Electronic modeling

Vol 46, No 5 (2024)

CONTENTS

Mathematical modeling and Computation Methods

 
3-18
 

S.D. Vynnychuk
Ways to Reduce the Complexity of Calculations when Calculating Flow Distribution in Incompressible Fluid Networks with Fixed Coefficients of Hydraulic Resistance


19-34

Informational Technologics

 

I.V. Kosyak, D.Yu. Manko, Ie.V. Belyak, A.A. Kryuchyn
Methodology for Transforming Code Sequences in Accordance with the Modulation Disk Coordinate System


35-49
 
50-63
 

A.A. Vladimirsky, I.A. Vladimirsky, V.O. Artemchuk, I.P. Kryvoruchko, D.M. Semenyuk
Peculiarities and Development of Leak Detection Methods for Heat and Water Supply Pipelines Under Wear and Military Impacts


64-73
 

S. Tsyrulnyk, M. Tsyrulnyk, V. Tkachuk, O. Kylymchuk
Remotely Manage the Power of Iot Devices


74-91
 

О.D. Міkhnova, А.V. Міkhnova
Generalized Modular Method of Project Risk Management


92-103
  O. Savon
Analysis of Modern Methods and Information Technologies of Distance Learning

104-114

Parallel calculations

  O.M. Dybach
Resilience in Nuclear Energy Definition and Conceptualization

115-128

STATISTICAL CRITERION OF CHECKING OF INDEPENDENCE OF INNER STATES AND OUTPUTS OF CRYPTOPRIMITIVE WHICH GENERATES (PSEUDO)RANDOM SEQUENCES

L.V. Kovalchuk, A.N. Davydenko, T.M. Klymenko, O.Yu. Bespalov

Èlektron. model. 2024, 46(5):03-18

https://doi.org/10.15407/emodel.46.05.003

ABSTRACT

The article is devoted to creation and justification of new statistical criterion of pairwise independence of binary sequences from given set, which are considered as realization of random variables. The corresponding algorithm, which fulfills the checking of pairwise independence, is formulated in details. This algorithm is necessary tool for statistical verification of cryptographic quality of different cryptoprimitives, which functioning is connected with random/ pseudorandom sequences generation — such as random/pseudorandom sequences generators or stream ciphers. Usage of the obtained criterion allows independence checking not only for output sequences, but also for its intermediate state or inputs. Note that such independence is necessary for unpredictability of output sequences.

KEYWORDS

random/pseudorandom sequences generator, independence of random variab­les, correlation matrix, inner states and outputs of cryptoprimitive.

REFERENCES

  1. Christof Paar, Jan Pelzl, (2009). "Stream Ciphers", Chapter 2 of "Understanding Crypto­graphy, A Textbook for Students and Practitioners". Springer. https://dosen.itats.ac.id/sitiagustini/ wp-content/uploads/sites/78/2017/05/Understanding_Cryptography_Chptr_2-Stream_ Ciphers.pdf
  2. Matt, J.B. Robshaw, (1995). Stream Ciphers Technical Report TR-701, version 2.0, RSA Laboratories. https://www.networkdls.com/Articles/tr-701.pdf
  3. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22, 1999. Rev. 1.
  4. Marsaglia, G., (1996). “Diehard: A Battery of Tests of Randomness”. http://stat.fsu.edu/ geo/diehard.html , https://www.scirp.org/reference/referencespapers?referenceid=622311
  5. FIPS 140-2 Security Requirements for Cryptographic Modules, Date Published: May 25, (2001). (Change Notice 2, 12/3/2002). https://csrc.nist.gov/pubs/fips/140-2/upd2/final
  6. Almaraz Luengo, E., Román Villaizán, J. (2023). Cryptographically Secured Pseudo-Random Number Generators: Analysis and Testing with NIST Statistical Test Suite. 11. 4812. 
    https://doi.org/10.3390/math11234812
  7. Suwais, K., Almanasra, S. (2023). Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour. Sci. 13. 4669. 
    https://doi.org/10.3390/app13084669
  8. Wu, S.-T. (2023). A Key-Based Multi-Mode Clock-Controlled Stream Cipher for Real-Time Secure Communications of IoT. 12. 1076. 
    https://doi.org/10.3390/electronics12051076
  9. Melosik, M., Galan, M., Naumowicz, M., Tylczyński, P., Koziol, S. (2023). Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology. 25. 976.
    https://doi.org/10.3390/e25070976
  10. Bikos, A., Nastou, P.E., Petroudis, G., Stamatiou, Y.C. (2023). Random Number Ge­ne­rators: Principles and Applications. 7. 54. 
    https://doi.org/10.3390/cryptography7040054
  11. Piątkowski, J., Szymoniak, S. (2023). Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework. Sci. 13. 12668. 
    https://doi.org/10.3390/app132312668
  12. Crocetti, L., Nannipieri, P., Di Matteo, S., Fanucci, L., Saponara, S. (2023). Review of Methodologies and Metrics for Assessing the Quality of Random Number Generators. 12. 723. 
    https://doi.org/10.3390/electronics12030723
  13. Madarro-Capó, E.J., Ramos Piñón, E.C., Sosa-Gómez, G., Rojas, O. (2024). Practical Improvement in the Implementation of Two Avalanche Tests to Measure Statistical Independence in Stream Ciphers. 12. 60. 
    https://doi.org/10.3390/computation12030060
  14. Kovalchuk, L.V., Koriakov, I.V., Alekseychuk, A.N., (2023). Krip: High-Speed Hardware-Oriented Stream Cipher Based on a Non-Autonomous Nonlinear Shift Register, Cybernetics and Systems Analysis. 59(1). 16-26.
    https://doi.org/10.1007/s10559-023-00538-6
  15. Anderson, T.W. (1958). An Introduction to Multivariate Statistical Analysis. John Wiley & Sons, New York. 500.
  16. Kovalchuk, L.V., Koriakov, І.V., Bespalov, О.Yu. (2024). Statistical tests for checking independency of random variables, which describe sequences generation in cryptoalgorithms. Electronic modeling. 46(3). 22-38. https://doi.org/10.15407/emodel.46.03.022
  17. Sample Correlation Coefficient. https://www.sciencedirect.com/topics/mathematics/sample- correlation-coefficient
  18. Feller, W. (1968) An Introduction to Probability Theory and Its Applications, 1. 3rd Edition, John Wiley & Sons, New York. https://bitcoinwords.github.io/assets/papers/an-introduction-to-probability-theory-and-its-applications.pdf
  19. Michel Goemans. (2015). Chernoff bounds, and some applications. Lecture notes. https://math.mit.edu/~goemans/18310S15/chernoff-notes.pdf.
  20. Kovalchuk, L.V., Koriakov, І.V., Bespalov, О.Yu. (2024). Statistical tests for checking independency of random variables, which describe sequences generation in cryptoalgorithms. Electronic modeling. 46(3). 22-38. 
    https://doi.org/10.15407/emodel.46.03.022

Full text: PDF

 

WAYS TO REDUCE THE COMPLEXITY OF CALCULATIONS WHEN CALCULATING FLOW DISTRIBUTION IN INCOMPRESSIBLE FLUID NETWORKS WITH FIXED COEFFICIENTS OF HYDRAULIC RESISTANCE

S.D. Vynnychuk

Èlektron. model. 2024, 46(5):19-34

https://doi.org/10.15407/emodel.46.05.019

ABSTRACT

Based on the analysis of the process of solving the problem of flow distribution calculation in compressible fluid systems, which boils down to finding the root of a nonlinear system of equations using the Newton — Raphson method, methods of reducing the complexity of calculations at the stages of the iterative process are proposed. The studies belong to the class of hydraulic systems for which the total pressure change on the branch elements is a monotonic smooth function of the flow rate G. For the iterations of the Newton-Raphson method, the stages are analyzed: linearization of the nonlinear system of equations, determination of the discrepancy and error estimation, determination of cost growth and obtaining a new iterative cost value. A method and algorithm for determining the discrepancy and estimating the error with linear complexity relative to the number of branches of graph E is proposed. A method of reducing the number of unknowns in the system of flow distribution equations at the stage of forming a system of linear equations based on the use of the nodal convolution method is described. A number of variants of heuristic algorithms for determining the parameter that takes into account the rate of increase in costs when forming a new iterative value of costs and their analysis are presented.

KEYWORDS

hydraulic network, system of flow distribution equations, initial approximation, Newton — Raphson method.

REFERENCES

  1. Nekrasov B.B. (1967) Gidravlika i yeye ispol’zovaniye na letatel’nykh apparatakh. [Hydraulics and its application on aircraft], Mashinostroyeniye, Moscow, Russia. 352 p.
  2. Yevdokimov A.G., Tevyashev A.D., Dubrovskiy V.V. (1979) Potokoraspredeleniye v inzhenernykh setyakh. / Pod red. G. Yevdokimova. [Flow distribution in engineering networks], Stroyizdat, Moscow, Russia. 199 p.
  3. Yevdokimov, A.G., Tevyashev, A.D. and Dubrovskiy, V.V. (1990), Modelirovanie i optimizatsiya potokoraspredeleniya v inzhenernykh setyakh, 2-e izd. pererab. i dop. [Modelling and optimization of load flow in engineering networks, 2nd ed., revised. and ext.], Stroyizdat, Moscow, Russia. 368 p.
  4. Merenkov, A.P. and Khasilev, V.Ya. (1985), Teoriya gidravlicheskikh tsepey [Theory of hydraulic circuits], Nauka, Moscow, Russia. 280 p.
  5. Merenkov, A.P., Sennova, Ye.V., Sumarokov S.V. et al. (1992) Matematicheskoye modelirovaniye i optimizatsiya sistem teplo-vodo-nefte- i gazosnabzheniya. [Mathematical modeling and optimization of heat, water, oil and gas supply systems], PO Nauka, Novosibirsk, Russia. 407 p.
  6. Bakhvalov N.S. (1975) Chislennyye metody (analiz, algebra, obyknovennyye differentsial’nyye uravneniya). [Numerical methods (analysis, algebra, ordinary differential equations)], “Nauka”. Glavnaya redaktsiya fiziko-matematicheskoy literatury, Moscow, Russia. 691 p.
  7. Charles F. Van Loan. (2013) Matrix Computations. 4. М: The Johns Hopkins University Press. 756 p. (англ.)
  8. Davis T.A. (2006.) Direct Methods for Sparse Linear Systems (Fundamentals of Algorithms). Society for Industrial and Applied Mathematics. 218 p. (англ.)
    https://doi.org/10.1137/1.9780898718881
  9. Gantmakher F.R. (1988) Teoriya matrits. 4-ye izd. dop. [Matrix Theory. 4th ed. suppl.], Nauka, Moscow, Russia. 548 p.
  10. Godlevsky V.S., Godlevsky V.V. (2003) “Blochnyy gibridnyy metod resheniya sistem nelineynykh konechnykh uravneniy/ // Electronic Modeling. 2003. V. No. 3. Pp. 99-109.
  11. Vynnychuk S.D. (2000) Universalnyy algoritm avtomatizirovannogo formirovaniya nachalnogo raspredeleniya raskhodov v raspredelitelnykh setyakh. Zbirnyk “Modelyuvannya ta ínformatsíyní tekhnologíí̈”. 5. Kiyv: ÍPME NAN Ukrainy. Pp 3-9.
  12. Kapitonova Yu.V., Krivy S.L., Letichevsky O.A., Lutsky G.M., Pechorin M.K. (2002) Osnovy diskretnoí̈ matematyky. [Fundamentals of discrete mathematics.], “Naukova Dumka”, Kyiv, Ukraina. 580 p.
  13. Thomas Cormen, Charles. Leiserson, Ronald L. Rivest (2005). Algoritmy: postroyeniye i analiz, 2-ye izdaniye.: Per. s angl. [Introduction to Algorithms is a book by Edition 2], Vi­liams, Moscow, 1296 p.
  14. Vynnychuk S.D. (2016) Definition of flow distribution in networks with a tree graph. // Electron. modeling. V. 38, No. 4. 2016. Pp. 65-80. 
    https://doi.org/10.15407/emodel
  15. Vynnychuk, S.D. (2006), “Methods and algorithms for solving problems of analysis, designand management of distribution flows in the hydraulic distribution systems”, Abstract of Dr. Sci. (Tech.) dissertation, 01.05.02., Pukhov Institute for Modeling in Energy Engineering of National Academy of Sciences of Ukraine, Kyiv, Ukraine.

Full text: PDF

 

METHODOLOGY FOR TRANSFORMING CODE SEQUENCES IN ACCORDANCE WITH THE MODULATION DISK COORDINATE SYSTEM

I.V. Kosyak, D.Yu. Manko, Ie.V. Belyak, A.A. Kryuchyn

Èlektron. model. 2024, 46(5):35-49

https://doi.org/10.15407/emodel.46.05.035

ABSTRACT

An analysis of current approaches used in the design of optical recording systems for modulation disks has been conducted. By adapting mathematical models, software algorithms were developed to transform code sequences represented in polar, homogeneous, and parametric coordinate systems, and the unique characteristics of each approach in developing a universal method for ensuring accurate and efficient modulation pattern transformation were established. It was noted that the polar coordinate system is the most suitable for practical applications in code sequence transformations. Its ability to effectively represent circular and symmetrical structures, as well as the convenient representation of objects with radial symmetry, provides advantages in the creation of modulation disks. As a result of the study, effective software solutions for automating data processing in the formation of modulation patterns were identified. The implementation of the developed software algorithms for the presented approach involves adapting the code sequence to the current metric within the design of an optical system based on modulation disks. The presented methodology ensures the ability to transform code sequences regardless of the chosen coordinate system, which significantly enhances its flexibility and versatility for practical applications.

KEYWORDS

modulation disks, code sequences, Cartesian coordinate system, polar coordinate system, parametric coordinate system, homogeneous coordinate system.

REFERENCES

  1. Patruno, C., Renò, V., Nitti, M., Pernisco, G., & Mosca, N. (2022). Optical encoder neural network: A CNN-based optical encoder for robot localization. Optical Engineering, 62(04). 
    https://doi.org/10.1117/1.OE.62.4.041402
  2. Hossain, M., Rakshit, J. K., & Pal Singh, M. (2022). Numerical Analysis of all-optical silicon microring resonator-based cyclic redundancy check encoder. Journal of Nanophoto­nics, 16(03). 
    https://doi.org/10.1117/1.JNP.16.036007
  3. Megalingam, R.K., Anil, S.A., & Varghese, J.M. (2016). FPGA based navigation platform for fixed path navigation with distance estimation using rotation encoder. 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 3134-3138. 
    https://doi.org/10.1109/ICEEOT.2016.7755279
  4. Ali, B., Sadekov, R.N., & Tsodokova, V.V. (2022). A review of navigation algorithms for unmanned aerial vehicles based on Computer Vision Systems. Gyroscopy and Navigation, 13(4), 241-252. 
    https://doi.org/10.1134/S2075108722040022
  5. Seybold, J., Bülau, A., Fritz, K.-P., Frank, A., Scherjon, C., Burghartz, J., & Zimmermann, A. (2019). Miniaturized optical encoder with micro structured encoder disc. Applied Sciences, 9(3), 452. 
    https://doi.org/10.3390/app9030452
  6. Liu, S., Zhang, H.C., Zhang, L., Yang, Q.L., Xu, Q., Gu, J., Yang, Y., Zhou, X.Y., Han, J., Cheng, Q., Zhang, W., & Cui, T.J. (2017). Full-state controls of terahertz waves using tensor coding metasurfaces. ACS Applied Materials & Interfaces, 9(25), 21503-21514. 
    https://doi.org/10.1021/acsami.7b02789
  7. Liu, S., & Cui, T.J. (2017). Flexible controls of terahertz waves using coding and programmable metasurfaces. IEEE Journal of Selected Topics in Quantum Electronics, 23(4), 1-12. 
    https://doi.org/10.1109/JSTQE.2016.2599273
  8. Eberhardt, K., Esser, S., & Haider, H. (2017). Abstract feature codes: The building blocks of the implicit learning system. Journal of Experimental Psychology: Human Perception and Performance, 43(7), 1275-1290. 
    https://doi.org/10.1037/xhp0000380
  9. Cai, Y., Li, P., Li, X.-W., Zhao, J., Chen, H., Yang, Q., & Hu, H. (2017). Converting panax ginseng DNA and chemical fingerprints into two-dimensional barcode. Journal of Ginseng Research, 41(3), 339-346. 
    https://doi.org/10.1016/j.jgr.2016.06.006
  10. Feng, M., Li, Y., Zheng, Q., Zhang, J., Han, Y., Wang, J., Chen, H., Sai, S., Ma, H., & Qu, S. (2018). Two-dimensional coding phase gradient metasurface for RCS reduction. Journal of Physics D: Applied Physics, 51(37), 375103.
    https://doi.org/10.1088/1361-6463/aad5ad
  11. Feng, M., Chen, X., Li, Y., Zheng, Q., Han, Y., Zhang, J., Wang, J., Hou, Y., Liu, Z., Li, X., Wang, C., Jing, J., Ma, H., & Qu, S. (2020). Circularly polarized spin‐selectivity absorbing coding phase gradient metasurface for RCS reduction. Advanced Theory and Simulations, 3(3). 
    https://doi.org/10.1002/adts.201900217
  12. Yin, J., Wu, Z., & Deng, J. (2024). Shared‐Aperture 2‐bit coding metasurface for simultaneous manipulation of space wave and surface wave. Advanced Materials Technologies, 9(10). 
    https://doi.org/10.1002/admt.202302151
  13. Yin, T., Ren, J., Zhang, B., Li, P., Luan, Y., & Yin, Y. (2023). Reconfigurable transmission‐reflection‐integrated coding metasurface for full‐space electromagnetic wavefront Advanced Optical Materials, 12(2). 
    https://doi.org/10.1002/adom.202301326
  14. Wang, X., & Fu, F.-W. (2018). Gray codes over certain run-length sequences for local rank modulation. Science China Information Sciences, 61(10).
    https://doi.org/10.1007/s11432-018-9509-y

Full text: PDF

 

The next generation of energy intelligence: the tactical level

А. Davydiuk

Èlektron. model. 2024, 46(5):50-63

https://doi.org/10.15407/emodel.46.05.035

ABSTRACT

This article analyzes research dedicated to energy intelligence and proposes a definition of this concept as the process of systematically gathering and analyzing information about the energy resources, markets, policies, and technologies of countries. This process enables the assessment of their economic and security impacts on a global (strategic) level. The article describes the purpose and primary objectives of energy intelligence, which involve the systematic collection and analysis of information about energy resources, markets, and policies to understand their impact on business decisions, economic factors, and security aspects through a deep analysis of energy trends and geopolitical risks. The classification of energy intelligence is provided, highlighting its main types. The article describes the methods of energy intelligence (SIGINT, IMINT, OSINT, HUMINT, EXIMINT) used for collecting and analyzing information about energy systems and resources. The subtypes of military energy intelligence are examined separately, emphasizing their role in military conflicts. An important aspect of the article is the development of a method for parametric identification of military targets based on energy consumption values, which allows for more precise identification and evaluation of military targets in modern combat scenarios. Thus, the article provides a comprehensive overview of the topic, emphasizing the importance of an integrated approach and the involvement of various stakeholders to ensure effective energy intelligence.

KEYWORDS

energy intelligence, military energy intelligence, military targets, energy consumption, cybersecurity.

REFERENCES

  1. (n.d.). Electricity comparison — The World Factbook. We are the Nation's first line of defense. Retrieved August 28, 2024, from https://www.cia.gov/the-world-factbook/ field/electricity/country-comparison/
  2. (n.d.). Results. Retrieved August 28, 2024, from https://www.scopus.com/results/ results.uri?sort=plf-t&src=s&st1=Energy+exploration&sid=8414829aaafefe6a2c2849e 7907578c9&sot=b&sdt=b&sl=33&s=TITLE-ABS-KEY(Energy+exploration)&origin= searchbasic&editSaveSearch=&yearFrom=Before+1960&yearTo=Present&sessionSearchId =8414829aaafefe6a2c2849e7907578c9&limit=10
  3. Wikipedia contributors. (n.d.). United States Department of Energy. In Wikipedia, The Free Encyclopedia. Retrieved August 28, 2024, from https://en.wikipedia.org/wiki/ United_States_Department_of_Energy
  4. S. Department of Energy. (n.d.). Office of Intelligence and Counterintelligence. Retrieved August 28, 2024, from https://www.energy.gov/intelligence/office-intelligence-and-counterintelligence
  5. S. Department of Energy. (2024, March 6). DOE_Org_Chart_20240306.pdf. Retrieved August 28, 2024, from https://www.energy.gov/sites/default/files/2024-03/DOE_Org_Chart_ 20240306.pdf
  6. S. Department of Commerce. (1984). USSR report energy. Springfield, VA: National Technical Information Service. Retrieved August 28, 2024, from https://apps.dtic.mil/ sti/tr/pdf/ADA355216.pdf
  7. (1985). Energy atlas of the USSR. Retrieved August 28, 2024, from https://www.cia.gov/readingroom/docs/CIA-RDP90T01298R000200310001-8.pdf
  8. Encyclopedia Britannica. (n.d.). Energy intelligence | Military. Retrieved August 28, 2024, from https://www.britannica.com/topic/energy-intelligence
  9. com. (n.d.). Department of Energy Intelligence. In Vocabulary.com Dictio­nary. Retrieved August 28, 2024, from https://www.vocabulary.com/dictionary/Department% 20of%20Energy%20Intelligence
  10. Energy Intelligence. (n.d.). The energy intelligence API. Retrieved August 28, 2024, from https://www.energyintel.com/the-energy-intelligence-api
  11. Youth Energy Summit. (2023). The energy intelligence. Retrieved August 28, 2024, from https://www.youth-energy-summit.com/exhibitors/energy-intelligence-36rv
  12. The Steve Trautman Co. (n.d.). Knowledge transfer in the energy industry | Steve Traut­man — The Steve Trautman Co. Retrieved August 28, 2024, from https://stevetrautman. com/industry/energy/
  13. Grigorescu, A., et al. (2021). Synergy analysis of knowledge transfer for the energy sector within the framework of sustainable development of the European countries. Energies, 15(1), 276. 
    https://doi.org/10.3390/en15010276
  14. (2022). Overview – World energy employment 2022 – Analysis. Retrieved August 28, 2024, from https://www.iea.org/reports/world-energy-employment-2022/overview
  15. Bennhold, K. (2022, April 23). The former chancellor who became Putin’s man in Germany. The New York Times. Retrieved August 28, 2024, from https://www.nytimes.com/ 2022/04/23/world/europe/schroder-germany-russia-gas-ukraine-war-energy.html
  16. Gazprom International Limited. (n.d.). About us. Retrieved August 28, 2024, from https://www.gazprom-international.com/about/
  17. Ministry of Internal Affairs of Ukraine. (n.d.). Zaporizhzhia NPP: Capture by occupiers, nuclear terrorism. Retrieved August 28, 2024, from https://mvs.gov.ua/news/zaporizka-aes-zaxoplennia-okupantami-iadernii-terorizm
  18. gov.ua. (n.d.). Critical infrastructure should strengthen its cyber resilience, relying both on the documents prepared by the State Special Communications Service and on the recommendations of companies such as Mandiant. Retrieved August 28, 2024, from https://cip.gov.ua/ua/news/kritichna-infrastruktura-maye-posilyuvati-svoyu-kiberstiikist-spirayuchis-yak-na-dokumenti-yaki-gotuye-derzhspeczv-yazku-tak-i-na-rekomendaciyi-takikh-kompanii-yak-mandiant
  19. Economic Truth. (2023, July 23). The intelligence of the Russian Federation collects information about the energy infrastructure of Ukraine — GUR. Economic Truth. Retrieved August 28, 2024, from https://www.epravda.com.ua/news/2023/07/23/702497
  20. United Nations. (1977). Additional Protocol to the Geneva Conventions dated August 12, 1949, relating to the protection of victims of international armed conflicts (Protocol I), dated June 8, 1977. Retrieved August 28, 2024, from https://zakon.rada.gov.ua/laws/ show/995_199#Text
  21. Harvey, M. (2021, November-December). The levels of war as levels of analysis. Army University Press. Retrieved August 28, 2024, from https://www.armyupress.army.mil/ Journals/Military-Review/English-Edition-Archives/November-December-2021/Harvey-Levels-of-War/#:~:text=The%20three%20levels%20of%20warfare,tasks%20to%20the% 20appropriate%20command

Full text: PDF