<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Lubomir Parkhuts. The method of spectral analysis of the determination
of random digital signals. International Journal of Communication Networks and Information</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">2073-607X</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Study of the Adaptive Method of Approximation of Experimental Data</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Laptiev</string-name>
          <email>olaptiev@knu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vladimir Matvienko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Pichkur</string-name>
          <email>vpichkur@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Cherniy</string-name>
          <email>d_cherniy@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuriy Shcheblanin</string-name>
          <email>yurii.shcheblanin@knu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska street, 60, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <issue>4</issue>
      <fpage>168</fpage>
      <lpage>178</lpage>
      <abstract>
        <p>In today's world, information has become not only data but also a weapon. To obtain access to information, not only legal but also illegal methods of obtaining it are used. Illegal methods can be used to secretly obtain information. Which transmits the information received over the radio channel. Moreover, criminals use different methods of transmission, to hide a useful signal. It is very difficult to detect the signal. To detect such signals, various methods and techniques are used, which make it possible to convert a random signal into a digital form or to approximate the signals. For further digital processing of the received information. This article proposes adaptive algorithms for signal approximation of random radio signals based on the continuous gradient method. The main goal of the method is to determine the vector of parameters in the basis functions so that they approximate the signal. The convergence analysis of the iterative procedure is based on the direct Lyapunov method. In most cases, as a rule, the signals of means of tacitly obtaining information are measured at discrete moments. Unfortunately, there are many cases in which this leads to an error in detecting the signals of means of obtaining information secretly. Therefore, the detection of continuous signals is an urgent task. This work is devoted to the solution of this urgent task. The methods proposed in the work are described for the approximation of continuous processes. In this case, we recommend using well-known computational methods to find a solution to the Cauchy problem. This makes it possible to obtain a discrete form of the developed methods. A continuous variant of the methods solves the actual task of identifying the means of covertly obtaining information and can be universal in general. In order to confirm the adequacy of the developed method and to confirm the effectiveness of the developed mathematical apparatus. An experimental study was conducted, which confirmed the adequacy of the developed method.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;bject of critical infrastructure</kwd>
        <kwd>object model</kwd>
        <kwd>robust system</kwd>
        <kwd>disturbance transitional process</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In the conditions of rapid development of information technologies and growth of data volumes,
computer networks have become an integral part of modern life and business processes. Their
efficiency, reliability, and security depend on the stability and productivity of organizations, as well
as the protection of users' confidential information. An important component of network
management is the procedure for providing access, which determines how and who can access
network resources, as well as how to ensure their security and integrity. Information is one of the
most valuable assets of most modern companies. As the value of information increases, so does the
number of those who wish to obtain this information for use in their own or others' interests.</p>
      <p>One of the ways to obtain information is to intercept or record speech information using means
of tacit information.</p>
      <p>0000-0002-4194-402X (O. Laptiev); 0000-0002-5946-2942 (V. Matvienko); 0000-0002-5641-8145 (V. Pichkur);
0000-00026378-8048 (D.Cherniy); 0000-0002-3231-6750 (Y. Shcheblanin)</p>
      <p>There is a huge arsenal of various means of interception and recording of acoustic information.
The use of certain means of acoustic control depends on the conditions of use, the task, the technical,
and, above all, the financial capabilities of the audition organizers. The most common are
radioemitting means of interception of speech information. The variety of radio microphones is so great
that there is a constant need for new methods of detecting radio microphone radiation signals.</p>
      <p>Therefore, the methods of detecting radio microphone signals are constantly being improved.</p>
      <p>Information protection is a complex process. Various technical devices are used to intercept and
record confidential information. Most of these devices transmit the intercepted or recorded speech
information using a radio channel. Therefore, the main thing in this case is the detection of the radio
channel by means of covertly obtaining information. One of these methods can be the adaptive
method of approximating experimental data of the spectrum of means of tacitly obtaining
information. A necessary condition for information protection is the blocking of all technical
channels of leakage or unauthorized access to confidential or secret information.</p>
      <p>The topicality of the topic is due to the growing complexity and scale of information networks.
The increase in the number of users and devices connecting to information networks complicates the
task of ensuring proper access control and protection of information systems from unauthorized
access. Thus, a contradiction arises between information network protection systems and new
information technologies in conditions of limited time and an increase in the number of attempts to
obtain information through covert information. This work is devoted to solving this contradiction.</p>
    </sec>
    <sec id="sec-2">
      <title>Review of literary sources.</title>
      <p>The problem of signal conversion is a very urgent problem of our time. This problem exists in all
areas of our lives. This problem becomes especially acute in the modern world when the pace of life
has increased significantly and there are problems with obtaining data quickly. The problem of saving
valuable information constantly arises. Protection against secret receipt. For covertly obtaining
information, various means of covertly obtaining information are used based on the principle of
operation and design. There are different signals by means of which information goes beyond the
control zone. Digital methods are always used to increase the speed of data processing. But the signals
from the means of tacitly obtaining information are of a diverse nature. Therefore, there is a problem
of converting such signals into digital form with further processing by technical computing devices.
Currently, the problem of approximation of a continuous and discrete signal is one of the important
problems of signal processing theory. This problem is covered in many books and articles [1-7].
However, new applied problems require the development of new methods. Methods should be simple,
provide real-time solutions, and have optimal performance. One of the approaches that allows you to
meet the requirements is an adaptive technique [5-7]. Adaptive methods are effective in the tasks of
signal processing, optimization, control, and identification of parameters [5-12]. For signal processing
problems, we recommend a structural approach [7, 20, 21]. This means that we approximate the signal
with a function that depends on unknown parameters. Approximation of the signal is carried out
adaptively using the appropriate selection of parameters. For this, we will use the continuous gradient
method [13, 16-19,23]. This approach can be conveniently applied to both continuous and discrete
signals. To prove the convergence of the corresponding iterative methods, it is possible to use the
methods of the stability theory [14-16,25]. We apply an adaptive procedure to the problems of
chemical-biological analysis based on spectral data, in particular to the problem of spectral processing
of data from plants contaminated with chemical elements.</p>
      <p>Thus, on the basis of the conducted analysis, the results of the study of scientific publications on
the topic of research, dissertations, patents, monographs and practical developments, it was
established that at the current stage of the development of progressive information technologies there
is an objective contradiction between the systems of protection of information networks and news
information technologies in the conditions limited time and an increase in the number of attempts to
obtain information by covert means of obtaining information. This work is devoted to the solution
of this actual contradiction.</p>
    </sec>
    <sec id="sec-3">
      <title>Formulation of the problem</title>
      <p>To obtain access to information, not only legal but also illegal methods of obtaining it are used. Illegal
methods can be used to secretly obtain information. Which transmits the received information over
the radio channel. It is very difficult to detect the signal. Therefore, it is necessary to develop and
propose a method of increasing the detection of signals by means of surreptitiously obtaining
information in the spectrum of a specified radio range due to the use of an adaptive technique for
approximating the signal based on the continuous gradient method and evaluating the scalar
continuous signal with a function that depends on time and unknown parameters.</p>
    </sec>
    <sec id="sec-4">
      <title>The main section</title>
      <sec id="sec-4-1">
        <title>Approximation of continuous signals.</title>
        <p>with a function</p>
        <p>Suppose that we have a continuous scalar signal x = (t ) , t0  t  T , which we approximate
If the signal is defined on [ 0,  ], the problem of parameters  adaptive correction consists of a
functional minimization [21,22]. For this purpose, we consider two types of functionals:
a) directly at the moment 
b) mean square approximation on t0 , t 
x(t)  (t, ) = (t,1, 2 ,..., n )</p>
        <p>I1(t) = ( (t, ) − (t))2;</p>
        <p>t
I2 ( ) =  ( ( , ) − ( ))2 d .</p>
        <p>t0</p>
        <p>
          To correct parameters we minimize functional (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ), as a result we write down continuous gradient
method [13,20]
with some initial data
d
dt
= −grada I1( ) = −2( (t, ) − (t))grada (t, )
        </p>
        <p> (t0 ) = (0).</p>
        <p>
          To find vector parameters  we solve Cauchy problems (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ), (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ). If there is a stationary problem
solution (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ), (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ), that is a(t) → a, t → , you can be taken as a solution of a given problem. It is
necessary to notice that for solving some practical problems such a simple procedure gives good
results.
        </p>
        <p>
          For the integral functional (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) we write down likewise a system of ordinary differential equations
d
dt
        </p>
        <p>t
= −grada I2 ( ) = −2 ( ( , ) − ( ))grada ( , )d .</p>
        <p>t0</p>
        <p>
          The right part of a system (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ) is an integral. Taking derivatives of both parts of the system (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ), we
have
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
        </p>
        <p>System (7) is a system of ordinary differential equations of order 2n , in normal form with initial
conditions</p>
        <p>
          One solves problems (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ), (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) and (7), (8) numerically, for instance, with
Rungein the previous case, if there is a limit a(t) → a, t → , when solving (7), (8), it can be taken as a
solution to the given problem.
        </p>
        <p>Comment 1. The original data is to be chosen from the convergence of the proposed iterative
procedures.</p>
        <p>Convergence of iterative procedures can be investigated on the basis of Lyapunov second method.
Therefore, parameter  (0) we will choose from the range of asymptotic stability of an appropriate
system of ordinary differential equations. If conditions of Barbashin-Krasovsky theorem on global
asymptotic stability take place, the convergence of iterative procedures is fulfilled for any initial data
 (0)  En [14, 15, 27].</p>
        <p>Consider a particular case. Suppose we have a system of basic functions:</p>
        <p>1(t), 2 (t),...,n (t), t  t0 ,
and function  (t, a) is a linear combination of basic functions
d 2
dt 2 = −2( (t, ) − (t))grada (t, ).</p>
        <p>a(t0 ) = a(0) ,
da(t0 ) = 0.</p>
        <p>dt
 (t, ) = nj=1 j j (t).
d i = −2(nj=1 j j (t) − (t))i (t), i = 1, 2,..., n.</p>
        <p>dt
d i = −2i (t)(nj=1 j (t) j + 2 (t)i (t), i = 1, 2,..., n.</p>
        <p>
          dt
In this case we get system of ordinary differential equations (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) as follows:
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>System (11) can be written this way: one can observe that (12) is a linear non-homogeneous system of differential equations in the form Here</title>
        <p>d i = A(t) + f (t), t  t0.</p>
        <p>
          dt
 T = (1, 2,..., n ), f T (t) = 2 (t)(1(t),2 (t),...,n (t)),
(7)
(8)
(9)
(
          <xref ref-type="bibr" rid="ref8">10</xref>
          )
(11)
(
          <xref ref-type="bibr" rid="ref9">12</xref>
          )
(
          <xref ref-type="bibr" rid="ref10">13</xref>
          )
where W (t, ) denotes the fundamental matrix of the homogeneous system corresponding to (
          <xref ref-type="bibr" rid="ref10">13</xref>
          )
and normed at the moment  i.e.
        </p>
        <p>
          Similarly one can find a system of differential equations for functional (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) provided (
          <xref ref-type="bibr" rid="ref8">10</xref>
          ). In this
case, system (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ) can be written in this form:
t
 (t) = W (t, t0 ) (0) +  W (t, ) f (t)d ,
        </p>
        <p>t0
dW
dt
= A(t)W , W ( , ) = E .</p>
        <p>n
d i = −2 t ( n   ( ) − ( ))i ( )d , i = 1, 2,..., n.
dt t0 j=1 j j
dt 2
d 2 i = −2 (nj=1 j j (t) − (t))i ( ), i = 1, 2,..., n.
is a symmetric matrix of dimension n </p>
        <p>n,T means the sign of transposition.</p>
        <p>
          According to Cauchy formula the solution to problems (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ), (
          <xref ref-type="bibr" rid="ref10">13</xref>
          ) can be written as follows [16]
(14)
(15)
(16)
(17)
(18)
E 
n  ,
0 
(
          <xref ref-type="bibr" rid="ref11">19</xref>
          )
        </p>
        <p>System (16) is a linear system of integral-differential equations. Using (7) such a system can be
rewritten this way</p>
        <p>Linear system (17) could be written in a vector-matrix form
d
dt</p>
        <p>= A(t) + 2 f ,
where  T =  T , d T   0
 , f T (t) = (0T , f T (t)) are vectors of dimension 2n, A(t) = 
 dt   A(t)
is a matrix of dimension 2n  2n with known elements.</p>
        <p>However, to find a solution to system (18) one should consider a linear system of ordinary
differential equations (18) with Cauchy conditions (8). Using Cauchy formula we can write the
solution of system (18) for any initial conditions in the form [16]^
t
 (t) = W (t, t0 ) (t0 ) +  W (t, ) f ( )d</p>
        <p>
          t0
This matrix satisfies the matrix differential equation with initial conditions in the form
We rewrite formula (
          <xref ref-type="bibr" rid="ref12">20</xref>
          ) taking into account the structure of the vectors  , f and represent the
matrix W in structural form
d
        </p>
        <p>= A(t) .</p>
        <p>dt
dW
dt
= A(t)W , W (t0 ,t0 ) = E2n.</p>
        <p>
           W (
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ) (t, )
W (t, ) = 
W (
          <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
          ) (t, )
        </p>
        <p>
          W (
          <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
          ) (t, ) 
        </p>
        <p>
          
W (
          <xref ref-type="bibr" rid="ref2 ref2">2,2</xref>
          ) (t, ) 
where W (t, ) is normed at a moment  fundamental matrix of a homogeneous system:
where W (i, j) (t, ) is a matrix of dimension n. In this case we have:
 (t) = W (
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ) (t, t0 ) (0) +  t W (
          <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
          ) (t, ) f ( )d
        </p>
        <p>
          t0
d = W (
          <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
          ) (t, t0 ) (0) +  t W (
          <xref ref-type="bibr" rid="ref2 ref2">2,2</xref>
          ) (t, ) f ( )d .
        </p>
        <p>dt t0</p>
        <p>
          Formula (
          <xref ref-type="bibr" rid="ref14">22</xref>
          ), (
          <xref ref-type="bibr" rid="ref15">23</xref>
          ) show that in order to find and analyze the parameters vector we need only (
          <xref ref-type="bibr" rid="ref14">22</xref>
          ).
(
          <xref ref-type="bibr" rid="ref15">23</xref>
          ) is necessary for evaluating the field of convergence of iterative procedures (18) under initial
conditions.
        </p>
        <p>
          In some cases, for example, to determine a stationary mode of change of vector  (t), we need to
set a boundary conditions for derivative:
d (T ) =  (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ).
        </p>
        <p>
          dt
Then, using (24) and (
          <xref ref-type="bibr" rid="ref15">23</xref>
          ) one can find the appropriate initial data providing
 (0) = W (
          <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
          )−1 (T , t0 )  (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) − T W (
          <xref ref-type="bibr" rid="ref2 ref2">2,2</xref>
          ) (T , ) f ( )d .
        </p>
        <p>
          t0 
In this case, solution (
          <xref ref-type="bibr" rid="ref14">22</xref>
          ) can be written as follows:
        </p>
        <p>
           (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) − T W (
          <xref ref-type="bibr" rid="ref2 ref2">2,2</xref>
          ) (T , ) f ( )d  + t W (
          <xref ref-type="bibr" rid="ref2 ref2">2,2</xref>
          ) (T , ) f ( )d . (26)
 (t) = W (
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ) (t, t0 )W (
          <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
          )−1 (t, t0 ) 
t0  t0
(
          <xref ref-type="bibr" rid="ref12">20</xref>
          )
(
          <xref ref-type="bibr" rid="ref13">21</xref>
          )
(
          <xref ref-type="bibr" rid="ref14">22</xref>
          )
(
          <xref ref-type="bibr" rid="ref15">23</xref>
          )
(24)
(25)
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Analysis of iterative procedures convergence</title>
      <p>
        Let us analyze the convergence of iterative procedures using Lyapunov methods [4]. Consider two
types of functionals (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ).
      </p>
      <p>
        Case 1. Let us consider the iterative scheme based on the minimization of function (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ). Suppose
that the solution of Cauchy problem (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ), (
        <xref ref-type="bibr" rid="ref10">13</xref>
        ) meets the condition
 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) (t,t0, (0) ) → = const, t → . Then substituting:
we come to a homogeneous system of linear differential equations with respect to new variable  ( )
      </p>
      <p>
        Then under the assumption that the original data (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) can be perturbed, the convergence of iterative
procedure (
        <xref ref-type="bibr" rid="ref10">13</xref>
        ) is equivalent to the stability of the solution  (t)  0, t  t0 of linear homogeneous
systems (28). The following theorem is true.
      </p>
      <p>
        Theorem 1. For the convergence of iterative scheme (
        <xref ref-type="bibr" rid="ref10">13</xref>
        ) under perturbed initial data:
 (t,t0, (0) + (0) ) → , t → 
it is necessary and sufficient that the following condition holds:
      </p>
      <p>
        W (t, t0 ) → 0, for t → .
 = (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) (t,t0, (0) ) + (t)
d
dt
= A(t) , t  to.
(27)
(28)
(29)
(30)
(31)
      </p>
      <p>The proof of theorem 1 is based on representation (27), uses the condition of asymptotic stability
of homogeneous linear systems of differential equations in terms of fundamental matrix and
homogeneous system (28) solution representation by Cauchy formula [16, 29]</p>
      <p> (t) = W (t,t0 ) (0).</p>
      <p>Here  (0) is the n-dimensional vector of initial data for a homogeneous system (28),  is the
ndimensional stationary vector, which gives the solution to the problem.</p>
      <p>Comment 2. One can observe that under theorem 1 conditions convergence of iterative procedure
takes place for any initial data, i.e., in general. It follows from the fact that the asymptotic stability of
homogeneous linear systems is always global.</p>
    </sec>
    <sec id="sec-6">
      <title>Detection of chemical components in the plants and calculation experiment</title>
      <p>In this section, we consider the problem of spectral data processing of plants contaminated with
chemical elements and apply the technique offered in previous sections. We assume that plant</p>
      <sec id="sec-6-1">
        <title>Let us write it in form (33):</title>
        <p>d i = −2 (nj=1 j j (t) − (t))i ( ), i = 1, 2,..., n.
dt
d
dt</p>
        <p>= A(t) + f (t), t t0 ,T .</p>
        <p>
          In the case of discrete signals, the solution of system (
          <xref ref-type="bibr" rid="ref10">13</xref>
          ) can be represented as following:
 (i +1) = (i) + ( A(ti ) (i) + f (ti )) t), tt0,T ,
where t = ti − ti−1 is the quantization of time.
        </p>
        <p>Depending on type of experimental data to improve the detection of signs of chemical
contaminants contribution it is needed to hold some mathematical conversions. In Particular:
• for each selected discrete basic function (with the main chemical pollution) a new
basis is built, which is the difference of functions of the old basis and explored experimental
data;</p>
        <p>• over discrete basic functions and experimental data under investigation it is advisable
to make discrete Fourier transforming [1-4,28] and assume them as a new converted basic
and experimental data under investigation.</p>
        <p>Numerical experiment conducted under the described above adaptive algorithm. Spectral
experimental data on a plant specimens were chosen for the basic functions, which were
contaminated by the chemical elements CaCl and K2Cr2O7 . Spectral values of basic functions are
displayed on Figure 1. For the recognition of new experimental data for the contamination with
selected chemical elements, an adaptive algorithm is applied and the result are shown on Figure 2.
pollution is generated by some chemical elements and the spectral data received. They are considered
as basic for the recognition of new experimental data. Let us designate basic spectral functions:
1(t),2 (t),...,n (t), t0  t  T ,
which represent the spectral data of plant pollution by known chemical elements.</p>
        <p>
          Let  (t), tt0 ,T  be the measured spectral function contaminated by an unknown chemical
element. The function  (t, ) is chosen as a linear combination of (
          <xref ref-type="bibr" rid="ref8">10</xref>
          )  (t, ) = nj=1 j j (t).
Consider a system of ordinary differential equations (11)
(35)
        </p>
        <p>The unknown parameters vector converges to 0 for the experimental data contaminated by CaCl
and to 1 for those contaminated by K2Cr2O7 correspondingly. It means that contamination by
chemical element K2Cr2O7 is recognized.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>Information protection is a very complex process. Various technical devices and means are used to
intercept and record confidential information. Most of these devices transmit intercepted information
using a radio channel. The main thing in this matter is the detection of a signal in the radio range
spectrum, which is used by the means of covertly obtaining information. One of these methods can
be the adaptive method of approximating experimental data of the spectrum of means of tacitly
obtaining information.</p>
      <p>The method proposed in the paper uses an adaptive technique for signal approximation based on
the continuous gradient method. We evaluate a scalar continuous signal with a function that depends
on time and unknown parameters. The paper proposes two main algorithms corresponding to two
main functional describing the difference between a signal and a parametric function. This makes it
possible to significantly increase the probability of detecting signals of means of covertly obtaining
information, which will allow blocking the unauthorized channel of information leakage. And in
general, improve information protection.</p>
      <p>Considered a special case when the parametric function is a linear combination of the basic
function. The iterative procedure of convergence analysis is based on the second Lyapunov method.
Which proves the scientific novelty of the work.</p>
      <p>Theoretical conclusions and proposed algorithms are confirmed experimentally.</p>
      <p>Thus, the goal of the work has been achieved.</p>
    </sec>
    <sec id="sec-8">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
in distributed databases using fractal trees. 1. International Scientific And Practical
Proceedings.
1319 September 2021. Kharkiv Odesa, Ukraine. pp.32 37, ISBN 978-966-676-818-9.
[15] Laptiev, O.,Sobchuk, V.,Subach, I.,Barabash, A.,Salanda, I. The Method of Detecting Radio Signals
Using the Approximation of Spectral Function. CEUR Workshop Proceedings, 2022, 3384, pp.
52 61
-smooth functions by their Poisson type
81.
[17]
Lukovadetection of radio signals by estimating the parameters signals of eversible Gaussian propagation
99, 2024.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Serhii</surname>
            <given-names>Yevseiev &amp; Yuliia</given-names>
          </string-name>
          <string-name>
            <surname>Khokhlachova</surname>
            &amp;
            <given-names>Serhii</given-names>
          </string-name>
          <string-name>
            <surname>Ostapov</surname>
          </string-name>
          &amp; Oleksandr
          <string-name>
            <surname>Laptiev</surname>
          </string-name>
          et al,
          <year>2023</year>
          .
          <article-title>"Models of socio-cyber-physical systems security," Monographs, PC TECHNOLOGY CENTER</article-title>
          , number
          <volume>978</volume>
          -617-7319-72-5.redif, December. DOI: https://doi.org/10.15587/
          <fpage>978</fpage>
          -617-7319-72-5 Pratt W. Digital image processing. Wiley,
          <year>2007</year>
          . 807 p.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Lathi</surname>
            <given-names>B. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Green</surname>
            <given-names>R</given-names>
          </string-name>
          .
          <source>Essentials of Digital Signal Processing</source>
          . Cambridge University Press,
          <year>2014</year>
          . 763 p.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Sen</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Kuo</surname>
          </string-name>
          ,
          <string-name>
            <surname>Bob</surname>
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>Wenshun</given-names>
          </string-name>
          <string-name>
            <surname>Tian</surname>
          </string-name>
          .
          <source>Real-Time Digital Signal Processing: Fundamentals, Implementations and Applications</source>
          . Wiley,
          <year>2013</year>
          . 564 p.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Adali</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <source>Simon Haykin S. Adaptive Signal Processing: Next Generation Solutions</source>
          . Wiley,
          <year>2010</year>
          . 407 p.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Garaschenko</surname>
            <given-names>F.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shvets</surname>
            <given-names>O.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Degtiar</surname>
            <given-names>O.S.</given-names>
          </string-name>
          <article-title>Adaptive signals approximation models in structural-parametric classes of functions</article-title>
          .
          <source>Journal of Automation and Information Sciences</source>
          .
          <year>2011</year>
          . 2. P.
          <volume>69</volume>
          -
          <fpage>77</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Graham</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Goodwin</surname>
          </string-name>
          , Kwai Sang Sin.
          <article-title>Adaptive filtering prediction and control</article-title>
          .
          <source>Dover</source>
          ,
          <year>2009</year>
          . 557 p. -
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <year>2004</year>
          , vol.
          <volume>56</volume>
          (
          <issue>9</issue>
          ), pp.
          <fpage>1509</fpage>
          <lpage>1525</lpage>
          .
          <issue>103</issue>
          (
          <issue>5-6</issue>
          ), 869
          <fpage>880</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Pichkur</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sobchuk</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptiev</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cherniy</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matvienko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedorenko</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <source>The Adaptive Correction of Angular Velocities of an Unmanned Aerial Vehicle Based on Discrete Measurements of Orientation. IEEE International Conference on Methods and Systems of Navigation and Motion Control (MSNMC)</source>
          ,
          <fpage>24</fpage>
          -
          <lpage>27</lpage>
          October,
          <year>2023</year>
          . Proceedings. P.
          <volume>91</volume>
          -
          <fpage>95</fpage>
          (Online).https://doi.org/10.54039/ijcnis.v13i2.5008 https://www.ijcnis.org/index.php/ijcnis/article/view/5008
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Pichkur</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linder</surname>
          </string-name>
          , Ya. M.
          <article-title>Practical Stability of Discrete Systems: Maximum Sets of Initial Conditions Concept</article-title>
          .
          <source>Understanding Complex Systems. Contemporary Approaches and Methods in Fundamental Mathematics and Mechanics</source>
          . (eds. Sadovnichiy,
          <string-name>
            <given-names>Victor A.</given-names>
            ,
            <surname>Zgurovsky</surname>
          </string-name>
          , Michael). Springer,
          <year>2021</year>
          . p.
          <fpage>381</fpage>
          -
          <lpage>394</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Xiaoxin</surname>
            <given-names>Liao</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            <given-names>L.Q.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Pei</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <source>Stability of Dynamical Systems. Elsevier</source>
          ,
          <year>2007</year>
          . 719 p. [
          <volume>14</volume>
          ]
          <fpage>405</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Valentyn</surname>
            <given-names>Sobchuk</given-names>
          </string-name>
          , Roman Pykhnivskyi, Oleg
          <string-name>
            <surname>Barabash</surname>
          </string-name>
          (
          <year>2024</year>
          )
          <article-title>Sequential IDS for Zero-Trust - 99</article-title>
          . https://doi.org/10.20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2024</year>
          .
          <volume>3</volume>
          .
          <fpage>11</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Sobchuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olimpiyeva</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musienko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sobchuk</surname>
            ,
            <given-names>A. Ensuring</given-names>
          </string-name>
          <article-title>the properties of functional stability of manufacturing processes based on the application of neural networks CEUR 116</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Zamrii</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Haidur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Sobchuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Hryshanovych</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <article-title>Zinchenko and I. Polovinkin, "The Method of Increasing the Efficiency of Signal Processing Due to the Use of Harmonic Operators,"</article-title>
          <source>2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT)</source>
          , Kyiv, Ukraine,
          <year>2022</year>
          , pp.
          <fpage>138</fpage>
          -
          <lpage>141</lpage>
          , doi: 10.1109/ATIT58178.
          <year>2022</year>
          .10024212
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Sobchuk</surname>
            ,
            <given-names>V. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamrii</surname>
            ,
            <given-names>I. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barabash</surname>
            ,
            <given-names>O. V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Musienko</surname>
            ,
            <given-names>A. P.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Methodology for building a functionally stable intelligent information system of a manufacturing enterprise</article-title>
          .
          <source>Bulletin of Taras Shevchenko National University of Kyiv. Physics and Mathematics</source>
          , (
          <volume>4</volume>
          ),
          <fpage>116</fpage>
          <lpage>127</lpage>
          . https://doi.org/10.17721/1812-
          <fpage>5409</fpage>
          .
          <year>2021</year>
          /4.18
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Zhurakovskyi</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poltorak</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toliupa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pliushch</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Platonenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>Processing and detection system for zeroSystems</article-title>
          , vol.
          <volume>8</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>92</fpage>
          <lpage>99</lpage>
          , https://doi.org/10.20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2024</year>
          .
          <volume>3</volume>
          .11 [30]
          <string-name>
            <surname>Shestak</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toliupa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shevchenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torchylo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Onyigwang</surname>
            ,
            <given-names>O.J.</given-names>
          </string-name>
          <string-name>
            <surname>Data Processing</surname>
          </string-name>
          <article-title>Centre's Cyberattack Protection Directions on the Base of Neural Network Algorithms</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          ,
          <year>2022</year>
          ,
          <volume>3347</volume>
          , pp.
          <fpage>212</fpage>
          <lpage>221</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>