METHOD FOR DETECTING DANGEROUS DIGITAL RADIO SIGNALS
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1058Keywords:
сovert signal detection, quadratic filtering, noise immunity, digital radio signal, low-pass filtering, coherent summation, signal-to-noise ratio (SNR), covert communication, likelihood density estimation.Abstract
Detection and recognition of digital radio signals remains a critical challenge, particularly in electromagnetically contested environments. This study examines low-pass filtering approaches characterized by either linear or quadratic dependence of the output on the input signal amplitude. These filters operate by coherently summing deterministic signal components while incoherently accumulating random noise contributions resulting in constructive reinforcement of the signal energy and sublinear growth of noise power, which substantially enhances the signal-to-noise ratio (SNR). A rectangular pulse, serving as a representative model of modern digital communication waveforms, was applied to both linear and quadratic filter architectures. A comprehensive statistical characterization including mathematical expectation, variance, root mean square deviation, correlation coefficient, and SNR was performed in both time and frequency domains for input and output signals. To enable objective evaluation of filtering performance, a novel efficacy metric referred to as the payoff coefficient was introduced to quantify improvements in detection reliability. Further simulations analyzed the envelope voltage at the output of an ideal bandpass filter when excited by rectangular pulses of varying durations, emulating signals typical of low-probability-of-intercept (LPI) communication systems. Transient responses and spectral leakage were examined under diverse signal-noise correlation conditions. The findings confirm that covert signals can be reliably extracted using two-dimensional likelihood density estimation, which effectively discriminates interfering components from the composite received waveform. At the system level, incorporating narrowband low-frequency filtering into the signal processing pipeline improved the noise immunity of airborne digital radio signal detection and recognition by 23%. This enhancement significantly strengthens operational resilience in hostile electromagnetic environments, with direct relevance to secure communications, electronic warfare, and signals intelligence applications.
Downloads
References
Africa, A. D. M., Abello, A. J. A., Gacuya, Z. G., Naco, I. K. A., & Valdes, V. A. R. (2019). Face recognition using MATLAB. International Journal of Advanced Trends in Computer Science and Engineering, 8(4), 1110–1116.
Abello, A. J. A., Francesca, Y. G., Domingo, M., Joven, M. J. T., & Malubay, S. A. S. (2019). Power measurement model optimization using MATLAB. International Journal of Advanced Trends in Computer Science and Engineering, 8(3), 538–542.
Savchenko, V., Syrotenko, A., Shchypanskyi, P., Matsko, O., & Laptiev, O., (2020). The Model of Localization Precision for Detection of Hidden Transmitters. International Journal of Innovative Technology and Exploring Engineering, 9(4), 2114–2119. https://doi.org/10.35940/ijitee.d1533.029420
Bezruk, V. M., Chebotareva, D. V., & Skorik, Y. V. (2017). Multicriteria analysis and selection of telecommunications facilities. Kharkiv, Ukraine: SMIT.
Barabash, O., Sobchuk, V., Sobchuk, A., Musienko, A., & Laptiev, O. (2025). Algorithms for synthesis of functionally stable wireless sensor networks. Advanced Information Systems, 9(1), 70–79. https://doi.org/10.20998/2522-9052.2025.1.08
Petrivskyi, V., Shevchenko, V., Yevseiev, S., Milov, O., Laptiev, O., Bychkov, O., Fedoriienko, V., Tkachenko, M., Kurchenko, O., & Opirsky, I. (2022). Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors. Eastern-European Journal of Enterprise Technologies, 1(9(115)), 15–23. https://doi.org/10.15587/1729-4061.2022.252988
Lukova-Chuiko, N., Herasymenko, O., Toliupa, S., Laptieva, T., & Laptiev, O. (2021). The method of detection of radio signals by estimating the parameters of eversible Gaussian propagation. In 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT) (pp. 67–70). IEEE.
Laptiev, O., Tkachev, V., Maystrov, O., Krasikov, O., Openko, P., Khoroshko, V., & Parkhuts, L. (2021). The method of spectral analysis for determining random digital signals. International Journal of Communication Networks and Information Security, 13(2), 271–277. https://doi.org/10.54039/ijcnis.v13i2.5008
Kyrychok, R., Laptiev, O., Lisnevskyi, R., Kozlovskyi, V., & Klobukov, V. (2022). Development of a method for checking vulnerabilities of a corporate network using Bernstein transformations. Eastern-European Journal of Enterprise Technologies, 1(9(115)), 93–101. https://doi.org/10.15587/1729-4061.2022.253530
Laptiev, O., Musienko, A., Nakonechnyi, V., Sobchuk, A., Gakhov, S., & Kopytko, S. (2023). Algorithm for recognition of network traffic anomalies based on artificial intelligence. In 5th International Congress on Human–Computer Interaction, Optimization and Robotic Applications (HORA). IEEE. https://doi.org/10.1109/HORA58378.2023.10156702
Hu, Z., Mukhin, V., Kornaga, Y., Barabash, O., & Herasymenko, O. (2016). Analytical assessment of security level of distributed and scalable computer systems. International Journal of Intelligent Systems and Applications, 8(12), 57–64. https://doi.org/10.5815/ijisa.2016.12.07
Datsenko, S., & Kuchuk, H. (2023). Biometric authentication utilizing convolutional neural networks. Advanced Information Systems, 7(2), 87–91. https://doi.org/10.20998/2522-9052.2023.2.12
Salnikov, D., Karaman, D., & Krylova, V. (2023). Highly reconfigurable soft-CPU-based peripheral modules design. Advanced Information Systems, 7(2), 92–97. https://doi.org/10.20998/2522-9052.2023.2.13
Petrovska, I., & Kuchuk, H. (2023). Adaptive resource allocation method for data processing and security in cloud environments. Advanced Information Systems, 7(3), 67–73. https://doi.org/10.20998/2522-9052.2023.3.10
Gavrylenko, S., Poltoratskyi, V., & Nechyporenko, A. (2024). Intrusion detection model based on an improved transform
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Олександр Лаптєв, Юлія Хохлачова, Тетяна Лаптєва, Вадим Стеценко, Сергій Лаптєв

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.