<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main"></title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Astapenya</surname></persName>
							<email>v.astapenia@kubg.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv Metropolitan University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudriavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yuliia</forename><surname>Zhdanova</surname></persName>
							<email>y.zhdanova@kubg.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv Metropolitan University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudriavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Svitlana</forename><surname>Shevchenko</surname></persName>
							<email>s.shevchenko@kubg.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv Metropolitan University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudriavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Svitlana</forename><surname>Spasiteleva</surname></persName>
							<email>s.spasitielieva@kubg.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv Metropolitan University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudriavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olena</forename><surname>Kryvoruchko</surname></persName>
							<email>ev_kryvoruchko@ukr.net</email>
							<affiliation key="aff1">
								<orgName type="institution">State University of Trade and Economics</orgName>
								<address>
									<addrLine>19 Kioto str</addrLine>
									<postCode>02156</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">Cybersecurity Providing in Information and Telecommunication Systems</orgName>
								<address>
									<addrLine>February 28</addrLine>
									<postCode>2024</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">97E8397DBA964A2496CF9026E80441FF</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:29+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Conflict, information conflict, information security systems, cyber system, cyber conflict, electronic warfare, radio-electronic reconnaissance, radio-electronic suppression, radioelectronic protection 00000-0003-0124-216X (V. Astapenia)</term>
					<term>0000-0002-9277-4972 (Y. Zhdanova)</term>
					<term>0000-0002-9736-8623 (S. Shevchenko)</term>
					<term>0000-0003-4993-6355 (S. Spasitielieva)</term>
					<term>0000-0002-7661-9227 (O. Kryvoruchko)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The purpose of the article is to determine the necessary conditions for creating a conflict model of radio technical systems that function in the information space under the threat of radio Electronic Warfare (EW). The starting points of the theory of conflict about complex technical systems are given. It is determined that the Information Conflict (IC) is a key component of the conflict in the conditions of modern radio-electronic warfare. The information conflict is considered a process of combating radio electronic systems at the stage of obtaining information about the opponent and its transmission to consumers and radio suppression systems, which oppose them. The composition and functions of the subsystems included in the radio-electronic warfare system were analyzed: Radio Electronic Reconnaissance (RER), Radio Electronic Suppression (RES), and Radio Electronic Protection (REP). The list of modern systems that use radio waves to obtain and transmit information, as well as other types of information support, assuming the action of EW means against them, is considered. When creating a model of information conflict between similar systems and the EW system, factors that need to be identified are the interferences of various origins and especially intentional ones, the creation of which is one of the main tasks of EW. The main characteristics of information systems that can be violated and should be defined in the conflict model are interference resistance, interference protection, and secrecy. In a conflict, they are points of contact and, together with the characteristics of EW tools, need to be adequately reflected in a mathematical model. A list of conflicts between EW systems and other information systems is provided. An example of estimating the range of radio communication, radio reconnaissance, and navigation is given. The results of the research can be used as educational material for students of the specialty 125 Cybersecurity and Information Protection.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Technical systems of various purposes, among which large-scale technical systems play an increasingly important role, have gained global distribution and occupy a dominant place in the main areas of people's lives. They form a technosphere in which the dominant role is occupied by complex ergatic systems with wide inevitably characterized by conflict and poor predictability of some consequences, which sometimes leads to instability and catastrophic consequences <ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>. For example, information exchange systems will not be able to ensure its integrity, availability, and confidentiality, which can lead to severe consequences in a system where this information is needed for proper functioning. In a certain sense, the prevention of such events is connected with the difficulties of forming adequate models of the relevant conflicts. Work on their creation is being carried out <ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref> and needs to be continued.</p><p>The conflict should be interpreted as a form of interaction of complex systems. Then, within the framework of the system approach, two options for describing this interaction (conflict) are possible:</p><p>• A general description taking into account the essential factors followed by the identification of the nature of the interaction, conflicting components, causes, mechanisms of development, and the result (such a model is complex, multifaceted, but relatively reliable). • Proceeding assuming that the parties, causes and nature of the conflict are known, identify the main factor(s) and build a model to calculate the factor's contribution and the outcome of the conflict.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">EW System Characteristics and Potential Conflicts with Radio Systems</head><p>One of the example of complex systems where there is a permanent conflict is the functioning of information systems of various purposes in the conditions of a potential threat of conducting Radio-Electronic Warfare (EW). Moreover, radio communication and countermeasures to it developed almost simultaneously. Thus, the first episode of EW in the radio range took place in 1904, when near Port Arthur, jamming was used against the radio channel of the Japanese ship's artillery fire adjusters <ref type="bibr" target="#b9">[10]</ref>. In the future, by the creation and development of other systems, where electromagnetic (as well as acoustic) waves are used, the development of EW was parallel. First of all, it is inherent in the military sphere, which left a certain mark on the terminology.</p><p>EW is a type of armed struggle in which radio emissions (radio jamming) are used to influence the radio-electronic means of the enemy's control, communication, and intelligence systems to change the quality of the information circulating in them, to protect one's systems from similar influences, as well as a change in the conditions (properties of the environment) of radio wave propagation.</p><p>Radio-electronic warfare (some authors <ref type="bibr" target="#b10">[11]</ref> have long used the term radio-electronic or electronic war about it) is implemented by a corresponding system, which consists of the following main subsystems <ref type="bibr" target="#b9">[10]</ref>:</p><p>• Radio-electronic reconnaissance (the main types of which are radio reconnaissance and radio technical reconnaissance). • Management and control of the process and results of EW conducting. • Radio suppression by radiation of interference.</p><p>• Electromagnetic damage to equipment by powerful electromagnetic pulses. • Electronic protection of own means. Radio-electronic reconnaissance collects reconnaissance information based on the reception and analysis of electromagnetic radiation. Radio electronic reconnaissance includes radio reconnaissance, the task of which is to intercept signals from communication channels and determine the content of messages, and radio technical reconnaissance, which, based on the analysis of the parameters of the received signals of working radars, communication stations, radio jamming stations, and other radio-electronic means, determines the type of appropriate means, their operating frequency, spectrum width, time parameters of signals, characteristic of antenna directionality, polarization of radiation, direction to the source of the signal and its location (this is also done by radio reconnaissance), parameters of the movement of the source and some other characteristics of radio-electronic means.</p><p>Radio and radio technical reconnaissance can monitor electromagnetic emissions in the range from 3 MHz to 30 GHz and above.</p><p>Based on the data received by radioelectronic reconnaissance, measures for radioelectronic suppression are implemented. Radioelectronic suppression is a set of measures and actions related to disruption (violation) of work or reducing the effectiveness of the enemy's use of radio-electronic systems and means by affecting their receiving devices with radioelectronic interference. It includes radio, radio engineering, optical-electronic, and hydroacoustic suppression. Radio electronic suppression is provided by creating active and passive interference, using false targets, traps, and other methods.</p><p>Electromagnetic damage to the equipment is carried out due to the formation and emission of powerful electromagnetic pulses, which disable the enemy's electronic, communication, and power equipment. The damage effect is a consequence of the targeting of induction currents in electronic elements especially in long conductors. (For the first time such an effect was detected during nuclear explosions in the atmosphere.) Generators based on magnetrons can be used to create electromagnetic pulses. Such means are in service with the United States and other NATO countries.</p><p>Management and control of the process and results of EW management is a complex organizational and technical process, which involves monitoring the state of operation of one's radio-electronic means and their protection against the enemy's technical means of intelligence, evaluating the results of suppressing his means. It includes radio, radiotechnical, photographic, and visualoptical control, as well as control of the effectiveness of information protection against its leakage through technical channels during the operation of means of information transmission and processing. In the course of the current control and based on its results, management decisions are made in favor of radio-electronic protection and optimization of the EW system.</p><p>Radio-electronic protection is an integral part of radio-electronic warfare aimed at ensuring the stable operation of radioelectronic means under the influence of intentional radio interference by the enemy, electromagnetic radiation of weapons of functional damage, electromagnetic and ionizing radiation arising from the use of nuclear weapons, exposure to unintentional radio interference.</p><p>The basis of electronic protection is a set of organizational and technical measures aimed at:</p><p>• Ensuring electromagnetic compatibility of radio-electronic means. • Ensuring the stability of radio-electronic means in the presence of unintentional interference. • Protection of radio-electronic devices against intentional interference and ensuring their interference protection. • Protection of radio-electronic means from electromagnetic and ionizing radiation (unintentional as well as intentional so-called electromagnetic weapons) to ensure the reliability of the functioning of radio-electronic means and to avoid functional damage to the elemental base. • Protection against the influence of false signals and disinformation. Measures to ensure the secrecy of the functioning of one's information systems and components of the radio-electronic warfare system should also be included in the radioelectronic protection.</p><p>The radio-electronic struggle brought a specific "coloring" to the content of the conflict of opposing radio-electronic means (radioelectronic systems), which acquired all the characteristic features of a severe (antagonistic) conflict. At the same time, an antagonistic conflict is understood as a specific form of interaction between some parties opposing each other, pursuing directly opposite interests, when a change in the efficiency of one party (radio engineering system, means, etc.) leads to the same magnitude, but opposite in sign changes in the effectiveness of the other (opposite) side.</p><p>For many years, EW was limited to solving the tasks of radio suppression of separately allocated radio-electronic means in favor of disorganizing the management of the forces and means of the opposing side and ensuring the stability of the management of its forces. Such a concept fully corresponded to the narrow specialization of radio equipment in the assumption of low interference resistance and conflict resistance in general. The simplest static model of the conflict (duel) of means and objects of radio suppression at the energy ("signal") level of its representation sufficiently corresponds to the conditions of radio suppression of such radio-electronic means. Such a model was based on the equations of anti-radio communication, anti-radiolocation, and the well-known relations of the theory of potential jamming by V. A. Kotelnikov.</p><p>It should be noted that, traditionally, all classic tasks of radio communication, radar location, and radio navigation when applying this model are solved under the mandatory condition of the presence of unintentional interference, at least of natural origin-against the background of interference (thermal noise, noise of the atmosphere, space, and so on).</p><p>Thanks to the achievements in the field of element base, digital methods of signal processing, and information technologies, in recent years a qualitative leap in the development of radio-electronic means for various purposes and a significant expansion of their functional capabilities has been outlined. Such significant transformations are associated with two main factors. The first is the formation (creation) of single integrated information and control systems (structures) based on previously separated individual types of radio-electronic means (radio communication, radar, radio navigation, etc.). The second is a significant increase in the conflict resistance of both the specified integrated systems in general and the components of their separate specialized radioelectronic means.</p><p>In such conditions, the conflict as a form of interaction of radio-electronic systems will be a process of conflict of interests of at least two very complex multi-level goal-oriented systems, which form an even more complex conflict super-system (or meta-system) during interaction. At the same time, individual elements (subsystems) of each of the opposing systems are united by a single general goal of the system as a whole and are not completely "independent", but complement and mutually "help" each other. Therefore, the confrontation of the opposing parties in modern conditions during the conduct of the ERB acquires all the characteristic features of a complex coalition conflict.</p><p>A somewhat conventional structure of one of the variants of a complex antagonistic conflict is presented in Fig. <ref type="figure" target="#fig_0">1</ref>. depending on the specifics of their purpose, construction, and functioning. In the classical sense, EW is carried out about military, dual, and special purpose systems. Although its potential application does not exclude systems of another purpose.</p><p>Here is a list of such conflicts: Terrestrial radio communication-EW system.</p><p>Satellite communication-EW system. Radio relay communication-EW system. Office Wi-Fi-EW system. Radio communication based on distant tropospheric propagation-the EW system.</p><p>The ground radar complex (system)-the EW system.</p><p>The air-based radar complex (system)-the EW system. The ship's radar complex (system)-the EW system.</p><p>The space-based radar complex (system)the EW system.</p><p>Missile attack warning radar systems (in the USA this system is called a nuclear missile strike warning system, its purpose is to detect warheads of strategic ballistic missiles)-EW system.</p><p>The ground complex (system) of radio reconnaissance-the EW system.</p><p>The airborne complex (system) of radio reconnaissance-the EW system.</p><p>The space-based radio reconnaissance complex (system)-the EW system.</p><p>The ground complex (system) of radio technical reconnaissance-the EW system.</p><p>The aerial complex (system) of radio technical reconnaissance-the EW system. The complex (system) of space-based radiotechnical reconnaissance-the EW system. The complex (system) of reconnaissance in the infrared range of space-based-the REB system.</p><p>The complex (system) of satellite radio navigation is the EW system. The complex (system) of radio technical reconnaissance based on UAVs is the EW system.</p><p>The UAV-based radio reconnaissance complex (system)-the EW system. The complex (system) of radio-technical intelligence and visual surveillance based on UAVs-the EW system.</p><p>Each of these options has its specifics, but also certain common features. Each of them can be analyzed both separately and in combination.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Operating Conditions and Indicators of Radio Systems, Which Should Be Defined in the Conflict Model</head><p>Let's try to dwell on important factors (characteristics) that are relevant to most of the listed conflicting systems and situations both between the means of information collection and information transmission processes and in the conditions of radio-electronic warfare. These factors should appear in the formation and application of information conflict models. Among them: are interference, sensitivity of receivers, interference resistance, interference protection, secrecy of the information system, electromagnetic compatibility of information systems, and radio-electronic means. Let's consider them in more detail.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Interference as Electromagnetic Radiation</head><p>Interference as electromagnetic radiation of various origins is inherent in the operating conditions of radio-electronic means under normal conditions especially when conducting EW. Their main characteristics:</p><p>• The width of the interference spectrum Δ𝑓 𝑖 . Internal interferences arise in the system itself (noises of the input cascades of the receiver, receiving antenna, signal channel lines and electrical signals entering the receiver through internal circuits due to poor shielding or decoupling between cascades). The internal noise caused by the chaotic movement of charge carriers is fundamentally ineradicable, although it can be minimized.</p><p>Thermal and shot noise are distinguished. Thermal noise is caused by the thermal movement of charge carriers. It is a Gaussian random process with zero mean and power spectral density in the radio frequency range:</p><formula xml:id="formula_0">𝑁 0 (𝑓) = 𝑘 𝐵 𝑇 𝑜 = 𝑁 0 (V/ Hz),<label>(1)</label></formula><p>where 𝑘 𝐵 = 1,38 × 10 −23 (J/K) is the Boltzmann constant, 𝑇 𝑜 is the absolute temperature of the noise source (in Kelvin), 𝑓 is the frequency. Thermal noise can be interpreted as White Gaussian Noise (WGN) with a constant onesided power spectral density:</p><p>𝑁 0 = 𝑘 𝐵 𝑇 𝑜 (2) and the Gaussian probability density distribution of instantaneous amplitude values n:</p><formula xml:id="formula_1">𝑤(𝑛) = 1 𝜎 √2𝜋 𝑒 − 𝑛 2𝜎 𝑛 2 ,<label>(3)</label></formula><p>where 𝜎 𝑛 is root mean square noise amplitude. The graph of this distribution at different rms amplitudes is shown in Fig. <ref type="figure" target="#fig_1">2</ref>. The WGN autocorrelation function is the inverse Fourier transform of its power spectral density and is an δ-function.</p><p>In real systems, the frequency bandwidth is limited, and the power of the noise passing to the receiver input:</p><p>𝑃 𝑛 = 𝑁 0 • Δ𝑓 rec path , (4) where Δ𝑓 rec path is receiving path bandwidth.</p><p>External interference. This is a fairly wide range of obstacles of various origins. There are two groups among them: unintentional and intentional. They, in turn, include several subgroups. Depending on the range of frequencies and conditions in which the information system works, one or another type of interference prevails.</p><p>Unintentional include natural, inter-system (industrial and from third-party radio equipment), and intra-system.</p><p>Natural disturbances arise due to various electromagnetic processes occurring in the troposphere, ionosphere, and outer space, as well as due to radiation from the earth's surface. Accordingly, there are atmospheric (tropospheric) interferences, cosmic interferences (present in frequency ranges above 30 MHz)-and cosmic noises from interstellar gases, the Sun, and radio stars of Jupiter. Obstacles from the earth's surface; it, like any heated body, emits electromagnetic waves (the power of these noises at the receiver input is determined by the orientation and shape of the antenna's directional pattern, as well as the temperature and characteristics of the surface). According to their statistical characteristics, they are similar to thermal noise.</p><p>Intersystem interference (industrial and from third-party radio equipment). They are created by various radio stations (station interference), industrial installations, medical equipment, electric motors, etc.</p><p>Industrial interference is created by various electrical equipment of industrial enterprises, transport, power transmission lines, and other electrical installations. More often, they are sequences of pulses with a constant or variable follow-up period. Spread in the atmosphere and along cable lines. The level of industrial interference depends on the location of the receiver of industrial facilities and the power of electrical equipment.</p><p>Interference from third-party radio equipment (station interference) is one of the most common types of external interference. The saturation of radio means (radio communication, radar, radio navigation, etc.) is constantly growing. Therefore, the loading of radio bands is such that very often interference from third-party radio equipment exceeds other types of interference. Station interference is due to various reasons. Their minimization is related to compliance with the provisions of electromagnetic compatibility of radio-electronic devices. A simplified physical model of the formation of station interference at high channel loading can be presented in the form of a series-connected white noise generator and a filter with a frequency response that varies over time according to a random law.</p><p>The spectral density of interference power 𝑁(𝑓, 𝑡) as a random process (often nonstationary) can be sufficiently fully characterized by the probability density 𝑤 𝑓,𝑡 (𝑛) and the correlation functions (preferably normalized) of fluctuations in the time and frequency domains 𝑟 𝑛 (𝜏) and 𝑟 𝑛 (𝑓). The parameters of the correlation functions are the time correlation interval and the frequency correlation interval.</p><p>If the number of station interferences falling into the signal band is limited, then the mixture 𝑥(𝑡) entering the receiver input is represented as the sum of the useful signal 𝑆(𝑡) and a limited number of additive interferences with known or unknown statistical characteristics:</p><formula xml:id="formula_2">𝑥(𝑡) = 𝑠(𝑡) + 𝑛(𝑡) + ∑ 𝛾 𝑘 (𝑡), 𝑀 𝑖 𝑘=1 (5)</formula><p>where 𝑀 𝑘 is the number of sources of interference, 𝛾 𝑘 (𝑡) is the external interference, the frequency spectrum of which falls into the bandwidth of the receiver, 𝑛(𝑡) is the WGN.</p><p>Intentional interference is a more important process in the implementation of EW. Therefore, their characteristics need to be carefully considered when creating a conflict model.</p><p>Deliberate disturbances are created with the help of special devices-troublemakers to disrupt the operation of the information system. From the point of view of the nature of the influence on the functioning of the system against which the interference acts, they are divided into noise-like and imitative.</p><p>Noise-like ones are designed to worsen signal reception conditions by creating an increased interference background at the receiver input. According to the method of formation, they are divided into direct noise (direct noise process) and harmonic processes modulated by noise. According to the relationship with the parameters of the useful signal, which they counteract, these types of interference are divided into blocking, narrowband, and targeting.</p><p>Blocking interference has a spectrum width that is significantly greater than the signal spectrum width at approximately the same average frequencies of the interference and the signal: Δ𝑓 𝑖 &gt;&gt; Δ𝑓 𝑆 .</p><p>Narrowband interference has a spectrum width that is significantly smaller than the signal spectrum width, provided that the interference spectrum falls into the signal frequency band: Δ𝑓 𝑖 &lt; Δ𝑓 𝑆 .</p><p>Aiming interference has a spectrum width that coincides with the signal spectrum width, provided that the average (carrier) frequencies of the interference and the signal coincide: Δ𝑓 𝑖 = Δ𝑓 𝑆 .</p><p>The latter interferences are the most effective because all the power of the interfering transmitter is concentrated in the band of the receiver that is being suppressed. But for this, you need to monitor the operating frequency of the receiver and estimate or predict (by observing the signals of the system to be suppressed using electronic reconnaissance).</p><p>The total power of the interference perceived by the receiver is convenient to estimate in the frequency plane, knowing the power spectral densities of each of the interferences at the location of the receiver. In the general case, with a rectangular amplitude-frequency characteristic of the receiving path:</p><formula xml:id="formula_3">𝑃 Σ 𝑟𝑒𝑐 = 𝐾 𝑛 • ∫ [∑ 𝑁 𝑘 (𝑓) 𝑀 𝑘 𝑘=1 ] 𝑓 𝑚𝑎𝑥 𝑓 𝑚𝑖𝑛 𝑑𝑓 (<label>6</label></formula><formula xml:id="formula_4">)</formula><p>where 𝐾 𝑛 is a receiver noise ratio (&gt;1), 𝑓 𝑚𝑖𝑛 is the minimum bandwidth frequency of the receiving path, 𝑓 𝑚𝑎𝑥 is the maximum bandwidth frequency of the receiving path, 𝑁 𝑘 (𝑓) is the power spectral density of the i th interference, 𝑀 𝑘 is the number of interferences.</p><p>When the spectral densities of interference powers in the reception band are uniform, the formula is simplified:</p><formula xml:id="formula_5">𝑃 Σ𝑟𝑒𝑐 = 𝐾 Ш • Δ𝑓 𝑟𝑒𝑐 ∑ 𝑁 𝑘 (𝑓) 𝑀 𝑘 𝑘=1 (7)</formula><p>where Δ𝑓 𝑟𝑒𝑐 is the bandwidth of the receiving path.</p><p>In all cases, the jamming side (carrying out radio-electronic suppression) aims for the total power of the frequency components of the interference within the receiver's bandwidth to exceed the signal power. That is, the ratio of the signal power to the power of the interference(s) was as small as possible one-𝑃 S /𝑃 Σ𝑟𝑒𝑐 &lt;&lt; 1. In this case, the purpose of EW will be achieved if the system against which suppression is carried out is not equipped with sufficient means of protection against interference.</p><p>In addition to continuous ones, there are interferences in the form of pulse sequences, as a rule, with a chaotic structure in terms of the follow-up period, duration, and shape of pulses. As a rule, these are obstacles of artificial origin. They can be unintentional or intentional.</p><p>Simulating deliberate interference is intended to misinform. By structure and parameters, they repeat the signal, so they are perceived as a useful signal, but carry false information.</p><p>The above-mentioned interferences (noiselike and imitative) are also used to protect information systems by setting such interferences to systems and means of information interception. That is, there will be a counter-conflict with the use of EW methods.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Sensitivity of Receivers</head><p>Means of radio-electronic intelligence as part of EW systems and means against which radioelectronic suppression is carried out function in the presence of unintentional interference (internal noise of radio-electronic devices, atmospheric and space noise, industrial interference, intersystem interference, etc.). Their presence and intensity at the input of the corresponding receiving devices depends on the selected range of electromagnetic waves, the time of day and season, the width of the interference spectrum, the location of the devices, the characteristics of the antennas, etc. The level of these interferences determines the sensitivity of receivers-𝑃 𝑟𝑒𝑐 𝑚𝑖𝑛 means of radio-electronic reconnaissance, means of communication, radars, and radio navigation receivers. It is impractical to have the 𝑃 𝑟𝑒𝑐 𝑚𝑖𝑛 value than the total power of the most characteristic unintentional interference at the receiver input (noise background), which should exceed the power of the expected useful signal. As a rule, the situation is non-stationary and creates a "micro-conflict" between the receiving component of the system and the interference background.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Interference Resistance</head><p>Interference resistance-is the ability of the system to perform its functions in the presence of disturbances with quality indicators not lower than the established ones. This means the presence of not only the noise background mentioned above but also a certain level of interference from another origin.</p><p>Interference resistance depends on modulation, reception method, coding methods, etc. Quantitatively, the interference immunity of discrete message transmission systems can be characterized by the probability of error 𝑃 𝑒𝑟𝑟 at a given ratio of average signal power and interference at the input of the system receiver.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Interference Protection</head><p>Interference protection is the ability of the system to counteract the harmful effects of interference and to perform its functions with quality indicators not lower than those specified under the conditions of interference. Interference protection can be provided by active and passive methods.</p><p>Active methods consist of counteracting the functioning of the source of interference. If the source creates interference unintentionally, organizational and technical measures are taken to turn off the source or eliminate defects in its operation that led to the unauthorized creation of interference. If the source creates a deliberate disturbance, then decisive measures are taken to destruction using destruction (for example, in military conflicts).</p><p>Passive methods consist of the application of additional methods and devices of signal formation and processing, which are used when the interference situation worsens:</p><p>• Switching to another operating frequency, where the level of interference is lower. • Switching to a signal with a more interference-resistant type of modulation; increase in radiation power. • A decrease in the technical speed of transmission (which is equivalent to an increase in the duration of the signal, which means its power). • Moving to fault-tolerant code with higher error detection or correction capabilities.</p><p>• Rejection of frequency components of interference (if its spectrum is narrower than the signal spectrum) using appropriate filters. • Application of methods of narrowing the directional diagrams of transmitting and/or receiving antennas <ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref>, when the direction of arrival of the interference and the useful signal are different, it is possible to change the orientation and/or shape of the directional characteristic of the receiving antenna in such a way that it reduces the intensity of the interference at the input of the receiving device under the condition of a slight decrease in the level of the useful signal. • Readjusting the polarization of the receiving and transmitting antenna <ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref> (if there is a difference in the polarization of the useful signal and the interference). In modern systems, the listed methods are mostly implemented in adaptive mode.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">Secrecy of an Information System</head><p>The secrecy of the information system is the ability to perform its functions in such a way that the opposing party does not have the opportunity to obtain information about the operation of the system, its characteristics, and the information circulating in it. Three main levels of secrecy are considered: energetic, structural, and informational.</p><p>Energetic secrecy (also called absolute) is the kind of secrecy in which the opposing party is unable to detect the very fact of the system's operation and detect its signals against the background of existing disturbances; such stealth is achieved by using complex (noiselike) signals, and in some cases also by creating an increased level of interference in the city where the receiving means of the opposing side are located.</p><p>Structural secrecy is the type of secrecy in which the adversary can perceive the information system signal, but cannot distinguish it from other signals or determine its structure and identify the symbols of the message; this is achieved by various methods: the emission of false signals, the transmission of separate component signals and messages at different frequencies and through different channels, etc.</p><p>Measures to ensure energy and structural secrecy contribute to the increase of Interference protection of the information system because they will deprive the opposing party of information about the parameters of the signal, thereby reducing its ability to create intentional interference with the appropriate parameters.</p><p>Information secrecy is such secrecy in which the adversary can perceive the IS signal, distinguish it from other signals, determine its structure, and identify the symbols of the message, but cannot determine the content of the message, that is, information; such secrecy is achieved by cryptographic methods.</p><p>The presence and high level of interference resistance, interference protection, and secrecy are components of the conflict resistance of a tool or system. Therefore, the task of radio-electronic reconnaissance consists of overcoming secrecy, and radio-electronic suppression consists of reducing Interference resistance and Interference protection both by creating additional interference and by other methods.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.6.">Electromagnetic Compatibility of Information Systems and Radio-Electronic Means</head><p>Electromagnetic compatibility of information systems and radio-electronic means their ability to function together in real operating conditions with specified quality indicators without creating unacceptable interference with each other. The conditions of propagation of radio waves, energy loss in the environment, loss of signal power in the equipment, the shape of the characteristics of the directionality of the antennas, and their polarization characteristics about the polarization of the radio wave have a noticeable influence on the operation of information systems and electronic warfare systems. These factors affect such an important indicator of radio systems as the operating range.</p><p>For example, the range of radio communication, radio and radio technical intelligence, and radio navigation in ideal conditions (against the noise background and the orientation of the antennas with the maxima of the directional characteristics towards each other):</p><formula xml:id="formula_6">𝑅 𝑐𝑜𝑛.𝑚𝑎𝑥 = √ 𝑃 𝑡𝑟𝑎𝑛𝑠 • 𝐺 𝑡𝑟𝑎𝑛𝑠 • 𝐺 𝑟𝑒𝑐 • 𝜆 2 (4𝜋) 2 • 𝑃 𝑟𝑒𝑐 𝑚𝑖𝑛<label>(8)</label></formula><p>where 𝑃 𝑡𝑟𝑎𝑛𝑠 is a transmitter output power, 𝐺 𝑡𝑟𝑎𝑛𝑠 is the maximum amplification factor of the transmitting antenna, 𝐺 𝑟𝑒𝑐 is the maximum amplification factor of the receiving antenna, λ is the wavelength, 𝑃 𝑟𝑒𝑐 𝑚𝑖𝑛 is the sensitivity of the receiver, which is equal to the power of the background noise spread above.</p><p>To ensure sufficient reception quality (and ultimately the availability and integrity of information), the signal at the receiver input must exceed the noise level by a certain number of ν times. Then the communication equation (navigation, reconnaissance) will be:</p><formula xml:id="formula_7">𝑅 𝑐𝑜𝑚.(nav.recon.) = = √ 𝑃 𝑡𝑟𝑎𝑛𝑠 • 𝐺 𝑡𝑟𝑎𝑛𝑠 • 𝐺 𝑟𝑒𝑐 • 𝜆 2 (4𝜋) 2 • 𝑃 𝑟𝑒𝑐 𝑚𝑖𝑛 • 𝜈<label>(9)</label></formula><p>Losses of signal energy during the propagation of waves in the environment and in the equipment, which are taken into account by the appropriate Γ prop and Γ equip coefficients and the arbitrary orientation of the antennas (Fig. <ref type="figure" target="#fig_3">3</ref>.) lead to a decrease in range. </p><p>In the conditions of suppression using EW, the power of intentional interferences PN from the input at the receiver input will significantly exceed 𝑃 𝑟𝑒𝑐 𝑚𝑖𝑛 . 2 <ref type="bibr" target="#b10">(11)</ref> where: 𝑃 𝑟𝑒𝑐.interf is the output power of the interference transmitter, 𝐺 trans.interf is the maximum amplification factor of the interference generator transmission antenna, R interf is the distance to the interference generator.</p><p>Then the range of radio communication (radio navigation, radio reconnaissance) will become very small, and obtaining information may become impossible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusions</head><p>The so-called informational conflict is a key component of the conflict in the conditions of the modern electronic security system. The information conflict is understood as the process of combating radio-electronic means (systems) at the stage of obtaining information (data) about the opponent and its transmission to consumers and means (systems) of radio suppression, that oppose them. Today it can be considered that the outcome of the information conflict has a decisive influence on the outcome of the conflict in EW systems as a whole. Typical representatives of radioelectronic means include the most common and promising means of radio communication, radio-electronic intelligence, and promising types of air-space-based reconnaissance radar stations, which are the most traditional objects of radio suppression. At the same time, of course, it is determined that the objects of radio suppression themselves can be constituent elements of some higher hierarchical level systems, which indicates a known "subordination" of the information conflict.</p><p>Conflicting mutual radio suppression of electronic warfare means with radio communication means and means of obtaining information (radio-electronic reconnaissance, radar location, radio navigation) is an important component of information conflict. The specified factors, as well as the conditions of the surrounding environment, should be adequately taken into account in the complex model of the conflict of radio technical systems of the information space in the conditions of the action of EW systems against them. Analysis of the current state of development of electronic warfare means allows us to assert the use of cognitive information technologies in the development of EW, in particular, artificial intelligence. As a result of the implementation of these technologies, these electronic warfare systems can learn and adapt to changing natural conditions and enemy tactics; and use a database of sensors and other sources of intelligence for analysis and forecasting in the management of these assets. However, the implementation of artificial intelligence technologies creates certain risks related to the sensitivity and quality of data, ensuring the confidentiality, availability, and integrity of information.</p><p>The direction of further work of the authors will be the formalization of the components and the creation of a model of the corresponding information conflict.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1:The structure of one of the variants of a complex antagonistic conflict Based on the above general provisions and components of EW, it is possible to specify the conflict interaction (influence) of the EW system with other information systems,</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Distribution (3) graph at different rms amplitudes</figDesc><graphic coords="6,103.44,516.72,53.64,54.48" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: 𝐹 1,2 (𝜑) are directional diagrams in the horizontal plane of the object 1(2) Then the range of radio communication (radio navigation, radio reconnaissance): 𝑅 𝑐𝑜𝑚.(nav.recon.)𝑙𝑜𝑠𝑠 (𝜃, 𝜑) = = √ 𝑃 𝑡𝑟𝑎𝑛𝑠 • 𝐺 𝑡𝑟𝑎𝑛𝑠 (𝜃, 𝜑) • 𝐺 𝑟𝑒𝑐 (𝜃, 𝜑) • 𝜆 2 (4𝜋) 2 • 𝑃 𝑟𝑒𝑐 𝑚𝑖𝑛 • 𝜈 • Γ prop • Γ equip</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>𝑃 intent.interf.input = 𝑃 trans.interf • 𝐺 trans.interf • 𝐺 𝑟𝑒𝑐 • 𝜆 2 (4𝜋) 2 • 𝑅 interf.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>•</head><label></label><figDesc>The average (carrier) interference frequency 𝑓 𝑖 .• The average interference power 𝑃 𝑎𝑣𝑒 𝑖 .• The maximum interference power 𝑃 𝑚𝑎𝑥 𝑖 . • Minimum interference power 𝑃 𝑚𝑖𝑛 𝑖 .</figDesc><table><row><cell cols="4">• Peak interference factor 𝐾 peak 𝑖 =</cell></row><row><cell>𝑃 𝑚𝑎𝑥 𝑖 /𝑃 𝑎𝑣𝑒 𝑖 (or</cell><cell>in</cell><cell>dB</cell><cell>𝐾 peak 𝑖 =</cell></row><row><cell>10𝑙𝑔(𝑃 𝑚𝑎𝑥 𝑖 /𝑃 𝑎𝑣𝑒 𝑖 ).</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="4">• The dynamic range of interference is the</cell></row><row><cell cols="4">ratio of the maximum and minimum</cell></row><row><cell cols="4">instantaneous powers 𝐷 𝑖 = 𝑃 𝑚𝑎𝑥 𝑖 /</cell></row><row><cell cols="4">𝑃 𝑚𝑖𝑛 𝑖 (or in dB 𝐷 𝑖 = 10𝑙𝑔(𝑃 𝑚𝑎𝑥 𝑖 /</cell></row><row><cell>𝑃 𝑚𝑖𝑛 𝑖 ).</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="4">Depending on the location of the source of</cell></row><row><cell cols="4">interference, internal and external interferences</cell></row><row><cell>are distinguished.</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conflict Model of Radio Engineering Systems under the Threat of Electronic Warfare</head></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Mikhalevich</surname></persName>
		</author>
		<title level="m">Dictionary of Cybernetics</title>
				<imprint>
			<publisher>Main Editorial Office of USE</publisher>
			<date type="published" when="1989">1989</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Information and Self-Organization, A Macroscopic Approach to Complex Systems</title>
		<author>
			<persName><forename type="first">H</forename><surname>Haken</surname></persName>
		</author>
		<idno type="DOI">10.1007/3-540-33023-2</idno>
		<imprint>
			<date type="published" when="1988">1988</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Thompson</surname></persName>
		</author>
		<title level="m">Instabilities and Catastrophes in Sciense and Engineering</title>
				<imprint>
			<publisher>John Wiley &amp; Sons</publisher>
			<date type="published" when="1982">1982</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Study of Applied Aspects of Conflict Theory in Security Systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Shevchenko</surname></persName>
		</author>
		<idno type="DOI">10.28925/2663-4023.2022.18.150162</idno>
	</analytic>
	<monogr>
		<title level="j">Cybersecur. Educ. Sci. Tech</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">18</biblScope>
			<biblScope unit="page" from="150" to="162" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Conflict Analysis in the Information Security System: Subject</title>
		<author>
			<persName><forename type="first">S</forename><surname>Shevchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication System</title>
		<imprint>
			<biblScope unit="volume">3421</biblScope>
			<biblScope unit="page" from="56" to="66" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Game Theoretical Approach to the Modeling of Conflicts in Information Security Systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Shevchenko</surname></persName>
		</author>
		<idno type="DOI">10.28925/2663-4023.2023.22.168178</idno>
	</analytic>
	<monogr>
		<title level="j">Cybersecur. Educ. Sci. Tech</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="168" to="178" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">ICT for Training and Evaluation of the Solar Impact on Aviation Safety, 16</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pinchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">th Int. Conf. ICTERI II</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="786" to="792" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Conflict Model of the Interaction of Objects of Cybernetic Space</title>
		<author>
			<persName><forename type="first">V</forename><surname>Semko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Probl. Inf. Manag</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">38</biblScope>
			<biblScope unit="page" from="88" to="92" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Model of Interaction of Information Systems in Conflict Conditions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bondarchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Telecommun. Inf. Technol</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">57</biblScope>
			<biblScope unit="page" from="34" to="42" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Principles of Electronic Warfare</title>
		<author>
			<persName><forename type="first">R</forename><surname>Schlesinger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Prentice-Hall Space Technology Series</title>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Literary Licensing</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Tyravskyi</surname></persName>
		</author>
		<ptr target="https://foreignukraines.com/2023/12/07/ukrainian-servicemen-began-to-successfully-destroy-russian-electronic-warfare-systems/" />
		<title level="m">Ukrainian Servicemen Began to Successfully Destroy Russian Electronic Warfare Systems</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">The Use of an Accelerating Lens to Increase the Efficiency and Interference Protection of Networks IEEE 802.11b</title>
		<author>
			<persName><forename type="first">V</forename><surname>Astapenya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Zv&apos;yazok</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">98</biblScope>
			<biblScope unit="page" from="33" to="37" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Modified Accelerating Lens as a Means of Increasing the Throughput, Range and Noise Immunity of IEEE</title>
		<author>
			<persName><forename type="first">V</forename><surname>Astapenya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICATT.2015.7136852</idno>
	</analytic>
	<monogr>
		<title level="m">11 Systems, 10 th Int. Conf. on Antenna Theory and Techniques</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="volume">802</biblScope>
			<biblScope unit="page" from="267" to="269" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane</title>
		<author>
			<persName><forename type="first">V</forename><surname>Astapenya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICATT.2017.7972671</idno>
	</analytic>
	<monogr>
		<title level="m">XI Anniversary International Conference on Antenna Theory and Techniques</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="389" to="391" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Experimental Evaluation of an Accelerating Lens on Spatial Field Structure and Frequency Spectrum</title>
		<author>
			<persName><forename type="first">V</forename><surname>Astapenya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ageyev</surname></persName>
		</author>
		<idno type="DOI">10.1109/ukrmw49653.2020.9252755</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Ukrainian Microwave Week</title>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Increasing the Bandwidth of Wireless Communication Channels Due to Polarization Effects in IEEE 802.11 Standard Networks</title>
		<author>
			<persName><forename type="first">V</forename><surname>Astapenya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Zv&apos;yazok</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">99</biblScope>
			<biblScope unit="page" from="36" to="40" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Research Results of the Impact of Spatial and Polarization Value of the Antennas on Network Capacity of Wireless Channels Standard IEEE</title>
		<author>
			<persName><forename type="first">V</forename><surname>Astapenya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICATT.2013.6650715</idno>
	</analytic>
	<monogr>
		<title level="m">IX International Conference on Antenna Theory and Techniques</title>
				<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">802</biblScope>
			<biblScope unit="page" from="172" to="174" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
