首页 > 最新文献

Vojnotehnicki Glasnik最新文献

英文 中文
Application of the modeling method to the calculation of the probability of hitting a stationary target during the fire action of a tank squad in defense 将该建模方法应用于坦克班防御射击中击中静止目标的概率计算
Pub Date : 2023-01-01 DOI: 10.5937/vojtehg71-44670
Zoran Obradović, B. Nikolić, Goran Popović, Nikolay Gadzhalov, Krastyu Krastev
Introduction/purpose: The theory of direct firing of armored units deals with the calculation of the probability of hitting the target depending on the number of projectiles fired, in certain combat circumstances as well as under certain meteorological conditions. Successful performance of the combat task of armored units in defensive actions against stationary targets depends to the greatest extent on the effectiveness of fire of tank weapons. Under the tactical assumptions that define real combat conditions, i.e., that the attacking formation opens fire from small arms and anti-tank weapons, that the defense is organized in a timely manner on maneuvering ground and in optimal meteorological conditions, and that the tank squad opens fire while stationary, the scientific goal of the research is to determine the probability of hitting and destroying the target as closely as possible depending on the method of determining the distance to the target and the number of projectiles fired. Methods: Mainly applying the method of situation modeling in scientific research, the authors try to determine, as precisely as possible, the percentage of the probability of hitting (destroying) a stationary target, with the first, second, or third projectile. Results: The main scientific contribution of the research would be the determination of various quantitative indicators as significant parameters necessary for a successful design of defense operations of ground army units. Conclusion: By creating an appropriate model for a specific situation in order to solve a problem (combat task), it is possible to precisely determine the probability of hitting and the probability of destroying the target in relation to the number of projectiles fired, as well as the expected consumption of ammunition.
简介/用途:装甲部队直射理论是在一定的战斗环境和气象条件下,根据发射炮弹的数量计算击中目标的概率。装甲部队在对静止目标的防御行动中能否成功执行作战任务,在很大程度上取决于坦克武器的火力有效性。在确定实战条件的战术假设下,即进攻编队使用轻武器和反坦克武器开火,在机动地面和最佳气象条件下及时组织防御,坦克班在静止状态下开火,研究的科学目标是根据确定目标距离的方法和发射的射弹数量,确定尽可能接近目标的击中和摧毁目标的概率。方法:主要运用科学研究中的态势建模方法,尽可能精确地确定第一、第二、第三发炮弹击中(摧毁)静止目标的概率百分比。结果:该研究的主要科学贡献将是确定各种定量指标,作为成功设计地面部队防御作战所需的重要参数。结论:通过为解决问题(战斗任务)的特定情况创建适当的模型,可以精确地确定命中概率和摧毁目标的概率与发射的射弹数量以及预期的弹药消耗有关。
{"title":"Application of the modeling method to the calculation of the probability of hitting a stationary target during the fire action of a tank squad in defense","authors":"Zoran Obradović, B. Nikolić, Goran Popović, Nikolay Gadzhalov, Krastyu Krastev","doi":"10.5937/vojtehg71-44670","DOIUrl":"https://doi.org/10.5937/vojtehg71-44670","url":null,"abstract":"Introduction/purpose: The theory of direct firing of armored units deals with the calculation of the probability of hitting the target depending on the number of projectiles fired, in certain combat circumstances as well as under certain meteorological conditions. Successful performance of the combat task of armored units in defensive actions against stationary targets depends to the greatest extent on the effectiveness of fire of tank weapons. Under the tactical assumptions that define real combat conditions, i.e., that the attacking formation opens fire from small arms and anti-tank weapons, that the defense is organized in a timely manner on maneuvering ground and in optimal meteorological conditions, and that the tank squad opens fire while stationary, the scientific goal of the research is to determine the probability of hitting and destroying the target as closely as possible depending on the method of determining the distance to the target and the number of projectiles fired. Methods: Mainly applying the method of situation modeling in scientific research, the authors try to determine, as precisely as possible, the percentage of the probability of hitting (destroying) a stationary target, with the first, second, or third projectile. Results: The main scientific contribution of the research would be the determination of various quantitative indicators as significant parameters necessary for a successful design of defense operations of ground army units. Conclusion: By creating an appropriate model for a specific situation in order to solve a problem (combat task), it is possible to precisely determine the probability of hitting and the probability of destroying the target in relation to the number of projectiles fired, as well as the expected consumption of ammunition.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"93 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76062136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of wireless keyboards: Threats, vulnerabilities and countermeasures 无线键盘的安全:威胁、漏洞和对策
Pub Date : 2023-01-01 DOI: 10.5937/vojtehg71-43239
S. Jovanović, D. Protić, V. Antić, Milena Grdović, Dejan Bajić
Introduction/purpose: This paper provides an overview of research on computer system vulnerabilities caused by compromised electromagnetic radiation by wireless keyboards. Wireless devices that use event-triggered communication have been shown to have critical privacy issues due to the inherent leakage associated with radio frequency emissions. Wireless connectivity technology is a source of signal emanation that must be protected in terms of performance and security. Methods: Wireless device vulnerabilities and side-channel attacks are observed, along with electromagnetic emission of radio waves. Results: The findings highlight a specific wireless keyboard's security and encryption flaws. The results of penetration testing reveal vulnerabilities of targeted wireless keyboards in terms of outdated firmware, encryption, wireless reliability, and connection strength. Conclusion: Wireless keyboards have security flaws that disrupt radio communication, giving a malicious user complete access to the computer to which the keyboard is connected. An attacker can steal sensitive data by observing how the system works using compromised electromagnetic emissions.
简介/目的:本文概述了无线键盘电磁辐射受损导致计算机系统漏洞的研究概况。使用事件触发通信的无线设备已被证明存在严重的隐私问题,因为与射频发射相关的固有泄漏。无线连接技术是一种信号源,必须在性能和安全方面加以保护。方法:观察无线设备的漏洞和侧信道攻击,以及无线电波的电磁发射。结果:研究结果突出了一种特定的无线键盘的安全和加密缺陷。渗透测试的结果揭示了目标无线键盘在固件过时、加密、无线可靠性和连接强度方面的漏洞。结论:无线键盘存在安全漏洞,会破坏无线电通信,让恶意用户完全访问与该键盘相连的计算机。攻击者可以通过观察系统如何使用受损的电磁发射来窃取敏感数据。
{"title":"Security of wireless keyboards: Threats, vulnerabilities and countermeasures","authors":"S. Jovanović, D. Protić, V. Antić, Milena Grdović, Dejan Bajić","doi":"10.5937/vojtehg71-43239","DOIUrl":"https://doi.org/10.5937/vojtehg71-43239","url":null,"abstract":"Introduction/purpose: This paper provides an overview of research on computer system vulnerabilities caused by compromised electromagnetic radiation by wireless keyboards. Wireless devices that use event-triggered communication have been shown to have critical privacy issues due to the inherent leakage associated with radio frequency emissions. Wireless connectivity technology is a source of signal emanation that must be protected in terms of performance and security. Methods: Wireless device vulnerabilities and side-channel attacks are observed, along with electromagnetic emission of radio waves. Results: The findings highlight a specific wireless keyboard's security and encryption flaws. The results of penetration testing reveal vulnerabilities of targeted wireless keyboards in terms of outdated firmware, encryption, wireless reliability, and connection strength. Conclusion: Wireless keyboards have security flaws that disrupt radio communication, giving a malicious user complete access to the computer to which the keyboard is connected. An attacker can steal sensitive data by observing how the system works using compromised electromagnetic emissions.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84695937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximum electric field estimation in the vicinity of 5G base stations before their start-up 5G基站启动前附近的最大电场估计
Pub Date : 2023-01-01 DOI: 10.5937/vojtehg71-42426
A. Lebl, Đurađ Budimir
Introduction/purpose: This paper presents initial development of the procedure for electric field estimation in the vicinity of 5G base stations. Methods: The procedure allows determination of future radiation levels before traffic is established over applied antenna systems on the basis of measured values of electric field levels caused by the signal forming Synchronization Signal Block. It is possible to perform necessary calculations for a very accurate estimation even if some important parameters of the radiation characteristics (such as the frequency span between the frequency carriers on the radio interface) are not a priori known. In this way, communication with mobile system operators before measurement is significantly simplified because operators do not need to know system technical details. Results: The developed formula for electric field estimation is verified comparing the calculated values by its implementation to the practical results obtained by intensive measurements on a great number of 5G base stations in a highly developed country. The formula gives a pessimistic result, i.e. a higher electric field level than it is obtained by all such performed measurements. Conclusion: This estimation allows mobile system operators to predict whether the electromagnetic field around base stations could be dangerous for human health when systems come to full operation while considering national and international recommendations dealing with radiation levels.
简介/目的:本文介绍了5G基站附近电场估计程序的初步进展。方法:根据信号形成同步信号块引起的电场水平的测量值,该程序允许在应用天线系统上建立交通之前确定未来的辐射水平。即使辐射特性的一些重要参数(如无线电接口上频率载波之间的频率跨度)不是先验已知的,也有可能进行必要的计算以进行非常精确的估计。这样,在测量前与移动系统运营商的沟通就大大简化了,因为运营商不需要知道系统的技术细节。结果:将所建立的电场估计公式与在高度发达国家大量5G基站上密集测量得到的实际结果进行对比,验证了该公式的计算值。该公式给出了一个悲观的结果,即比所有这些测量得到的电场水平更高。结论:这一估计使移动系统运营商能够在考虑有关辐射水平的国家和国际建议的同时,预测当系统全面运行时,基站周围的电磁场是否会对人类健康构成危险。
{"title":"Maximum electric field estimation in the vicinity of 5G base stations before their start-up","authors":"A. Lebl, Đurađ Budimir","doi":"10.5937/vojtehg71-42426","DOIUrl":"https://doi.org/10.5937/vojtehg71-42426","url":null,"abstract":"Introduction/purpose: This paper presents initial development of the procedure for electric field estimation in the vicinity of 5G base stations. Methods: The procedure allows determination of future radiation levels before traffic is established over applied antenna systems on the basis of measured values of electric field levels caused by the signal forming Synchronization Signal Block. It is possible to perform necessary calculations for a very accurate estimation even if some important parameters of the radiation characteristics (such as the frequency span between the frequency carriers on the radio interface) are not a priori known. In this way, communication with mobile system operators before measurement is significantly simplified because operators do not need to know system technical details. Results: The developed formula for electric field estimation is verified comparing the calculated values by its implementation to the practical results obtained by intensive measurements on a great number of 5G base stations in a highly developed country. The formula gives a pessimistic result, i.e. a higher electric field level than it is obtained by all such performed measurements. Conclusion: This estimation allows mobile system operators to predict whether the electromagnetic field around base stations could be dangerous for human health when systems come to full operation while considering national and international recommendations dealing with radiation levels.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85431535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomalies in quantum field theories 量子场论中的异常
Pub Date : 2023-01-01 DOI: 10.5937/vojtehg71-38164
N. Fabiano
Introduction:purpose: Noether's theorem connects symmetry of the Lagrangian to conserved quantities. Quantum effects cancel the conserved quantities. Methods: Triangle diagram, Path integral, Pauli-Villars regularisation. Results: Quantum effects that spoil conserved quantities of local gauge symmetries endager renormalisability. Conclusion: A careful treatment of anomalies is needed in order to obtain correct results. The p 0 → gg decay is perhaps the most notable "impossible" effect allowed by anomalies.
目的:诺特定理将拉格朗日量的对称性与守恒量联系起来。量子效应抵消了守恒量。方法:三角图、路径积分、Pauli-Villars正则化。结果:破坏局域规范对称守恒量的量子效应危及重整性。结论:为了获得正确的结果,需要对异常进行仔细的处理。p0→gg衰变可能是异常所允许的最显著的“不可能”效应。
{"title":"Anomalies in quantum field theories","authors":"N. Fabiano","doi":"10.5937/vojtehg71-38164","DOIUrl":"https://doi.org/10.5937/vojtehg71-38164","url":null,"abstract":"Introduction:purpose: Noether's theorem connects symmetry of the Lagrangian to conserved quantities. Quantum effects cancel the conserved quantities. Methods: Triangle diagram, Path integral, Pauli-Villars regularisation. Results: Quantum effects that spoil conserved quantities of local gauge symmetries endager renormalisability. Conclusion: A careful treatment of anomalies is needed in order to obtain correct results. The p 0 → gg decay is perhaps the most notable \"impossible\" effect allowed by anomalies.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"102 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85825315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Employment of probability-based multi-response optimization in high voltage thermofluids 基于概率的多响应优化在高压热流体中的应用
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-35764
J. Ofodu, J. Abifarin
Introduction/purpose: Researchers of fluids for high voltage engineering application always experience problems when selecting and recommending specific fluids suitable for high voltage application. This is due to the dual functionality of fluids required for high voltage equipment. Methods: This study introduced and employed a probability-based multi-objective optimization technique in the selection of high voltage thermofluids. Beneficial and unbeneficial preferable probability utility indexes were employed based on the desired properties of oils. Results: It was shown that the nanofluid with 0.6 wt% Al2O3 is the most promising candidate for high voltage equipment compared to other produced fluids considered. It is also noteworthy to state that coconut oil exhibited better performance efficiency compared to standard oil. This study also identifies that the produced Jatropha oil was inadequate for high voltage equipment. Conclusion: In conclusion, a preliminary study essential for final usage of 0.6 wt% Al2O3 nanofluids and coconut oil for high voltage equipment is recommended as well as the improvement of the performance characteristics of Jatropha oil for usage in high voltage equipment.
简介/用途:高压工程应用流体的研究人员在选择和推荐适合高压应用的特定流体时经常遇到问题。这是由于高压设备所需的流体具有双重功能。方法:将基于概率的多目标优化技术引入并应用于高压热流体的选择。根据油的期望性质,采用有利和不利的优选概率效用指标。结果:与其他产出液相比,Al2O3含量为0.6 wt%的纳米流体是高压设备最有希望的候选者。值得注意的是,与标准油相比,椰子油表现出更好的性能效率。这项研究还确定,生产的麻疯树油是不够的高压设备。结论:建议对0.6 wt% Al2O3纳米流体和椰子油在高压设备中的最终使用进行初步研究,并改善麻疯树油在高压设备中的使用性能。
{"title":"Employment of probability-based multi-response optimization in high voltage thermofluids","authors":"J. Ofodu, J. Abifarin","doi":"10.5937/vojtehg70-35764","DOIUrl":"https://doi.org/10.5937/vojtehg70-35764","url":null,"abstract":"Introduction/purpose: Researchers of fluids for high voltage engineering application always experience problems when selecting and recommending specific fluids suitable for high voltage application. This is due to the dual functionality of fluids required for high voltage equipment. Methods: This study introduced and employed a probability-based multi-objective optimization technique in the selection of high voltage thermofluids. Beneficial and unbeneficial preferable probability utility indexes were employed based on the desired properties of oils. Results: It was shown that the nanofluid with 0.6 wt% Al2O3 is the most promising candidate for high voltage equipment compared to other produced fluids considered. It is also noteworthy to state that coconut oil exhibited better performance efficiency compared to standard oil. This study also identifies that the produced Jatropha oil was inadequate for high voltage equipment. Conclusion: In conclusion, a preliminary study essential for final usage of 0.6 wt% Al2O3 nanofluids and coconut oil for high voltage equipment is recommended as well as the improvement of the performance characteristics of Jatropha oil for usage in high voltage equipment.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73801269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Path integral in quantum field theories 量子场论中的路径积分
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-35882
N. Fabiano
Introduction/purpose: Starting from the Hamiltonian an alternative description of quantum mechanics has been given, based on the sum of all possible paths between an initial and a final point. Methods: Theoretical methods of mathematical physics. Integral method based on the path integral. Results: The method and concepts of the path integral could be applied to other branches of physics, not limited to quantum mechanics. Conclusions: The Path Integral approach gives a global description of fields, unlike the usual Lagrangian approach which is a local description of fields.
简介/目的:从哈密顿量开始,基于初始点和最终点之间所有可能路径的总和,给出了量子力学的另一种描述。方法:数学物理的理论方法。基于路径积分的积分方法。结果:路径积分的方法和概念可以应用于物理学的其他分支,而不仅仅局限于量子力学。结论:路径积分方法给出了场的全局描述,而不像通常的拉格朗日方法是场的局部描述。
{"title":"Path integral in quantum field theories","authors":"N. Fabiano","doi":"10.5937/vojtehg70-35882","DOIUrl":"https://doi.org/10.5937/vojtehg70-35882","url":null,"abstract":"Introduction/purpose: Starting from the Hamiltonian an alternative description of quantum mechanics has been given, based on the sum of all possible paths between an initial and a final point. Methods: Theoretical methods of mathematical physics. Integral method based on the path integral. Results: The method and concepts of the path integral could be applied to other branches of physics, not limited to quantum mechanics. Conclusions: The Path Integral approach gives a global description of fields, unlike the usual Lagrangian approach which is a local description of fields.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76067077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Defining risks on road sections during the transport of dangerous goods in the Serbian army using the linear mathematical programming model 使用线性数学规划模型确定塞尔维亚军队危险货物运输过程中路段的风险
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-36071
Jovana Planić
Introduction/purpose: The paper presents a model for the selection of a route for the transport of dangerous goods using DEA (Data Envelopment Analysis) models and fuzzy logic systems. The presented model is used to define the risk on road sections during the transport of dangerous goods as well as to select the optimal route for the realization of the transport task. Methods: The model consists of two phases. The first phase includes the application of DEA models in which formed input and output models are connected in the output DEA final form which shows routes with a satisfactory level of traffic safety and at the same time eliminates routes with low traffic safety. The second phase involves the application of fuzzy logic systems, and as a way out of the fuzzy system, preference is given to one route. Route evaluation is based on six criteria, namely: route length, number of access points, AADT (annual average daily traffic), the number of traffic accidents with fatalities, the number of traffic accidents with the injured and the number of traffic accidents with material damage. When the values of the input criteria are entered, a calculation and evaluation is performed, and, as an exit from the fuzzy system, preference is given to one of the entered routes (the route with the lowest level of risk). The criteria used were defined on the basis of expert assessments. Results: A user program that represents decision support in traffic service. Conclusion: The user platform was created for the Matlab R2015a software package with the ability to be adapted to specific problems.
介绍/目的:本文利用DEA(数据包络分析)模型和模糊逻辑系统建立了危险品运输路线选择模型。该模型用于定义危险品运输过程中路段的风险,并选择最优路线以实现运输任务。方法:模型分为两个阶段。第一阶段是DEA模型的应用,将形成的输入和输出模型连接在输出DEA最终形式中,显示交通安全水平满意的路线,同时剔除交通安全水平较低的路线。第二阶段涉及模糊逻辑系统的应用,作为走出模糊系统的一种方式,优先选择一条路径。路线评价基于六个标准,即:路线长度、接入点数量、AADT(年平均日交通量)、死亡交通事故数量、受伤交通事故数量和物质损害交通事故数量。当输入标准值时,进行计算和评价,并作为模糊系统的出口,优先考虑输入的路线之一(风险水平最低的路线)。使用的标准是在专家评估的基础上确定的。结果:一个代表交通服务决策支持的用户程序。结论:为Matlab R2015a软件包创建的用户平台,具有适应具体问题的能力。
{"title":"Defining risks on road sections during the transport of dangerous goods in the Serbian army using the linear mathematical programming model","authors":"Jovana Planić","doi":"10.5937/vojtehg70-36071","DOIUrl":"https://doi.org/10.5937/vojtehg70-36071","url":null,"abstract":"Introduction/purpose: The paper presents a model for the selection of a route for the transport of dangerous goods using DEA (Data Envelopment Analysis) models and fuzzy logic systems. The presented model is used to define the risk on road sections during the transport of dangerous goods as well as to select the optimal route for the realization of the transport task. Methods: The model consists of two phases. The first phase includes the application of DEA models in which formed input and output models are connected in the output DEA final form which shows routes with a satisfactory level of traffic safety and at the same time eliminates routes with low traffic safety. The second phase involves the application of fuzzy logic systems, and as a way out of the fuzzy system, preference is given to one route. Route evaluation is based on six criteria, namely: route length, number of access points, AADT (annual average daily traffic), the number of traffic accidents with fatalities, the number of traffic accidents with the injured and the number of traffic accidents with material damage. When the values of the input criteria are entered, a calculation and evaluation is performed, and, as an exit from the fuzzy system, preference is given to one of the entered routes (the route with the lowest level of risk). The criteria used were defined on the basis of expert assessments. Results: A user program that represents decision support in traffic service. Conclusion: The user platform was created for the Matlab R2015a software package with the ability to be adapted to specific problems.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87914140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Domination on cactus chains of pentagons 统治仙人掌链的五边形
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-36576
Miroslava Mihajlov-Carević
Introduction/purpose: A graph as a mathematical object occupies a special place in science. Graph theory is increasingly used in many spheres of business and scientific fields. This paper analyzes pentagonal cactus chains, a special type of graphs composed of pentagonal cycles in which two adjacent cycles have only one node in common. The aim of the research is to determine the dominant set and the dominance number on ortho and meta pentagonal cactus chains. Methods: When the corresponding destinations are treated as graph nodes and the connections between them as branches in the graph, the complete structure of the graph is obtained, to which the laws of graph theory are applied. The vertices of the pentagon are treated as nodes of the graph and the sides as branches in the graph. By applying mathematical methods, the dominance was determined on one pentagon, then on two pentagons with a common node, and then on ortho and meta pentagonal cactus chains. Results: The research has shown that the dominance number on the ortho chain 𝑂ℎ of the length h ≥ 2 is equal to the value of the expression ⌈ 3ℎ 2 ⌉ while on the meta chain 𝑀ℎ it is equal to the value of the expression h+1, which was proven in this paper. Conclusion: The results show that the dominant sets and the dominance numbers on ortho and meta pentagonal cactus chains are determined and explicitly expressed by mathematical expressions. They also point to the possibility of their application in the fields of science as well as in the spheres of business in which these structures appear.
图作为一种数学对象,在科学中占有特殊的地位。图论越来越多地应用于商业和科学领域的许多领域。本文分析了五边形仙人掌链,这是一种由五边形环组成的特殊类型的图,其中相邻的两个环只有一个节点。研究的目的是确定正五边形和元五边形仙人掌链上的优势集和优势数。方法:将相应的目的地作为图节点,将它们之间的连接作为图中的分支,得到图的完整结构,并应用图论的规律。五边形的顶点被视为图的节点,边被视为图中的分支。应用数学方法,确定了在一个五边形上的优势,然后在两个具有共同节点的五边形上的优势,然后在正五边形和元五边形仙人掌链上的优势。结果:研究表明,长度为h≥2的邻位链𝑂- 上的优势数等于表达式的值,而元链𝑀- 上的优势数等于表达式的值h+1,本文对此进行了证明。结论:仙人掌正五边形链和后五边形链上的优势集和优势数可以用数学表达式明确表示。他们还指出了它们在科学领域以及在这些结构出现的商业领域中应用的可能性。
{"title":"Domination on cactus chains of pentagons","authors":"Miroslava Mihajlov-Carević","doi":"10.5937/vojtehg70-36576","DOIUrl":"https://doi.org/10.5937/vojtehg70-36576","url":null,"abstract":"Introduction/purpose: A graph as a mathematical object occupies a special place in science. Graph theory is increasingly used in many spheres of business and scientific fields. This paper analyzes pentagonal cactus chains, a special type of graphs composed of pentagonal cycles in which two adjacent cycles have only one node in common. The aim of the research is to determine the dominant set and the dominance number on ortho and meta pentagonal cactus chains. Methods: When the corresponding destinations are treated as graph nodes and the connections between them as branches in the graph, the complete structure of the graph is obtained, to which the laws of graph theory are applied. The vertices of the pentagon are treated as nodes of the graph and the sides as branches in the graph. By applying mathematical methods, the dominance was determined on one pentagon, then on two pentagons with a common node, and then on ortho and meta pentagonal cactus chains. Results: The research has shown that the dominance number on the ortho chain 𝑂ℎ of the length h ≥ 2 is equal to the value of the expression ⌈ 3ℎ 2 ⌉ while on the meta chain 𝑀ℎ it is equal to the value of the expression h+1, which was proven in this paper. Conclusion: The results show that the dominant sets and the dominance numbers on ortho and meta pentagonal cactus chains are determined and explicitly expressed by mathematical expressions. They also point to the possibility of their application in the fields of science as well as in the spheres of business in which these structures appear.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87402704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Logistics support of the Serbian Armed Forces: Supply and maintenance through public procurement 塞尔维亚武装部队的后勤支助:通过公共采购提供和维护
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-35171
M. Ilić
Introduction/purpose: The work is based on the Rule of the Technical Service, the Law on Public Procurement, as well as on the experience gained in performing the duties of the Chief of Logistics in the Logistics Battalion of the Armed Forces. It contains the concept of Logistics Support and presents a part of the supply and maintenance system through Public Procurement in the Logistics Battalion of the Armed Forces. Methods: The theoretical system of supply and maintenance is very complex and consists of a number of elements, organizational units, as well as certain principles. During the implementation, it is necessary to take into account all the principles and adhere to the rules and instructions. Also important was the help of colleagues from the Armed Forces and other state institutions who are in relevant positions and are important for logistics support. Results: The final result of the work is a presentation of some activities performed by the logistics body in the battalion with a review of procurement under account 4252. In the final part of the paper, the emphasis is placed on the instructions which regulate and define the division of procurement in more detail, as well as on the implementation according to expenditure account 4252 on "ongoing maintenance and repair of equipment". Conclusion: During the preparation of the paper, the biggest difficulty was the change of various rules and laws. Some rules and literature were written in the 1970s, and are still in force. A proposal for further tendencies would be to define new rules and organizations based on the experience of the countries in the region where the system has taken root.
简介/目的:这项工作是根据《技术事务处规则》、《公共采购法》以及在履行武装部队后勤营后勤主任职责时所取得的经验进行的。它包含了后勤保障的概念,并通过公共采购呈现了武装部队后勤营供应和维护系统的一部分。方法:供给与维护的理论体系非常复杂,由许多要素、组织单位和一定的原则组成。在实施过程中,必须考虑到所有的原则,坚持规则和指示。同样重要的是来自武装部队和其他国家机构的同事的帮助,他们在相关岗位上,对后勤支持很重要。结果:工作的最后结果是介绍了营内后勤机构进行的一些活动,并审查了帐户4252下的采购。在论文的最后一部分,重点放在更详细地规范和定义采购分工的说明,以及根据支出帐户4252“持续维护和修理设备”的实施。结论:在论文的准备过程中,最大的困难是各种规则和法律的变化。一些规则和文献是在20世纪70年代写的,现在仍然有效。关于进一步趋势的一项建议是,根据该制度已扎根的区域内各国的经验,确定新的规则和组织。
{"title":"Logistics support of the Serbian Armed Forces: Supply and maintenance through public procurement","authors":"M. Ilić","doi":"10.5937/vojtehg70-35171","DOIUrl":"https://doi.org/10.5937/vojtehg70-35171","url":null,"abstract":"Introduction/purpose: The work is based on the Rule of the Technical Service, the Law on Public Procurement, as well as on the experience gained in performing the duties of the Chief of Logistics in the Logistics Battalion of the Armed Forces. It contains the concept of Logistics Support and presents a part of the supply and maintenance system through Public Procurement in the Logistics Battalion of the Armed Forces. Methods: The theoretical system of supply and maintenance is very complex and consists of a number of elements, organizational units, as well as certain principles. During the implementation, it is necessary to take into account all the principles and adhere to the rules and instructions. Also important was the help of colleagues from the Armed Forces and other state institutions who are in relevant positions and are important for logistics support. Results: The final result of the work is a presentation of some activities performed by the logistics body in the battalion with a review of procurement under account 4252. In the final part of the paper, the emphasis is placed on the instructions which regulate and define the division of procurement in more detail, as well as on the implementation according to expenditure account 4252 on \"ongoing maintenance and repair of equipment\". Conclusion: During the preparation of the paper, the biggest difficulty was the change of various rules and laws. Some rules and literature were written in the 1970s, and are still in force. A proposal for further tendencies would be to define new rules and organizations based on the experience of the countries in the region where the system has taken root.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77000435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Saddle point approximation to Higher order 高阶鞍点近似
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-33507
N. Fabiano, Nikola Mirkov
Introduction/purpose: Saddle point approximation has been considered in the paper Methods: The saddle point method is used in several different fields of mathematics and physics. Several terms of the expansion for the factorial function have been explicitely computed. Results: The integrals estimated in this way have values close to the exact one. Conclusions: Higher order corrections are not negligible even when requiring moderate levels of precision.
前言/目的:本文考虑了鞍点近似方法。方法:鞍点法被应用于数学和物理的几个不同领域。阶乘函数展开式的几个项已经被明确地计算出来了。结果:用这种方法求得的积分值接近准确值。结论:高阶校正是不可忽略的,即使需要中等水平的精度。
{"title":"Saddle point approximation to Higher order","authors":"N. Fabiano, Nikola Mirkov","doi":"10.5937/vojtehg70-33507","DOIUrl":"https://doi.org/10.5937/vojtehg70-33507","url":null,"abstract":"Introduction/purpose: Saddle point approximation has been considered in the paper Methods: The saddle point method is used in several different fields of mathematics and physics. Several terms of the expansion for the factorial function have been explicitely computed. Results: The integrals estimated in this way have values close to the exact one. Conclusions: Higher order corrections are not negligible even when requiring moderate levels of precision.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83946906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Vojnotehnicki Glasnik
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1