Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia最新文献

筛选
英文 中文
Classification and analysis of vulnerabilities of modern information systems from classical and quantum attacks 现代信息系统在经典攻击和量子攻击中的漏洞分类与分析
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.01
Ye. V. Ostrianska, S.O. Kandiy, I. Gorbenko, M. Yesina
{"title":"Classification and analysis of vulnerabilities of modern information systems from classical and quantum attacks","authors":"Ye. V. Ostrianska, S.O. Kandiy, I. Gorbenko, M. Yesina","doi":"10.30837/rt.2022.4.211.01","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.01","url":null,"abstract":"Recent advances in quantum technology and the potential that practical quantum computers may become a reality in the future have led to renewed interest in developing cryptographic technologies that are secure against conventional and quantum attacks. Currently, virtually all asymmetric cryptographic schemes in use are threatened by the potential development of powerful quantum computers. Post-quantum cryptography is one of main the ways to combat this threat. Its security is based on the complexity of mathematical problems that are currently considered unsolvable efficiently, even with the help of quantum computers. The security of information systems is ensured through protection against various threats that use system vulnerabilities. Security protocols are the building blocks of secure communication. They implement security mechanisms to provide security services. Security protocols are considered abstract when analyzed, but may have additional vulnerabilities in implementation. This work contains a holistic study of security protocols. Basics of security protocols, taxonomy of attacks on security protocols and their implementation are considered, as well as various methods and models of protocol security analysis. In particular, the differences between information-theoretic and computational security, computational and symbolic models are specified. In addition, an overview of the computational security models for Authenticated Key Exchange (AKE) and Password Authentication Key Exchange (PAKE) protocols is provided. The most important security models for the AKE and PAKE protocols were also described. With the emergence of new technologies that may have different security requirements, as well as with increased opportunities for competition, there is always a need to develop new protocols. Thus, the purpose of this article is to review, classify, analyze, and research the vulnerabilities of information systems from classical, quantum, and special attacks, performed taking into account the forecast regarding the possibilities of attacks on post-quantum cryptographic transformations; studying security assessment models for existing cryptographic protocols, as well as reviewing and benchmarking security models and providing suggestions for protection against existing potential attacks.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"13 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81483611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of interference protection of "Friend-Foe" radar identification systems 敌我雷达识别系统干扰防护比较分析
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.08
I. Svyd, M. Tkach, I. Obod
{"title":"Comparative analysis of interference protection of \"Friend-Foe\" radar identification systems","authors":"I. Svyd, M. Tkach, I. Obod","doi":"10.30837/rt.2022.4.211.08","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.08","url":null,"abstract":"The paper examines the existing systems of radar identification based on the \"friend-foe\" feature from the point of view of immunity evaluation. Currently, there are two systems of the radar identification based on the characteristic of \"friend-foe\", namely, the \"Password\" and MkXIIA. They are the radar identification systems based on the \"home-foreign\" feature. The former of the specified systems operates in a frequency range that differs from the frequency range of secondary radar systems, while the second one operates in the frequency range of secondary radar. These systems are ones of the main information resources of the airspace control system and are built on the principles of a one-channel or two-channel information transmission system. It allows the interested party, both an unauthorized use of this information resource for remote determination of the coordinates of aerial objects, on the one hand, and twisting the information of these information resources, on the other hand, which leads to unpredictable results. The purpose of the work is to assess the immunity of existing radar identification systems based on the \"friend-foe\" feature. The analysis of the interference protection of existing systems for the object radar identification based on the \"friend-foe\" feature, built on the principles of interrogative and non-interrogative information systems presented in this work, showed that the use of rectangular radio signals with time-pulse modulation as request and response signals emitting by air objects, has low immunity and excludes the energy stealthiest of the respondents of aerial objects. And, as a result, it allows for unauthorized calculation of the coordinates of air objects by the interested party based on the emitted identification signals on the basis of \"friend-foe\".","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89932662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structural modeling and calculation of thermal conductivity of polyimide composite materials 聚酰亚胺复合材料的结构建模与导热系数计算
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.10
V. Borshchov, O. Listratenko, M. Protsenko, I. Tymchuk, O. Kravchenko, O.V. Suddia, I.V. Borshchov, M. Slipchenko
{"title":"Structural modeling and calculation of thermal conductivity of polyimide composite materials","authors":"V. Borshchov, O. Listratenko, M. Protsenko, I. Tymchuk, O. Kravchenko, O.V. Suddia, I.V. Borshchov, M. Slipchenko","doi":"10.30837/rt.2022.4.211.10","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.10","url":null,"abstract":"Issues of direct modeling effective thermal conductivity of two-component thermally conductive polyimide composite films based on polyimide thermosetting varnishes and thermally conductive powder fillers are considered. \u00003D-structural modeling of elementary cubic cells of polyimide composites has been performed. \u0000Calculations of average heat fluxes and effective thermal conductivity of variants of polyimide composite films with the introduction of highly thermally conductive highly dispersed and ultradispersed powder fillers into the polyimide matrix were carried out, including those from SiO2, SiC, Al2O3, AlN, taking into account boundary and initial conditions using COMSOL MULTIPHYSICS software. \u0000Specific recommendations are proposed for direct modeling of the thermal conductivity of environments with a complex structure and for carrying out with sufficient reliability numerical calculations of the effective thermal conductivity of polyimide composite films in order to increase their thermal conductivity from 0,12 W/(m•K) up to 1-4 W/(m•K) by changing concentration and thermal conductivity of mixtures of filler particles of micron and ultramicron sizes.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"44 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74142221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Features of the tasks of identifying and observing groups of unmanned letter vehicles 无人信车群识别与观测任务特征
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.06
V. Kartashov, V.A. Pososhenko, A. Kapusta, M. Rybnykov, E.V. Pershin
{"title":"Features of the tasks of identifying and observing groups of unmanned letter vehicles","authors":"V. Kartashov, V.A. Pososhenko, A. Kapusta, M. Rybnykov, E.V. Pershin","doi":"10.30837/rt.2022.4.211.06","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.06","url":null,"abstract":"The current trend towards increasing the efficiency of UAV use is the transition from their single use to group use. In accordance with this, when building a complex integrated system for detecting and monitoring UAVs, including various information channels, it is advisable to take into account the features of the system functioning associated with the detection of groups of UAVs. \u0000The article discusses the information, energy and search capabilities of individual detection tools being a part of the integrated UAV surveillance system in order to build an effective algorithm for joint processing of incoming input signals, taking into account various capabilities of individual channels (in terms of range, recognition, etc.). \u0000An optimal algorithm for detecting groups of UAVs in a complex integrated system combining detection decisions made in private channels is synthesized. According to the synthesized algorithm, complex processing consists in summing up the solutions of individual detectors with some weights determined by the quality of the decisions made in the channels. The quality of solutions, in turn, depends on the technical means used in the channels and the conditions of observation. \u0000A sequence for solving a set of interrelated tasks in a complex integrated UAV surveillance system as the group target approaches the protected object is proposed. The sequence includes the following operations: identification of a group target (energy detection); estimation of coordinates of a group of objects; spatial resolution and determination of the number of vehicles in a group; recognition (type determination) of each individual device; assessment of the coordinates of each aircraft separately; determination of the composition of the group (homogeneous, heterogeneous); determination of the specialization of the group and revealing the nature of its tasks.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"134 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77378233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of DSTU 8961:2019 in random oracle model DSTU 8961:2019在随机oracle模型中的分析
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.02
S.O. Kandiy
{"title":"Analysis of DSTU 8961:2019 in random oracle model","authors":"S.O. Kandiy","doi":"10.30837/rt.2022.4.211.02","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.02","url":null,"abstract":"The paper provides a proof in the IND-CCA2 random oracle model of the security of the asymmetric encryption scheme described in the DSTU 8961:2019 standard, and the IND-CCA2 security of the corresponding key encapsulation mechanism. Since the standard contains only a technical description of transformations, a formalized mathematical model was introduced in Chapter 4 without unnecessary technical details that do not affect safety assessments. Since the system-wide parameters in the standard were chosen in such a way that the scheme did not contain decryption errors, it was possible to simplify significantly the proof. Section 5 provides a schematic overview of possible attack vectors on the DSTU 8961:2019, but a detailed analysis is the subject of further research. In addition to safety, the analysis also showed that the DSTU 8961:2019 has a certain disadvantage in terms of safety. The design can be significantly simplified and accelerated without loss of safety. Security, on the contrary, can be significantly increased.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"122 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78442239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical investigation of injection-locked differential oscillator 注入锁紧差分振荡器的理论研究
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.11
V. Rapin
{"title":"Theoretical investigation of injection-locked differential oscillator","authors":"V. Rapin","doi":"10.30837/rt.2022.4.211.11","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.11","url":null,"abstract":"A preliminary analysis of published works on this topic showed that at present there is no sufficiently substantiated theory of such devices, and the approximate approaches used are rough and do not always meet the requirements of practice. The proposed transition from a differential self-oscillator to an equivalent single-circuit oscillator has not received a convincing justification. \u0000This article presents a methodology for studying a synchronized differential oscillator using rigorous methods. A mathematical model of such oscillator is presented in the form of nonlinear differential equations obtained on the basis of Kirchhoff's laws. Their analysis made it possible to substantiate the transition to the model of a single circuit LC oscillator, equivalent to a differential one. A technique for such a transition is proposed, including the procedure for determining the nonlinear characteristics of the amplifying element of this self-oscillator, based on the nonlinear characteristics of two amplifying elements of the differential oscillator. \u0000The mathematical model of an equivalent oscillator is represented by a non-linear differential Van der Pol equation in a dimensionless form, it is simple and accurate. This form of representation made it possible to single out a small parameter and estimate its value. In the case of small values of the small parameter, as is known, traditional methods can be used for its analysis. Thus, the task of studying the synchronization process of a differential oscillator is reduced to the study of the synchronization process of a Van der Pol oscillator. The presented results can be useful in the development of various devices based on synchronized differential oscillators.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"11 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82901677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The main categories of NewSQL databases and their features 介绍了NewSQL数据库的主要类别及其特性
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.03
V. Yesin, V. Vilihura
{"title":"The main categories of NewSQL databases and their features","authors":"V. Yesin, V. Vilihura","doi":"10.30837/rt.2022.4.211.03","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.03","url":null,"abstract":"In the modern world, the problem of working with big data and workloads is becoming more and more acute. For more than forty years, relational databases have been the main leading systems for storing, searching and managing data. However, despite their great popularity, application experience and universality, traditional relational DBMS, due to the growing needs for scalability and performance, often cannot meet modern requirements. This has led to the emergence of new alternative data management systems, including NewSQL systems. NewSQL is a class of modern relational database management systems that provide performance comparable to NoSQL systems while maintaining the data consistency guarantees inherent in traditional database systems. The growing interest in NewSQL technology in recent times has led to an increase number of evaluations and comparisons among competing NewSQL technologies. However, today there is still a certain lack of work devoted to the study of the features of NewSQL solutions and their capabilities in comparison with other technologies. This paper discusses the main features of the most famous NewSQL products of different categories and the identified problems associated with them. To overcome the certain ambiguity in the names and translations of some terms related to the subject area under consideration, which takes place in numerous relevant sources, additional explanations are given. For comparison, the paper presents the values of important characteristics inherent in NewSQL, traditional relational and NoSQL database systems. This paper can help researchers and people from the industry choose the best storage solutions for their needs.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"34 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86540729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm for estimating the energy distribution of radar signals scattering on acoustic disturbances created by UAVs 无人机声干扰下雷达信号散射能量分布估计算法
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.07
V. Kartashov, V.A. Pososhenko, K.V. Kolesnik, V. Kolesnik, R.I. Bobnev, A. Kapusta
{"title":"Algorithm for estimating the energy distribution of radar signals scattering on acoustic disturbances created by UAVs","authors":"V. Kartashov, V.A. Pososhenko, K.V. Kolesnik, V. Kolesnik, R.I. Bobnev, A. Kapusta","doi":"10.30837/rt.2022.4.211.07","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.07","url":null,"abstract":"The task of estimating the energy distribution over the observation interval of radar signals scattered on atmospheric inhomogeneities, arising as a result of UAV operation, is considered. The solution to this problem is necessary to improve detection algorithms, to classify the detected UAVs according to additional informational features, to improve the resolution when detecting several devices located at the same range during the group application of UAVs, to clarify the time parameters of the evolution of the movement of UAVs in time and space. A similar problem arises due to the need to process useful radar signals with a low signal-to-noise ratio in order to achieve the maximum possible range of reliable UAV detection. Because of this, it becomes impossible to estimate directly the energy of useful signals by the method of comparison with reference physical quantities due to a large measurement error. Therefore, an evaluation algorithm is proposed, based on the methods of the theory of ordinal statistics, which provide, instead of comparing numerical realizations with a certain standard, to form a variational series from them under the condition of a priori knowledge of the distribution function of these realizations. At the same time, the fact is used that for certain distributions of a random variable, among which there are normal and all limited ones, the variance of the estimate in the form of a mathematical expectation of certain ordinal statistics is significantly less than the variance of a direct measurement at a low signal-to-noise ratio. In order to save time and computing resources during real-time processing of received signals, it is proposed to use pre-calculated arrays of numerical values of mathematical expectation and dispersion of ordinal statistics for various parameters of the density distribution of a random variable.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"22 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80200341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using a fingerprint scanner to protect data in medical information systems 使用指纹扫描仪保护医疗信息系统中的数据
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.12
O.I. Dovnar, M. Babakov, V.I. Cherkis
{"title":"Using a fingerprint scanner to protect data in medical information systems","authors":"O.I. Dovnar, M. Babakov, V.I. Cherkis","doi":"10.30837/rt.2022.4.211.12","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.12","url":null,"abstract":"Since the beginning of hostilities, medical institutions have suffered from cyber attacks, the number of which is not decreasing. The load on the servers even before the start of the war was already quite significant. Since Ukraine suffered severe restrictions due to Covid-19, in part, most institutions were transferred to global medical databases, but with a serious breakthrough, digital capacities did not have time to grow. Even small cyber attacks in the medical field can be critical, so it is necessary to identify accurately medical personnel for access and implement a special application, which will not allow other people to get it, this makes it possible to block immediately all other requests without processing, and this is one of the ways to optimize and increasing security. \u0000The task can be solved by standard means of authorization, but they are quite easy to bypass, ordinary software can also be reprogrammed, identification by phone number can be too expensive, so a combined method is proposed: special equipment for reading fingerprints and the corresponding software application. This method is sufficiently reliable and simple to implement (medical personnel will only need to put their finger to the sensor), as well as economical and not demanding. \u0000The developed prototype for authorization on the Arduino hardware platform provides the necessary functionality and meets the task. The sensor recognizes more than 100 people, and the convenient mini USB allows you to connect conveniently the device to any computer port. A special algorithm will block the device in case of intervention by a person who does not have access to the corresponding resource. Can be easily reprogrammed and configured to the required equipment, and the case can be printed according to the necessary requirements.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"31 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89779347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless power transmission technologies 无线电力传输技术
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2022-12-30 DOI: 10.30837/rt.2022.4.211.09
V. Alieksieiev, D. Gretskih, D. S. Gavva, V. Lykhograi
{"title":"Wireless power transmission technologies","authors":"V. Alieksieiev, D. Gretskih, D. S. Gavva, V. Lykhograi","doi":"10.30837/rt.2022.4.211.09","DOIUrl":"https://doi.org/10.30837/rt.2022.4.211.09","url":null,"abstract":"The article consists of three parts. The analysis of existing technologies of wireless power transfer (WPT) is carried out in the first part. It is noted that one of the factors that determines the choice of one or another WPT technology is the distance over which the power is transmitted and the type of electromagnetic (EM) energy used. The essence of WPT technologies in the near zone, Fresnel zone and Fraunhofer zone is explained. A generalized block diagram of the WPT system is presented. Areas of application and trends in the further development of the WPT technologies over short distances using induction and resonance methods, the WPT technologies over long distances, the technology of EM energy harvesting from the surrounding space and its conversion into direct current for powering low-power devices are considered. \u0000The achievements of the team of the antenna laboratory of the Kharkiv National University of Radio Electronics (KhNURE) in the area of WPT are presented in the second part of the article. Namely, the electrodynamics’ approach is considered which is based on a single idea about the functioning of WPT systems and which include antennas and their circuits and ways of excitation with nonlinear elements. The stages of building a nonlinear mathematical model (MM) of the electrodynamics’ level of the WPT system are presented, according to which the entire WPT system, which generally includes the transmitting subsystem and the receiving subsystem, is considered as a single multi-input antenna system with nonlinear characteristics. The proposed MM provides a complete representation of the WPT systems operation of a wide class and purpose, in which fundamentally different WPT technologies are used. \u0000The third part of the article presents new results related to continued research. The analysis of the adequacy of the developed MM of WPT system is carried out. The results of simulation of WPT systems with the induction method of energy transfer (near zone) and their comparison with theoretical and experimental data of other authors showed the reliability and universality of the proposed approach and the MM of WPT system developed on its basis.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"3 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74766393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信