa
str., Bielsko-Biala, PolandGancarczyk, T., Szklarczyk, R. Development of Methods for Improving Crypto
Transformations in the Block-Symmetric Code IDAACS-SWS 2020 - 5th IEEE International Symposium
on Smart and Wireless Systems within the International Conferences on Intelligent Data Acquisition and
Advanced Computing Systems, Proceedings, 2020, 9297102
[19] M. Z. Ahmad, D. Alsarayreh, A. Alsarayreh, I. Qaralleh Differential Transformation Method (DTM) for
      </p>
      <p>Solving SIS and SI Epidemic Models. Sains Malaysiana. 2017. Vol. 46(10). pр. 2007–2017.
[20] Nykolaychuk, Y.M., Yakymenko, I.Z., Vozna, N.Y., Kasianchuk, M.M. Residue Number System
Asymmetric Cryptoalgorithms Cybernetics and Systems Analysisthis link is disabled, 2022, 58(4), pp.
611–618</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Milov O S. Yevseiev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Ponomarenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Laptiev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <article-title>Milov and others</article-title>
          .
          <source>Synergy of building cybersecurity systems: monograph /</source>
          Edited by-
          <source>Kharkiv: PC TECHNOLOGY CENTER</source>
          ,
          <year>2021</year>
          . - 188 p. http://monograph.com.ua/pctc/catalog/book/64
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahad</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalimullah</surname>
            .
            <given-names>A Multimodal</given-names>
          </string-name>
          <string-name>
            <surname>Improved</surname>
          </string-name>
          <article-title>Particle Swarm Optimization for High Dimensional Problems in Electromagnetic Devices</article-title>
          .
          <source>Energiesthis link is disabled</source>
          ,
          <year>2021</year>
          ,
          <volume>14</volume>
          (
          <issue>24</issue>
          ),
          <fpage>8575</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Elahi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gul</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S.U.</given-names>
          </string-name>
          <article-title>EigenSpace-Based Generalized Sidelobe Canceler Applied for Sidelobe Suppression in Cognitive Radio Systems</article-title>
          . Wireless Personal Communicationsthis link is disabled,
          <year>2021</year>
          ,
          <volume>121</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>3009</fpage>
          -
          <lpage>3028</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>