<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Interval Mackey-Glass System in the Bipolar Coordinates⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Roman Voliansky</string-name>
          <email>avoliansky@ua.fm</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nina Volianska</string-name>
          <email>ninanin@i.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aji Prasetya Wibawa</string-name>
          <email>aji.prasetya.ft@um.ac.id</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Igor Sikorsky Kyiv Polytechnic Institute</institution>
          ,
          <addr-line>37 Polytechnichna Str. Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Malang</institution>
          ,
          <addr-line>Str. Jl. Cakrawala, 65145, Malang</addr-line>
          ,
          <country country="ID">Indonesia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymirska Str, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Our paper is devoted to the study and design of novel chaotic systems to use in various applications. In our paper, we offer to use coordinate transformations to design a chaotic system and define its motions using algebraic-differential state space equations. We consider the known chaotic systems and apply some coordinate transformations to them. In this case, the system differential equations are used to define the known system, and observability algebraic equations depend on the used coordinate transformation. Our paper considers the transformation from cartesian coordinates into bipolar ones and vice versa. The direct transformation from cartesian coordinates in bipolar is based on using two lengths from the representative point, which define a system motion to some different base points. This transformation can be used when one interprets chaotic system state variables as coordinates in the orthogonal axes. This transformation is defined by quadratic polynomials, which usage is relatively trivial. On the contrary, the inversed transformation from bipolar to cartesian coordinates is complex enough, and its implementation can require a lot of computational resources. This drawback can be avoided by using interval methods, which allow us to define transformation equations using piecewise linear functions. In this case, one can consider the observability equations in the simplest linear-like form, which can be easily used to solve both direct and inverse transformation problems. We show the use of our approach by considering a wellknown Mackey-Glass system and transforming it into bipolar coordinates by using exact and interval solutions of transformation equations. The performed research shows the similarity of the obtained results, which proves the correctness of the used approach and methods.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Chaotic systems</kwd>
        <kwd>coordinate transformation</kwd>
        <kwd>interval models</kwd>
        <kwd>direct and inverse problems 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The rapid growth of analog and digital communications in different areas of human activities has
necessitated the development of highly secure transmission methods to protect information
exchange from various unauthorized accesses and cyberattacks [1-3]. The problem becomes
important due to the rise of the Internet of Things paradigm [4-6], which allows access for many
users to some sensors or actuators [7]. The unauthorized person can harm such systems and cause
damages in industrial and other applications [8-10].</p>
      <p>Nowadays, different traditional cryptographic techniques are widely used, based on symmetric
(AES, DES) [11-13] and asymmetric (RSA, ECC) encryption [14-17]. The main feature of these
techniques is the computational complexity of mathematical problems, which are considered the
basis for encryption algorithms. However, the increasing computational power of modern
adversaries, which can use different application-specific integrated circuits to operate with the
conventional encryption algorithm, and the potential emergence of quantum computers make
conventional encryption methods vulnerable [18-19].</p>
      <p>As a result, researchers turn their attention to alternative approaches to improve data
communication security. The use of chaotic systems is one of them [20-22].</p>
      <p>It is well-known that chaotic systems are dynamical systems that motions are sensitive to initial
conditions. Also, one can find the aperiodicity and high complexity of such systems. These facts
make chaotic systems well-suited to use in secure communication applications to generate
unpredictable signals that can be used for data encryption, key generation, and establishing secure
data transmission channels with high resistance to brute-force attacks. [23-25]</p>
      <p>Moreover, since chaotic systems can be implemented using digital and analog devices, they can
be used in various transmission environments and establish secured optical, radio-frequency, and
acoustic data communication channels. [26-27]</p>
      <p>Many papers are devoted to studying known and designing novel chaotic systems. The main
drawback of known papers is the very subjective design of chaotic systems. Authors start
considering a system without explaining why and how this system is designed. This fact makes
system improvement a pretty challenging process. [28-30]</p>
      <p>We offer to avoid this drawback by applying some coordinate transformation to known chaotic
systems and designing a novel system with known features on their basis.</p>
      <p>Our paper is organized as follows. At first, we consider the generalized first-order delayed
nonlinear system and apply to it coordinate transformation, which defines its motion in the bipolar
coordinates. Then, we consider an inverse transformation and show its complexity. Third, we show
the use of interval methods to simplify the chaotic system transformation. We consider using our
approach by transferring a well-known Mackey-Glass system with exact and interval
transformations.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Method</title>
      <sec id="sec-2-1">
        <title>2.1. The Exact Direct and Inverse Transformations Between the Cartesian and</title>
      </sec>
      <sec id="sec-2-2">
        <title>Bipolar Coordinates</title>
        <p>It is a well-known fact that motion of some dynamical system can be studied by using its phase
portrait (Figure 1).</p>
        <p>Y
yA
yP1
yP2</p>
        <p>P1
xP1
d1</p>
        <p>A
d2</p>
        <p>P2
xA
xP2</p>
        <p>X</p>
        <p>
          In general case this phase portrait represents 2D projection of system motions which are
produced as solution of nonlinear differential equations. In our paper we consider a first-order
delayed nonlinear dynamical system which motion is given as follows
x˙=f ( x , xtau)
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
where x is a system generalized state variable, f(.) is some nonlinear function and τ is a system time
delay.
        </p>
        <p>We assume that all system motions are localized in first quadrant of system phase plane as it is
shown in Figure 1 and we consider the horizontal axis as axis where current values of system state
variable are placed and vertical axis is used as position of delayed values of the state variable. It is
clear that both of these coordinates are defined in relation to axes origin and it is necessary to have
the possibility to define a distance between the origin and corresponding projection of system
representative point A to find the system coordinate.</p>
        <p>At the same time the analysis of system phase portrait and applying various coordinate
transformations to it gives us the possibility to design novel dynamical systems. We claim that
such an approach is based on the possibility of different interpretation of system state variables.
Due to the using of coordinate transformations the resulted system can produce the desired
motions in the given phase plane’s domain.</p>
        <p>In our paper we offer to consider the system motion in bipolar coordinates. In this case the
position of system representative point A can be defined by using distances d1 and d2 from some
base points P1 and P2 to the considered representative point. Here we assume that coordinates xP1,
xP2, yP1, yP2 of P1 and P2 points are known.</p>
        <p>
          If one take into account Figure 1 he can write down expressions which define the distances
between points in such a way
d12=( x A− x P1)2+( y A− y P1)2 ; d22=( x A− x P 2)2+( y A− y P 2)2 , x A= x ; y A= xτ
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
        </p>
        <p>
          From the control theory viewpoint one can consider (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) as polynomial observability equations
for system (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ). These equations allow us to solve both direct and inverse problems of system
coordinate transformation. The direct problem gives us the possibility to define system position in
bipolar coordinates with pair of distances d1 and d2 by using known system state variable and base
points. It is clear that due to the quadratic functions in (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) the solution of the direct problem allows
to produce direct d1p, d2p, and inverse d1m, d2m system outputs
x A= x P 1±
        </p>
        <p>
          (2( x P 1−2x(P 2y)P2+1−2(yyP 2P)1− y P 2)2) (d12−d22+( x P+1(−yxP 1P −2)2y+P(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )y2P 1− y P 2)2+ )×
√
( x P 1− x P 2)2−(d1−d2− y P 1+ y P 2)(d1−d2+ y P 1− y P 2)( x P 1− x P 2) ×− y6P 1+
2
×(−( x P 1− x P 2)2+(d1+ d2)2−( y P 1− y P 2)2)
2
+(2 d12+2 d22−( x P 1− x P 2)2−15 y2P 2) y4P 1−8(d12+ d22− ( x P 1− x P 2) − 5 y2P 2) y P 2 y3P 1+
2 2
−15 y4P 2+(12 d12+12 d22−6 ( x P 1− x P 2)2) y2P 2+ x4P 1−4 x3P 1 x P 22+6 y5P 1 y P 2+
+( 4 d12+6 x2P 2) x2P 1+(−8 d12 x P 2−4 x3P 2) x P 1+ x4P 2+ 4 d12 x2P 2−(d1−d2)2(d1+ d2) y P 1
2 ¿
d1 p=√( x A− x P 1)2+( y A− y P 1)2 ; d1m=−√( x A− x P 1)2+( y A− y P 1)2 ;
d2 p=√( x A− x P 2)2+( y A− y P 2)2 ; d1m=−√( x A− x P 2)2+( y A− y P 2)2
which can be used in various applications.
        </p>
        <p>
          If one solves (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) for system coordinates in the cartesian plane he obtains the solution of inverse
problem and define the position of system representative point as function of base points
coordinates and distances between these points and representative point
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
±
−2 x4P 1 y2P 2+20 x3P 1 x3P 2+8 x3P 1 x P 2 y2P 1−16 x3P 1 x P 2 y P 1 y P 2+8 x3P 1 x P 2 y2P 2−
−15 x2P 1 x4P 2−12 x2P 1 x P 2 y2P 1+24 x2P 1 x P 2 y P 1 y P 2− x P 2 y4P 2−
        </p>
        <p>2 2 2
−12 x2P 1 x P 2 y2P 2− x P 1 y4P 1+ 4 x2P 1 y P 1 y P 2−6 x2P 1 y P 1 y2P 2+</p>
        <p>2 2 3 2
+ 4 x2P 1 y P 1 y3P 2− x P 1 y4P 2+6 x P 1 x5P 2+8 x P 1 x P 2 y2P 1−16 x P 1 x P 2 y P 1 y P 2+</p>
        <p>2 3 3
+8 x P 1 x P 2 y2P 2+2 x P 1 x P 2 y4P 1−8 x P 1 x P 2 y P 1 y P 2+12 x P 1 x P 2 y P 1 y2P 2−</p>
        <p>3 3 2
−8 x P 1 x P 2 y P 1 y3P 2+2 x P 1 x P 2 y4P 2− x6P 2−2 x P 2 y2P 1+ 4 x4P 2 y P 1 y P 2−</p>
        <p>4
−2 x4P 2 y2P 2− x P 2 y4P 1+ 4 x2P 2 y P 1 y P 2−6 x2P 2 y P 1 y2P 2+ 4 x2P 2 y P 1 y P 2
2 3 2 3</p>
        <p>2( x P 1− x P 2)2+2( y P 1− y P 2)2</p>
        <p>
          One can consider (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) as observability equation for the nonlinear system (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) in the case when
system state variables are considered as distances d1 and d2 between points in the phase plane. Due
to the solution of system quadratic equations one gets several signals in this case as well. It is
necessary to say that the use of quadratic dependencies like (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) to define representative point’s
position cause a quite complex solution of inverse problem which requires some calculation
resources to define a system position during its study and implementation.
        </p>
        <p>
          It is necessary to say that the solution of inverse problem can be used to redefine (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) in terms d1
and d2 only by substituting (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) into (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ). Such an approach allows us to exclude from a consideration
the observability equations (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ). At the same time the resulting motion equation can become a quite
complex and hardly have a practical usage.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>2.2. The Interval Direct and Inverse Transformations Between the Cartesian and</title>
      </sec>
      <sec id="sec-2-4">
        <title>Bipolar Coordinates</title>
        <p>
          We offer to avoid the above-mentioned drawback by replacing the exact nonlinear functions in the
right-hand expressions of (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) with intervals of their possible values. Due to the similarity of
summands in (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) we use the simplified transformation of nonlinear function into the interval form
by replacing each nonlinear summand with intervals of their possible values. In this case we
consider the nonlinear function as one variable functions. Although, one can use the same
approach in the most general case of multivariable functions by studying their boundaries in the
state space.
        </p>
        <p>
          Let us consider the proposed approach by using the following quadratic nonlinear function
f 1( x )=( x− x P)2
This function can be bounded by some piecewise linear functions f1max(x) and f1min(x)
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
f 1min ( x )={a11min x +b11min if
        </p>
        <p>a1nmin x +b1nmin if
f 1max ( x )={a11max x +b11max if
a1nmax x +b1nmax if
x1min ≤ x &lt; x11 ;
x1n&lt; x ≤ x1max ,
x1min ≤ x &lt; x11 ;
x1n&lt; x ≤ x1max ,
here aijmin, aijmax, bijmin, bijmax are piecewise linear factors, xij are fracture points where piecewise linear
function change its parameters, n and m are numbers of fracture points in upper and lower
boundaries.</p>
        <p>
          It should be mentioned that in the most general case the fracture points for lower and upper
boundaries can be different. One can define these points as the solution of optimization problem
xmax (
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
I = ∫ ( f 1min ( x )−f 1( x ))2+( f 1max ( x )−f 1( x ))2 dx → min
        </p>
        <p>xmin
for the given numbers n and m of the fracture points.</p>
        <p>
          Since the considered boundary functions are piecewise linear one, (
          <xref ref-type="bibr" rid="ref7">7</xref>
          ) can be rewritten as follows
n xi+1 n xi+1
I =∑ ∫ ( f 1min ( x )−f 1( x ))2 dx +∑ ∫ ( f 1max ( x )−f 1( x ))2 dx → min
        </p>
        <p>i=0 xi i=0 xi
here x0=xmin and xm+1=xmax.</p>
        <p>In other word the problem of definition of fracture points can be considered as the problem of
minimization the square of domains between the considered function and its boundaries.</p>
        <p>
          We use (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ) as boundaries to define the interval of possible values of function f(x)
f 1( x )∈ f 1( x); f 1( x)=[ f 1min ( x ) , f 1max ( x )]
The graphical representation of our approach is shown in Figure. 2.
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
(
          <xref ref-type="bibr" rid="ref9">9</xref>
          )
        </p>
        <p>
          As one can see the considered nonlinear function belongs to the defined interval and it does not
exceed interval (
          <xref ref-type="bibr" rid="ref7">7</xref>
          ) for any values from the interval of possible values of system state variable.
        </p>
        <p>This fact proves the correctness of the used approach to replace the nonlinear function with the
linear or piecewise linear intervals which define the domain where the initial nonlinear function is
defined.</p>
        <p>
          Substitution (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ) into (
          <xref ref-type="bibr" rid="ref9">9</xref>
          ) gives us the possibility to define the domain f1(x) in terms of function
argument x and approximation parameters ai and bi
        </p>
        <p>
          f 1=a1 x1+ b1=[ a1 min , a1 max ] x1+[ b1 min , b1 max ] ,
a1 min= ∪in=11 a1 imin ; a1 max= ∪im=11 a1 imax ; b1 min= ∪in=11 b1 imin ; b1 max= ∪im=11 b1 imax , ,
(
          <xref ref-type="bibr" rid="ref10">10</xref>
          )
a1 imin=[ a1 imin , a1(i+1)min] , b1 imin=[ b1 imin , b1(i+1)min] ,
a1 imax=[ a1 imax , a1(i+1)max ] , b1 imax=[ b1 imax , b1(i+1)max ] .
        </p>
        <p>Thus, the use of interval methods gives us the possibility to redefine the initial nonlinear
function in the linear-like interval form which can be easy used to solve various mathematical
problems.</p>
        <p>
          It is clear that the above-given transformations can be performed for the second summand in (
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
as well
        </p>
        <p>
          f 2( x )∈ f 2( x) , f 2=a2 x2+ b2=[ a2 min , a2 max ] x2+[ b2 min , b2 max ] ,
a2 min= ∪in=21 a2 imin ; a2 max= ∪im=21 a2 imax ; b2 min= ∪in=21 b2 imin ; b2 max= ∪im=21 b2 imax , ,
(
          <xref ref-type="bibr" rid="ref11">11</xref>
          )
a2 imin=[ a2 imin , a2(i+1)min] , b2 imin=[ b2 imin , b2(i+1)min] ,
a2 imax=[ a2 imax , a2(i+1)max ] , b2 imax=[ b2 imax , b2(i+1)max ] .
        </p>
        <p>
          We define boundaries f2min(x) and f2max(x) by using expression which is similar to (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ) but defined
by its own piecewise linear approximation factors. Also, we assume that number of fracture points
ni and mi are different for different boundaries.
        </p>
        <p>
          If one substitutes (
          <xref ref-type="bibr" rid="ref11">11</xref>
          ) and (
          <xref ref-type="bibr" rid="ref10">10</xref>
          ) into (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) he can rewrite the last equations as follows
(
          <xref ref-type="bibr" rid="ref12">12</xref>
          )
(
          <xref ref-type="bibr" rid="ref14">14</xref>
          )
d12=[ d12min , d12max ]=a11 x A+ a12 y A+ b11+ b12 ;
        </p>
        <p>2 2
d2=[ d22min , d2max ]=a21 x A+ a22 y A+ b21+ b22 .
here interval factors aij and bij are caused by using coordinates of different base points.</p>
        <p>
          We call (
          <xref ref-type="bibr" rid="ref12">12</xref>
          ) as interval direct observability equations which allows to define the distance
between the system representative point and some base point. Analysis of right-hand expressions
in (
          <xref ref-type="bibr" rid="ref12">12</xref>
          ) shows these expressions are linear for system state variables.
        </p>
        <p>
          Similar to (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) one can consider the solution (
          <xref ref-type="bibr" rid="ref12">12</xref>
          ) for di as the source of two inverted signals.
Contrary to (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) one should take into consideration that these signals are defined in the interval
form and rather define domain where signals are localized than the signals. Although the length of
this domain can be considered neglectable small in case of small intervals (
          <xref ref-type="bibr" rid="ref11">11</xref>
          ) and (
          <xref ref-type="bibr" rid="ref12">12</xref>
          ). In this case
(
          <xref ref-type="bibr" rid="ref12">12</xref>
          ) can be considered as almost exact solution of the direct problem.
        </p>
        <p>In the most general case, one can use different ways to localize the considered signals. In our
paper we offer to use sliding mode approach to perform such an operation</p>
        <p>
          di=±( (dimin+2dimax) + (dimax −2dimin) g ([ S ]) sign ( S )). (
          <xref ref-type="bibr" rid="ref13">13</xref>
          )
here S is equation of some sliding plane which define the switching between upper and lower
boundaries of the defined distance and g(.) is some odd function which allows to control the
amplitude of sliding mode oscillations.
        </p>
        <p>Thus, the use of interval methods allows us to simplify the solution of the direct problem by
using linear expressions in system observability equations. This approach gives the possibility to
reduce the calculation resources, which are necessary to spend, to define the considered system
outputs in case of using low and middle-range MCU without hardware multiplication support.</p>
        <p>
          We think that the main benefits of using (
          <xref ref-type="bibr" rid="ref12">12</xref>
          ) instead of (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) is the possibility to solve the inverse
problem in a quite simple way
x A=
y A=
a22 d1−a12 d22+( b21+ b22) a12−( b11+ b12) a22 ;
2
        </p>
        <p>
          Comparison of (
          <xref ref-type="bibr" rid="ref14">14</xref>
          ) and (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) proves our claiming about simplification of the inverse problem’s
solution. Although, it is clear that the determination of system state variables according to (
          <xref ref-type="bibr" rid="ref14">14</xref>
          )
requires to know the intervals aij and bij. That is why one should define the intervals of system
state variable [xi, xi+1] and [yi,yi+1] in which equations (
          <xref ref-type="bibr" rid="ref12">12</xref>
          ) have different signs. Approximation
factors for these intervals can be used in (
          <xref ref-type="bibr" rid="ref14">14</xref>
          ) to define system state variables by known distances
from the base points.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Results and Discussion</title>
      <sec id="sec-3-1">
        <title>3.1. Exact Mackey-Glass System in the Bipolar Coordinates</title>
        <p>
          We show the use of our approach to define system dynamic in bipolar coordinates by considering a
well-known Mackey-Glass equation
x˙A=−γ x A + β
y A + ynA , y A= x A τ.
1
(
          <xref ref-type="bibr" rid="ref15">15</xref>
          )
here γ and β are system factors, n means some power, x A is a state variable that shows position of
representative point A in the horizontal axis of system phase plane (Figure. 3), we use the shifted in
τ sec value of the state variable to define the system vertical position in phase plane.
        </p>
        <p>
          Under some parameters and initial conditions (
          <xref ref-type="bibr" rid="ref15">15</xref>
          ) define chaotic system motions(Figure.4) and
can be considered as the mathematical basis to design a chaotic generator.
Here we study system with following parameters γ=1, β=2, τ=4, n=10, x(0)=1.
        </p>
        <p>Since the Mackey-Glass system is a well-studied dynamical system its usage as true random
generator in various applications which are connected with secured data transmission can be
compromised and cause data leakage.</p>
        <p>That is why we offer to use some novel coordinate basis where motion of this system is not
known yet. We consider bipoloar coordinate system and assume that in the system phase plane
two base points P1 and P2 are defined(Figure.3).</p>
        <p>
          In this case usage (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) allows us to perform direct transformation from cartesian coordinates into
bipolar one. It is possible to claim that such a transformation defines motions of the novel chaotic
systems by using (
          <xref ref-type="bibr" rid="ref15">15</xref>
          ) and (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ). Systems motions as wells as its phase portrait are shown in Figure.5
and Figure.6.
        </p>
        <p>Analysis of the given in Figure.5 -Figure.6 simulation results for Mackey-Glass system in bipolar
coordinates proves the possibility to design novel chaotic system by applying some nonlinear
coordinate transformations to known chaotic system. Such a coordinate transformations lead to to
considering nonlinear observability equations which define only system output but do not change
its inner dynamic. Thus, if the initial system moves through the chaotic trajectories, the
transformed one also have a chaotic nature.</p>
        <p>At the same time, the usage of proposed approach, which is based on the determination of
distance between system representative point and some base points, allows us to define new
system outputs which number equals to number of base points which are used to define system
coordinates. Thus, one can use this fact to increase the number of system outputs which produce
chaotic oscillations. Comparison the oscillations in Figure.4 and Figure.6 allows us to claim that the
use of nonlinear transformations allows us to change the form and frequency of oscillations as well
as system attractors.</p>
        <p>Mackey-Glass trajectories in coordinates</p>
        <p>The one more feature of the considered approach is the use of quadratic polynomials which
solution allows to define both positive and negative values for the system coordinates. Since these
coordinates are considered as distances between points, we call the case of positive distances as the
main one and cases with one or two negative coordinates are considered as secondary. This fact
defines four possible system attractors which are shown in Figure.6 and one can use different
switching techniques to switch from one attractor to another and design variable structure chaotic
systems which design is out of our paper’s scope.</p>
        <p>In Figure.5 and Figure.6 we show the simulation results for the chaotic system with fixed
coordinates of the base points. We see one more way to improve system features by considering its
motions relatively to moved base points. It is clear that the base points’ motions can be defined by
using different laws and it also require a detailed study which is a topic of our future research.</p>
        <p>Here we show the principle of changing system dynamic by considering coordinates of base
points as the values of system state variable xA which are taken in different time moments. In
Figure.7 and Figure.8 simulation results are shown for the case when xP1=xA1, yP1=xA2, xP2=xA3,
yP2=xA4, here number near xA variable means number of seconds to shift the signal.</p>
        <p>Analysis of the given in Figure.7 and Figure.8 curves shows that the positions of base points
make great effect in system dynamic and allows to design one more novel chaotic system which
attractor is localized in the given quadrant and has form different from the above-considered
attractors.</p>
        <p>
          All above-studied models are designed for the case when system state variables are considered
as coordinates in some cartesian system. At the same time, one can consider state variables of any
dynamical system without any references to coordinate systems. For example, one can interpret
system state variables as given in the bipolar coordinate system. In this case transformation of
Mackey-Glass system dynamic is performed by using the inversed observability equations (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ).
        </p>
        <p>
          Simulation results for the Mackey-Glass system with observability equations (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) are shown in
Figure.9 and Figure.10
        </p>
        <p>
          Analysis of the given in Figure.9 and Figure.10 simulation results proves the possibility to
change a system output trajectory as well as its phase portrait by using nonlinear observability
equations. Similar to previous considered systems, dynamical system from Figure.9 and Figure.10
defines two pair of output signals. Each pair are defined by direct and inversed signals which can
be used in various applications. At the same time, one should take into account that combinations
of distances d1 and d2 should correspond the base point coordinates. In other words, not all bipolar
coordinates d1 and d2 can be transformed into the cartesian one. The possibility to perform
transformation can be found from (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) which should take real values. The complex values of system
output show that such a combination of bipolar coordinates cannot be transformed into cartesian
ones.
        </p>
        <p>All above-studied systems have symmetric attractors and can be used as the basis to design
more complex chaotic systems. However, if one assumes that base points are moved in the phase
plane and their motion is defined according above-shown interrelations, one can get more complex
chaotic motion (Figure.11 and Figure.12)</p>
        <p>The given in Figure.11 and Figure.12 simulation results shows that in the most common case the
produced system outputs in each pair can be asymmetrical ones. As the result attractors
overlapping can be found. One can use this fact to design highly nonlinear multichannel chaotic
system which outputs are non-inverse and produced according non-harmonic dependencies.
3.2. Interval Mackey-Glass System in the Bipolar Coordinates
Due to the complexity of the above-used transformations, now we consider the Mackey-Glass
system and its coordinate transformations in the interval form.</p>
        <p>It is clear that the main feature of the considered system, which cause the chaotic dynamic, is
nonlinear function of delayed state variable.</p>
        <p>
          Let us rewrite this function in the interval form (
          <xref ref-type="bibr" rid="ref9">9</xref>
          ) and define boundary functions as follows
f 1min ( y A )=
f 1max ( y A )=
        </p>
        <p>y A if
{ −1.86 y A +2.35 if</p>
        <p>0.43 y A +0.3 if
−0.43 y A +1.08 if
−0.54 y A +0.79 if
−0.01 y A +0.031 if</p>
        <p>y A if
{ −1.66 y A +2.15 if</p>
        <p>0.58 y A +0.26 if
−0.41 y A +1.04 if
−0.61 y A +0.91 if
−0.08 y A +0.161 if</p>
        <p>
          Graphically these functions are given in Figure.13
(
          <xref ref-type="bibr" rid="ref15">15</xref>
          )
Simulation results for such a system are shown in Figure.14 and Figure 15.
        </p>
        <p>As one can see the use of interval methods allows us to define interval signal which is bounded
by lower and upper boundary system trajectories. At the same time, the system attractor as well as
its oscillations are similar to the initial nonlinear system. This fact allows us to claim correctness of
the performed transformation from exact to interval system. Such a transformation extended the
class of chaotic systems and allows to consider the systems which produce an infinite set of signals
from the filled domain (Figure.15). One can use various methods to select one or several exact
signals from this set.</p>
        <p>
          If take into account the coordinates of the base points he can perform the piecewise linear
interval approximation (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) and transform the nonlinear observability equations into linear-like
interval form (
          <xref ref-type="bibr" rid="ref10">10</xref>
          ).
        </p>
        <p>
          Simulation results for interval Mackey-Glass system (
          <xref ref-type="bibr" rid="ref15">15</xref>
          ) with boundaries (
          <xref ref-type="bibr" rid="ref16">16</xref>
          ) and observability
equations (
          <xref ref-type="bibr" rid="ref10">10</xref>
          ) are shown in Figure.16 and Figure.17
        </p>
        <p>
          Comparison of attractors in Figure 16 and Figure.5 show their similarity that prove the
possibility to use the interval methods to design and study systems with chaotic dynamic. Contrary
to the classical approach which is based on the use of nonlinear transformation equations the use
of piecewise linear interval equations allows to simplify the mathematical model of the considered
system and reduce the computational resources which are used to simulate system in bipolar
coordinates with fixed base points. It is clear that it becomes possible because of the one-time
solving optimization problem (
          <xref ref-type="bibr" rid="ref8">8</xref>
          ) which can be done before simulation starting. At the same time,
in case of the use moved base points piecewise linear approximation should be performed for all
base points coordinates.
        </p>
        <p>
          Nevertheless, the all-above-given features of system with interval piecewise linear observability
equation, the main benefit of such systems is the possibility to perform inverse transformation
from bipolar coordinates into cartesian ones without performing complex calculations. In Figure.18
and Figure 19 we show the simulation results for the case when the system state variables are
considered as bipolar coordinates and then applying (
          <xref ref-type="bibr" rid="ref14">14</xref>
          ) allows us to solve the inverse problem.
        </p>
        <p>Comparison attractors in Figure.9 and Figure. 18 shows the similar patterns which proves the
correctness of performed transformation. Moreover, the considering interval model allows us to
study the attractor’s deformation which are caused by motions in various system boundaries. This
study allows us to claim that real system attractor is in the domain where both minimal and
maximal attractors are defined. Also, one can see that approaching the upper boundary compresses
the system attractor.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>Our studies claim that using nonlinear coordinate transformation equations as observability
equations allows us to design novel chaotic systems as systems which dynamic are defined by
state-space equations. The features of this system depend on both the initial chaotic system and the
coordinate transformation used. Since these transformations can be quite complex, it can be hard to
use them to solve direct and inverse transformation problems. One can avoid this drawback by
using interval methods, which allows us to rewrite system dynamics as piecewise linear differential
equations with the piecewise linear observability equations. Such an approach makes it possible to
get results similar to the solution of exactly defined equations.</p>
      <p>We see the future development of our research in designing the control system to synchronize
the considered chaotic systems with some signals.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools..
[17] T. Mendez and S. G. Nayak, "ASIC Design and Implementation of a Power-Delay Product
Optimized Arithmetic Operational Unit," 2023 International Conference on Modeling,
Simulation &amp; Intelligent Computing (MoSICom), Dubai, United Arab Emirates, 2023, pp. 59-64,
doi: 10.1109/MoSICom59118.2023.10458728.
[18] Z. Lu, T. Yi and Z. Hong, "A Review of PPG/NIRS Acquisition ASIC and System," 2021 IEEE
14th International Conference on ASIC (ASICON), Kunming, China, 2021, pp. 1-4, doi:
10.1109/ASICON52560.2021.9620430.
[19] Chien, T. I., et. al.: Design of multiple-accessing chaotic digital communication system based
on Interleaved Chaotic Differential Peaks Keying (I-CDPK). In: 2008 6th International
Symposium on Communication Systems, Networks and Digital Signal Processing, pp.
638642Graz, Austria (2008), doi: 10.1109/CSNDSP.2008.4610717
[20] Shaocheng, Qu, et. al.: Adaptive secure communication based on Unified chaotic systems with
varying parameters. In: 2009 Chinese Control and Decision Conference, pp. 18-22, Guilin
(2009), doi: 10.1109/CCDC.2009.5195141.
[21] Wang, S. F.: Dynamical Analysis of Memristive Unified Chaotic System and Its Application in
Secure Communication. IEEE Access, 6, 66055-66061 (2018), doi:
10.1109/ACCESS.2018.2878882.
[22] Jinlong, L., et. al.: A secure communication scheme using chaotic system array. In: 2015 34th
Chinese Control Conference. CCC-2015, pp. 407-412, Hangzhou, China, 2015, doi:
10.1109/ChiCC.2015.7259672
[23] Moufak Dukhan, A., et. al.: A multi-level hybrid chaotic system with a novel damping
approach to achieve variable rates. In: 2017 27th International Telecommunication Networks and
Applications Conference. ITNAC-2017, pp. 1-6, Melbourne, VIC, Australia, 2017, doi:
10.1109/ATNAC.2017.8215423.
[24] Liu, P., et. al.: Dynamic Analysis of Novel Memristor Chaotic Systems with Influence Fac-tors.</p>
      <p>
        In 2023 IEEE International Conference on Electrical, Automation and Computer Engi-neering.
ICEACE-2023, pp. 118-122, IEEE, Changchun, China (2023), doi:
10.1109/ICEACE60673.2023.10441899.
[25] Rodrigues, V. H. P., et. al.: Globally Stable Synchronization of Chaotic Systems Based on Norm
Observers Connected in Cascade. IEEE Transactions on Circuits and Systems II: Ex-press
Briefs, 63(
        <xref ref-type="bibr" rid="ref9">9</xref>
        ), 883-887 (2016), doi: 10.1109/TCSII.2016.2534798
[26] Prabu, R. et. al.: A new Chaotic Jerk system based only on a Single quadratic equation
displaying Coexisting attractors. In: 2024 Third International Conference on Smart Technolo-gies
and Systems for Next Generation Computing. ICSTSN-2024, pp. 1-3, Villupuram, In-dia (2024),
doi: 10.1109/ICSTSN61422.2024.10670956.
[27] Voliansky, R. et. al.: Variable-Structure Interval-Based Duffing Oscillator. In: 2024 IEEE 42nd
International Conference on Electronics and Nanotechnology ELNANO-2024, pp. 581-586,
IEEE, Kyiv, Ukraine (2024). doi: 10.1109/ELNANO63394.2024.10756860.
[28] Bian, H. et. al.: Parameter Inversion of High-Dimensional Chaotic Systems Using Neural
Ordinary Differential Equations. In: 2024 IEEE 13th Data Driven Control and Learning
Systems Conference. DDCLS-2024, pp. 400-405, Kaifeng, China (2024), doi:
10.1109/DDCLS61622.2024.10606602.
[29] Voliansky, R., Volianska, N.: Modified Chuas Circuit in Different State Spaces. In: Os-troumov,
I., Zaliskyi, M. (eds) Proceedings of the 2nd International Workshop on Advances in Civil
Aviation Systems Development. ACASD 2024. Lecture Notes in Networks and Systems, vol
992. Springer, Cham (2024), https://doi.org/10.1007/978-3-031-60196-5_31
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1] . Chen,
          <string-name>
            <given-names>H.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yin</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <article-title>"A Research of PPM in Digital Communication : The Influence of SNR," 2021 International Conference on Wireless Communications and Smart Grid (ICWCSG), Hangzhou</article-title>
          , China,
          <year>2021</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>52</lpage>
          , doi: 10.1109/ICWCSG53609.
          <year>2021</year>
          .
          <volume>00017</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>H. V.</given-names>
            <surname>Articona</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. C.</given-names>
            <surname>Torres</surname>
          </string-name>
          ,
          <article-title>"Sustainable Digital Communication (SDC) from a Systems Perspective of Mediated Communication Processes in Business Organizations: A Basis for a Mathematical Model,"</article-title>
          <source>2024 8th International Conference on Business and Information Management (ICBIM)</source>
          , Pattaya, Thailand,
          <year>2024</year>
          , pp.
          <fpage>132</fpage>
          -
          <lpage>136</lpage>
          , doi: 10.1109/ICBIM63313.
          <year>2024</year>
          .
          <volume>10823478</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>O.</given-names>
            <surname>Holubnychyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sushchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Averyanova</surname>
          </string-name>
          , et. al. “
          <article-title>Self-Organization Technique with a Norm Transformation Based Filtering for Sustainable Infocommunications Within CNS/ATM Systems</article-title>
          ,” In: “
          <source>Proceedings of the 2nd International Workshop on Advances in Civil Aviation Systems Development. ACASD</source>
          <year>2024</year>
          ,
          <source>” Lecture Notes in Networks and Systems</source>
          , Vol
          <volume>992</volume>
          ,
          <year>2024</year>
          , Springer Cham, pp.
          <fpage>262</fpage>
          -
          <lpage>278</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>031</fpage>
          -60196-5_
          <fpage>20</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>H.</given-names>
            <surname>Garg</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Dave</surname>
          </string-name>
          ,
          <article-title>"Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware," 2019 4th International Conference on Internet of Things: Smart Innovation</article-title>
          and
          <string-name>
            <surname>Usages (IoT-SIU)</surname>
          </string-name>
          , Ghaziabad, India,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/IoTSIU.
          <year>2019</year>
          .
          <volume>8777334</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Sharma</surname>
          </string-name>
          and
          <string-name>
            <given-names>N. K.</given-names>
            <surname>Gondhi</surname>
          </string-name>
          ,
          <article-title>"Communication Protocol Stack for Constrained IoT Systems,"</article-title>
          <source>2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoTSIU)</source>
          , Bhimtal, India,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/IoT-SIU.
          <year>2018</year>
          .
          <volume>8519904</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gao</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Ji</surname>
          </string-name>
          ,
          <article-title>"A novel IoT access architecture for vehicle monitoring system," 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)</article-title>
          , Reston,
          <string-name>
            <surname>VA</surname>
          </string-name>
          , USA,
          <year>2016</year>
          , pp.
          <fpage>639</fpage>
          -
          <lpage>642</lpage>
          , doi: 10.1109/WF-IoT.
          <year>2016</year>
          .
          <volume>7845396</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Vishwakarma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Upadhyaya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kumari</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Mishra</surname>
          </string-name>
          ,
          <article-title>"Smart Energy Efficient Home Automation System Using IoT," 2019 4th International Conference on Internet of Things: Smart Innovation</article-title>
          and
          <string-name>
            <surname>Usages (IoT-SIU)</surname>
          </string-name>
          , Ghaziabad, India,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/IoTSIU.
          <year>2019</year>
          .
          <volume>8777607</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kumar</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. R.</given-names>
            <surname>Ramesh</surname>
          </string-name>
          ,
          <article-title>"Low Cost Energy Efficient Smart Security System with Information Stamping for IoT Networks," 2018 3rd International Conference On Internet of Things: Smart Innovation</article-title>
          and
          <string-name>
            <surname>Usages (IoT-SIU)</surname>
          </string-name>
          , Bhimtal, India,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/IoTSIU.
          <year>2018</year>
          .
          <volume>8519875</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Application Analysis of Digital Signal Processing Technology in 5G Communication," 2023 Asia-Europe Conference on Electronics, Data Processing and Informatics (ACEDPI)</source>
          , Prague, Czech Republic,
          <year>2023</year>
          , pp.
          <fpage>476</fpage>
          -
          <lpage>481</lpage>
          , doi: 10.1109/ACEDPI58926.
          <year>2023</year>
          .
          <volume>00097</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>G. A.</given-names>
            <surname>Setiawan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. C. B.</given-names>
            <surname>Rumondor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sanjaya</surname>
          </string-name>
          , Tukina and
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Wijaya</surname>
          </string-name>
          ,
          <article-title>"The Potential of Digital Communication via Whatsapp Application in Interpersonal Communication Management for Married Couples,"</article-title>
          <source>2025 19th International Conference on Ubiquitous Information Management and Communication (IMCOM)</source>
          , Bangkok, Thailand,
          <year>2025</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/IMCOM64595.
          <year>2025</year>
          .
          <volume>10857562</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Rao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zou</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Dai</surname>
          </string-name>
          ,
          <article-title>"dSCADL: A Data Flow based Symmetric Cryptographic Algorithm Description Language,"</article-title>
          <source>2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)</source>
          , Beijing, China,
          <year>2019</year>
          , pp.
          <fpage>84</fpage>
          -
          <lpage>89</lpage>
          , doi: 10.1109/CCET48361.
          <year>2019</year>
          .
          <volume>8989331</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Holubnychyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sushchenko</surname>
          </string-name>
          , Yu. Averyanova,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bezkorovainyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Cherednichenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sokolova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ivannikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Voliansky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,I. Bovdui ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Nikitina</surname>
          </string-name>
          ,
          <article-title>"Methodology for substantiating the infrastructure of aviation radio equipment repair centers,"</article-title>
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>3732</volume>
          , pp.
          <fpage>136</fpage>
          -
          <lpage>148</lpage>
          ,
          <year>June 2024</year>
          . https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3732</volume>
          /paper11.pdf
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Diao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Liu</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Mao</surname>
          </string-name>
          ,
          <article-title>"Design and Implementation of the Components of the Symmetric Cryptographic Algorithm,"</article-title>
          <source>2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)</source>
          , Shenzhen, China,
          <year>2017</year>
          , pp.
          <fpage>483</fpage>
          -
          <lpage>487</lpage>
          , doi: 10.1109/DSC.
          <year>2017</year>
          .
          <volume>23</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vyakaranal</surname>
          </string-name>
          and
          <string-name>
            <surname>S. Kengond,</surname>
          </string-name>
          <article-title>"Performance Analysis of Symmetric Key Cryptographic Algorithms,"</article-title>
          <source>2018 International Conference on Communication and Signal Processing (ICCSP)</source>
          , Chennai, India,
          <year>2018</year>
          , pp.
          <fpage>0411</fpage>
          -
          <lpage>0415</lpage>
          , doi: 10.1109/ICCSP.
          <year>2018</year>
          .
          <volume>8524373</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>K.</given-names>
            <surname>Cherednichenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ivannikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sokolova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sushchenko</surname>
          </string-name>
          , Yu. Averyanova,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bezkorovainyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Holubnychyi</surname>
          </string-name>
          , et. al. “
          <article-title>Simulation Modelling for Urban Transport Infrastructure Optimization in Ukraine</article-title>
          ,” In: Prentkovskisetal,
          <string-name>
            <surname>O</surname>
          </string-name>
          .(eds): TRANSBALTICA2024,
          <string-name>
            <surname>LNITI</surname>
          </string-name>
          , Springer Nature Switzerland, pp.
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          ,
          <year>2025</year>
          . https://doi.org/10.1007/978-3-
          <fpage>031</fpage>
          -85390-6_
          <fpage>35</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Qiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Lu</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process," 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)</source>
          ,
          <year>Singapore</year>
          ,
          <year>2019</year>
          , pp.
          <fpage>208</fpage>
          -
          <lpage>212</lpage>
          , doi: 10.1109/CCOMS.
          <year>2019</year>
          .
          <volume>8821757</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>