首页 > 最新文献

Vojnotehnicki Glasnik最新文献

英文 中文
Frequency hopping spread spectrum: History, principles and applications 跳频扩频:历史、原理和应用
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-38342
V. Ristić, B. Todorović, N. Stojanović
Introduction/purpose: The frequency hopping spread spectrum (FH-SS) technique assumes the carrier generated by the syntesizer to hop from frequency to frequency over a wide bandwidth, according to a pseudonoise code sequence defined by the code sequence generator. The article presents the history, principles and applications of the FH-SS technique. Both military and commercial applications are discussed. Methods: This article presents an overview of data from the technical literature, with appropriate comments. Results: After presenting the history and principles of the FH-SS technique, the article summarizes its use with examples of military and commercial applications. The importance of using FH-SS in the described applications is highlighted. Conclusion: The FH-SS technique has been successfully implemented in many military and commercial technologies due to its high protection against interference, making communication difficult for reconnaissance and eavesdropping, and its ability to provide code division multiple access.
简介/用途:跳频扩频(FH-SS)技术假定由合成器产生的载波根据码序列发生器定义的伪噪声码序列在宽带宽上从一个频率跳到另一个频率。本文介绍了FH-SS技术的发展历史、原理和应用。讨论了军事和商业应用。方法:本文概述了技术文献中的数据,并附有适当的评论。结果:介绍了FH-SS技术的发展历史和原理,结合军事和商业应用实例,总结了FH-SS技术的应用。强调了在所描述的应用中使用FH-SS的重要性。结论:FH-SS技术具有抗干扰能力强、通信不易被侦察和窃听、提供码分多址等优点,已成功应用于许多军事和商业技术中。
{"title":"Frequency hopping spread spectrum: History, principles and applications","authors":"V. Ristić, B. Todorović, N. Stojanović","doi":"10.5937/vojtehg70-38342","DOIUrl":"https://doi.org/10.5937/vojtehg70-38342","url":null,"abstract":"Introduction/purpose: The frequency hopping spread spectrum (FH-SS) technique assumes the carrier generated by the syntesizer to hop from frequency to frequency over a wide bandwidth, according to a pseudonoise code sequence defined by the code sequence generator. The article presents the history, principles and applications of the FH-SS technique. Both military and commercial applications are discussed. Methods: This article presents an overview of data from the technical literature, with appropriate comments. Results: After presenting the history and principles of the FH-SS technique, the article summarizes its use with examples of military and commercial applications. The importance of using FH-SS in the described applications is highlighted. Conclusion: The FH-SS technique has been successfully implemented in many military and commercial technologies due to its high protection against interference, making communication difficult for reconnaissance and eavesdropping, and its ability to provide code division multiple access.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84329486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of repeater jamming of a slow frequency hopping radio 慢跳频无线电中继器干扰分析
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-37535
Nenad Stojanović, B. Todorović, V. Ristić
Introduction/purpose: The article presents a model of a slow frequency hopping radio in the case of repeater jamming. The aim is to analyze the effectiveness of repeater jamming to a military tactical slow frequency hopping radio. Methods: It is assumed that the repeater jammer will be successful in detecting signals with slow frequency hopping at each hop and that it will perform successful partial jamming of the intercepted communication. Under partial jamming, it is considered that a certain part of the transmission time of each hop will be jammed. A theoretical analysis of the impact of a repeater jammer on a frequency hopping radio was performed based on the definition of the total probability of error. Various parameters that affect the segment of hop duration under jamming were considered. Results: The obtained results show that high effective jamming is achieved even when a short segment of hop duration is jammed. We discuss the conditions for the repeater jammer to detect the signal during each hop and emit the jamming signal with the required strength. It has been shown that increasing the frequency hopping rate can significantly reduce the effectiveness of the repeater jammer. Conclusion: Repeater jammers are highly effective against slow frequency hopping radio communication systems.
介绍/目的:本文提出了一种中继器干扰情况下的慢跳频无线电模型。目的是分析对军用战术慢跳频无线电中继器干扰的有效性。方法:假设中继器干扰器能够成功地探测到每一跳跳频慢的信号,并且能够成功地对截获的通信进行部分干扰。在部分干扰情况下,认为每一跳的传输时间都有一部分受到干扰。基于总误差概率的定义,对中继器干扰对跳频无线电的影响进行了理论分析。考虑了干扰下影响跳段持续时间的各种参数。结果:得到的结果表明,即使在一小段跳持续时间被阻塞时,也能实现高效的干扰。讨论了中继器对每一跳信号进行检测,并按要求的强度发射干扰信号的条件。研究表明,增加跳频频率会显著降低中继干扰器的有效性。结论:中继器干扰器对慢跳频无线电通信系统非常有效。
{"title":"Analysis of repeater jamming of a slow frequency hopping radio","authors":"Nenad Stojanović, B. Todorović, V. Ristić","doi":"10.5937/vojtehg70-37535","DOIUrl":"https://doi.org/10.5937/vojtehg70-37535","url":null,"abstract":"Introduction/purpose: The article presents a model of a slow frequency hopping radio in the case of repeater jamming. The aim is to analyze the effectiveness of repeater jamming to a military tactical slow frequency hopping radio. Methods: It is assumed that the repeater jammer will be successful in detecting signals with slow frequency hopping at each hop and that it will perform successful partial jamming of the intercepted communication. Under partial jamming, it is considered that a certain part of the transmission time of each hop will be jammed. A theoretical analysis of the impact of a repeater jammer on a frequency hopping radio was performed based on the definition of the total probability of error. Various parameters that affect the segment of hop duration under jamming were considered. Results: The obtained results show that high effective jamming is achieved even when a short segment of hop duration is jammed. We discuss the conditions for the repeater jammer to detect the signal during each hop and emit the jamming signal with the required strength. It has been shown that increasing the frequency hopping rate can significantly reduce the effectiveness of the repeater jammer. Conclusion: Repeater jammers are highly effective against slow frequency hopping radio communication systems.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72517754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on integral transforms of the generalized Lommel-Wright function 广义Lommel-Wright函数的积分变换研究
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-36402
K. Saeed, Sirazul Haq, Khan Ali, N. Fabiano
Introduction/purpose: The aim of this article is to establish integral transforms of the generalized Lommel-Wright function. Methods: These transforms are expressed in terms of the Wright Hypergeometric function. Results: Integrals involving the trigonometric, generalized Bessel function and the Struve functions are obtained. Conclusions: Various interesting transforms as the consequence of this method are obtained.
简介/目的:本文的目的是建立广义Lommel-Wright函数的积分变换。方法:用Wright超几何函数表示这些变换。结果:得到了三角函数、广义贝塞尔函数和Struve函数的积分。结论:通过这种方法得到了各种有趣的变换。
{"title":"A study on integral transforms of the generalized Lommel-Wright function","authors":"K. Saeed, Sirazul Haq, Khan Ali, N. Fabiano","doi":"10.5937/vojtehg70-36402","DOIUrl":"https://doi.org/10.5937/vojtehg70-36402","url":null,"abstract":"Introduction/purpose: The aim of this article is to establish integral transforms of the generalized Lommel-Wright function. Methods: These transforms are expressed in terms of the Wright Hypergeometric function. Results: Integrals involving the trigonometric, generalized Bessel function and the Struve functions are obtained. Conclusions: Various interesting transforms as the consequence of this method are obtained.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74915877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modern weapons and military equipment 现代武器和军事装备
Pub Date : 2022-01-01 DOI: 10.5937/vtg2202491v
D. Vučković
{"title":"Modern weapons and military equipment","authors":"D. Vučković","doi":"10.5937/vtg2202491v","DOIUrl":"https://doi.org/10.5937/vtg2202491v","url":null,"abstract":"","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90758903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Screen reading: Electromagnetic information leakage from the computer monitor 读屏:电脑显示器电磁信息泄漏
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-38930
Milena Grdović, D. Protić, Vlada Antić, Boriša Jovanović
Introduction/purpose: The security of systems can be jeopardized by compromising emanations. This paper provides an overview of computer screen attacks. New technologies can be used to exfiltrate sensitive data from computer screens. Emission security is the prevention of electromagnetic signal attacks that are conducted or radiated. Methods: This paper examines the impact of a side-channel attack that intercepts compromised information from a computer screen. The leakage of electromagnetic data is also explained. Software-defined radios are described to explain malicious attacks on computer monitors. Results: The source of the electromagnetic signal determines the nature of the side-channel information they carry. The most well-known issue associated with revealing emissions is the possibility of intercepting visual information displayed on computer monitors. Conclusion: Visual data displayed on computer monitors could be intercepted by a software-defined radio which can digitize the desired frequency spectrum directly from an antenna, present it to a digital signal processor, and output it to an application for revealing sensitive data. A Grdović, M. et al, Screen reading: electromagnetic information leakage from the computer monitor, pp.836-855 variety of countermeasures, such as shielding, zoning, soft TEMPEST, and similar techniques, can be used to prevent data leakage.
介绍/用途:系统的安全性可能会因泄漏而受到威胁。本文概述了计算机屏幕攻击。新技术可以用来从电脑屏幕上窃取敏感数据。发射安全是防止电磁信号被传导或辐射的攻击。方法:本文研究了从计算机屏幕上拦截受损信息的侧信道攻击的影响。并对电磁数据的泄漏进行了解释。软件定义无线电被用来解释对计算机监视器的恶意攻击。结果:电磁信号的来源决定了它们所携带的侧信道信息的性质。与暴露辐射有关的最著名的问题是可能拦截显示在计算机显示器上的视觉信息。结论:计算机显示器上显示的可视化数据可以被软件定义无线电截获,该无线电可以直接从天线上将所需频谱数字化,将其呈现给数字信号处理器,并将其输出到显示敏感数据的应用程序。格多维奇,M.等人,屏幕阅读:从计算机显示器电磁信息泄漏,第836-855各种对策,如屏蔽,分区,软TEMPEST,和类似的技术,可以用来防止数据泄漏。
{"title":"Screen reading: Electromagnetic information leakage from the computer monitor","authors":"Milena Grdović, D. Protić, Vlada Antić, Boriša Jovanović","doi":"10.5937/vojtehg70-38930","DOIUrl":"https://doi.org/10.5937/vojtehg70-38930","url":null,"abstract":"Introduction/purpose: The security of systems can be jeopardized by compromising emanations. This paper provides an overview of computer screen attacks. New technologies can be used to exfiltrate sensitive data from computer screens. Emission security is the prevention of electromagnetic signal attacks that are conducted or radiated. Methods: This paper examines the impact of a side-channel attack that intercepts compromised information from a computer screen. The leakage of electromagnetic data is also explained. Software-defined radios are described to explain malicious attacks on computer monitors. Results: The source of the electromagnetic signal determines the nature of the side-channel information they carry. The most well-known issue associated with revealing emissions is the possibility of intercepting visual information displayed on computer monitors. Conclusion: Visual data displayed on computer monitors could be intercepted by a software-defined radio which can digitize the desired frequency spectrum directly from an antenna, present it to a digital signal processor, and output it to an application for revealing sensitive data. A Grdović, M. et al, Screen reading: electromagnetic information leakage from the computer monitor, pp.836-855 variety of countermeasures, such as shielding, zoning, soft TEMPEST, and similar techniques, can be used to prevent data leakage.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90194149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach of probability based multi-objective optimization considering robustness for material engineering 材料工程中一种考虑鲁棒性的概率多目标优化方法
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-35795
M. Zheng, H. Teng, Yi Wang
Introduction/purpose: The newly developed probability-based multi - objective optimization (MOO) has introduced a novel concept of preferable probability to represent a preferability degree of a candidate in optimization in order to overcome the inherent shortcomings of subjective and "additive" factors in the previous MOO methods. In this paper, the new method is extended to include robust optimization for material engineering. Furthermore, energy consumption in a melting process with orthogonal array design and the robust optimization of four different process schemes in machining an electric globe valve body are taken as examples. Methods: The arithmetic mean value of each performance utility indicator of the candidate contributes to one part of the partial preferable probability, while the deviation of each performance utility indicator from its arithmetic mean value of the candidate contributes to the other part of the partial preferable probability quantitatively. Furthermore, following the procedures of the newly developed probability-based multi-objective optimization (PMOO), the total preferable probability of a candidate is obtained, which thus transfers a multi-objective optimization problem into a single objective optimization problem. Results: The optimal control factors of lower electric energy consumption with robustness are bundled steel, loose steel, and uncleaned steel of 12.5%, 50% and 37.5% by weight, respectively, in this steel melting process. This case is closely followed by the scenario of 50 wt% bundled steel, 50 wt% loose steel, and 0 wt% uncleaned steel. The robust optimization of four different process schemes for machining an electric globe valve body is scheme No. 1. Conclusion: The extension of probability-based multi-objective optimization while considering robustness is successful, which can be easily used to deal with the optimal problem with dispersion of data to get objectively an optimal result with robustness in material engineering. The extension of probability-based multi-objective optimization while considering robustness will be beneficial to relevant research and process optimization.
简介/目的:基于概率的多目标优化(MOO)方法为了克服以往的多目标优化方法中主观因素和“可加性”因素的固有缺点,引入了优选概率的概念来表示优化中候选对象的优选程度。本文将该方法扩展到材料工程的鲁棒优化。以电动截止阀阀体熔炼过程的能量消耗为例,采用正交阵列设计和鲁棒优化四种不同工艺方案。方法:候选企业各性能效用指标的算术平均值对部分优选概率的贡献为一部分,而各性能效用指标与其算术平均值的偏差对部分优选概率的贡献为另一部分。在此基础上,根据新提出的基于概率的多目标优化(PMOO)方法,求出候选方案的总优选概率,从而将多目标优化问题转化为单目标优化问题。结果:在该炼钢过程中,捆扎钢、松散钢和未清洁钢的质量比分别为12.5%、50%和37.5%,是降低电能消耗且具有鲁棒性的最优控制因素。紧跟在这种情况之后的是50%捆绑钢、50%松散钢和0%未清洁钢的情况。方案一是对电动截止阀阀体加工的四种不同工艺方案进行鲁棒优化。结论:考虑鲁棒性的基于概率的多目标优化方法的推广是成功的,可以很容易地用于处理数据分散的优化问题,从而在材料工程中客观地获得具有鲁棒性的最优结果。在考虑鲁棒性的前提下,对基于概率的多目标优化进行扩展,有利于相关研究和过程优化。
{"title":"An approach of probability based multi-objective optimization considering robustness for material engineering","authors":"M. Zheng, H. Teng, Yi Wang","doi":"10.5937/vojtehg70-35795","DOIUrl":"https://doi.org/10.5937/vojtehg70-35795","url":null,"abstract":"Introduction/purpose: The newly developed probability-based multi - objective optimization (MOO) has introduced a novel concept of preferable probability to represent a preferability degree of a candidate in optimization in order to overcome the inherent shortcomings of subjective and \"additive\" factors in the previous MOO methods. In this paper, the new method is extended to include robust optimization for material engineering. Furthermore, energy consumption in a melting process with orthogonal array design and the robust optimization of four different process schemes in machining an electric globe valve body are taken as examples. Methods: The arithmetic mean value of each performance utility indicator of the candidate contributes to one part of the partial preferable probability, while the deviation of each performance utility indicator from its arithmetic mean value of the candidate contributes to the other part of the partial preferable probability quantitatively. Furthermore, following the procedures of the newly developed probability-based multi-objective optimization (PMOO), the total preferable probability of a candidate is obtained, which thus transfers a multi-objective optimization problem into a single objective optimization problem. Results: The optimal control factors of lower electric energy consumption with robustness are bundled steel, loose steel, and uncleaned steel of 12.5%, 50% and 37.5% by weight, respectively, in this steel melting process. This case is closely followed by the scenario of 50 wt% bundled steel, 50 wt% loose steel, and 0 wt% uncleaned steel. The robust optimization of four different process schemes for machining an electric globe valve body is scheme No. 1. Conclusion: The extension of probability-based multi-objective optimization while considering robustness is successful, which can be easily used to deal with the optimal problem with dispersion of data to get objectively an optimal result with robustness in material engineering. The extension of probability-based multi-objective optimization while considering robustness will be beneficial to relevant research and process optimization.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90399983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious code in the cloud 云中的恶意代码
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-37168
Dragan Damjanović
Introduction/purpose: The paper analyzes the impact of malicious codes in the cloud. Malicious code is an unauthorized piece of code that violates the integrity of an application and infrastructure to cause certain effects, such as security breaches, spread of infections, and data infiltration from the computer with the help of malicious software - this is a simple form of data theft which can lead to disastrous consequences in all segments of society, especially when it comes to national security. To overcome this challenge, it is necessary to detect holes in the safety of cloud environments and repair them before the attackers use these vulnerabilities to bypass the integrated cloud infrastructure. Methods: Structural analysis, functional analysis, comparative analysis, synthesis. Results: There are many factors for collecting, comparing, and delivering intelligence data on cloud threats. Cloud applications are increasingly being targeted because their use to store and share data with mobile application hosting has been increased exponentially, enabling industrial automation and business information monitoring and procurement. In addition, billions of devices on the Internet use the cloud infrastructure as a background for processing and transmitting large data sets. Malicious code is easily distributed due to the ease of sharing documents and files via the cloud. Conclusion: As cloud technologies are taking a central place in the world of digital transformation, the threat to the cloud environment is expected to grow exponentially. This means that organizations need to ensure that the cyber security position of the cloud infrastructure they possess is robust and mature enough to combat all relevant security threats in order to minimize business risks. Understanding the nature of practical security controls and how they are assessed enables organizations to build a practical approach to security and privacy in the cloud.
简介/目的:本文分析了云环境中恶意代码的影响。恶意代码是一种未经授权的代码,它违反了应用程序和基础设施的完整性,从而造成某些影响,例如安全漏洞,感染的传播,以及借助恶意软件从计算机渗透数据-这是一种简单的数据盗窃形式,可以在社会的各个领域导致灾难性的后果,特别是当涉及到国家安全时。为了克服这一挑战,有必要在攻击者利用这些漏洞绕过集成的云基础设施之前检测云环境的安全漏洞并进行修复。方法:结构分析、功能分析、比较分析、综合分析。结果:收集、比较和提供有关云威胁的情报数据有许多因素。云应用程序越来越成为目标,因为它们用于存储和与移动应用程序托管共享数据的用途呈指数级增长,从而实现了工业自动化和商业信息监控和采购。此外,互联网上数十亿的设备使用云基础设施作为处理和传输大型数据集的后台。由于可以通过云共享文档和文件,恶意代码很容易传播。结论:随着云技术在数字化转型的世界中占据中心位置,对云环境的威胁预计将呈指数级增长。这意味着组织需要确保他们拥有的云基础设施的网络安全地位足够强大和成熟,以对抗所有相关的安全威胁,从而最大限度地降低业务风险。了解实际安全控制的性质以及如何对其进行评估,使组织能够在云中构建实用的安全和隐私方法。
{"title":"Malicious code in the cloud","authors":"Dragan Damjanović","doi":"10.5937/vojtehg70-37168","DOIUrl":"https://doi.org/10.5937/vojtehg70-37168","url":null,"abstract":"Introduction/purpose: The paper analyzes the impact of malicious codes in the cloud. Malicious code is an unauthorized piece of code that violates the integrity of an application and infrastructure to cause certain effects, such as security breaches, spread of infections, and data infiltration from the computer with the help of malicious software - this is a simple form of data theft which can lead to disastrous consequences in all segments of society, especially when it comes to national security. To overcome this challenge, it is necessary to detect holes in the safety of cloud environments and repair them before the attackers use these vulnerabilities to bypass the integrated cloud infrastructure. Methods: Structural analysis, functional analysis, comparative analysis, synthesis. Results: There are many factors for collecting, comparing, and delivering intelligence data on cloud threats. Cloud applications are increasingly being targeted because their use to store and share data with mobile application hosting has been increased exponentially, enabling industrial automation and business information monitoring and procurement. In addition, billions of devices on the Internet use the cloud infrastructure as a background for processing and transmitting large data sets. Malicious code is easily distributed due to the ease of sharing documents and files via the cloud. Conclusion: As cloud technologies are taking a central place in the world of digital transformation, the threat to the cloud environment is expected to grow exponentially. This means that organizations need to ensure that the cyber security position of the cloud infrastructure they possess is robust and mature enough to combat all relevant security threats in order to minimize business risks. Understanding the nature of practical security controls and how they are assessed enables organizations to build a practical approach to security and privacy in the cloud.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83203464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical analysis of a frontal impact of a 12.7 mm projectile on an armor plate 12.7毫米弹丸对装甲正面冲击的数值分析
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-38412
M. Pešić, Aleksandra Živković, Aleksa Aničić, Lazar Blagojević, Petko Bonchev, Predrag Pantović
Introduction/purpose: The paper presents a numerical simulation of an impact of a 12.7 mm projectile on an armored metal plate with a velocity of 500 m/s at a distance of 900 m. Numerical simulations offer the possibility of drastically reducing the time required to obtain results in comparison to the time required for planning, organization and execution of experiments. The numerical simulation is done by variations in the thickness of the armor metal plate, specifically an armor metal plate of a thickness of 10 mm, 17 mm, 18 mm, and 23 mm. The mentioned armored plate thicknesses were chosen based on the results in order to determine the limit thickness of the armored plate for the projectile perforation limit, as well as for complete ballistic protection. Methods: Finite element modeling is used for analyzing stresses and deformations of the armored plates. The mentioned method calculates the impact of the projectile on the obstacle, precisely the collision of the projectile and the armor plate. Results: For the comparative analysis, the parameters used are the values of the stress and the displacement. For each of the above-mentioned thicknesses of the armored metal plate, the values of stress and displacement during projectile impact were determined. The results of this study show how the thickness of the armor plate affects the interaction of the projectile and the armor plate. Conclusion: If the physical and chemical characteristics of the armored plate remain unchanged, as the thickness of the armored plate increases, the possibility of projectile penetration decreases, and vice versa. This research is of essential importance because it analyzes the stresses and deformation of armor plates whose basic role is the protection of personnel and equipment from the projectile impact. In this regard, the thickness of the armored plate for semi-penetration of the projectile is determined.
介绍/目的:本文对一枚12.7 mm弹丸在900 m距离上以500 m/s的速度撞击装甲金属板进行了数值模拟。与计划、组织和执行实验所需的时间相比,数值模拟提供了大大减少获得结果所需时间的可能性。数值模拟是通过装甲金属板厚度的变化来完成的,特别是厚度为10mm, 17mm, 18mm和23mm的装甲金属板。根据结果选择上述装甲板厚度,以确定弹丸穿孔极限装甲板的极限厚度,以及完整的弹道防护。方法:采用有限元方法对铠装板进行应力和变形分析。该方法计算了弹丸对障碍物的冲击,准确地说是弹丸与装甲板的碰撞。结果:为进行对比分析,采用的参数为应力值和位移值。对于上述每种厚度的装甲金属板,确定了弹丸冲击时的应力和位移值。研究结果显示了装甲板厚度对弹丸与装甲板相互作用的影响。结论:在装甲板物理化学特性不变的情况下,随着装甲板厚度的增加,弹丸侵彻的可能性减小,反之亦然。由于装甲板的基本作用是保护人员和设备免受弹丸冲击,因此对其应力和变形进行分析具有重要意义。在这方面,确定了半侵彻弹丸的装甲板厚度。
{"title":"Numerical analysis of a frontal impact of a 12.7 mm projectile on an armor plate","authors":"M. Pešić, Aleksandra Živković, Aleksa Aničić, Lazar Blagojević, Petko Bonchev, Predrag Pantović","doi":"10.5937/vojtehg70-38412","DOIUrl":"https://doi.org/10.5937/vojtehg70-38412","url":null,"abstract":"Introduction/purpose: The paper presents a numerical simulation of an impact of a 12.7 mm projectile on an armored metal plate with a velocity of 500 m/s at a distance of 900 m. Numerical simulations offer the possibility of drastically reducing the time required to obtain results in comparison to the time required for planning, organization and execution of experiments. The numerical simulation is done by variations in the thickness of the armor metal plate, specifically an armor metal plate of a thickness of 10 mm, 17 mm, 18 mm, and 23 mm. The mentioned armored plate thicknesses were chosen based on the results in order to determine the limit thickness of the armored plate for the projectile perforation limit, as well as for complete ballistic protection. Methods: Finite element modeling is used for analyzing stresses and deformations of the armored plates. The mentioned method calculates the impact of the projectile on the obstacle, precisely the collision of the projectile and the armor plate. Results: For the comparative analysis, the parameters used are the values of the stress and the displacement. For each of the above-mentioned thicknesses of the armored metal plate, the values of stress and displacement during projectile impact were determined. The results of this study show how the thickness of the armor plate affects the interaction of the projectile and the armor plate. Conclusion: If the physical and chemical characteristics of the armored plate remain unchanged, as the thickness of the armored plate increases, the possibility of projectile penetration decreases, and vice versa. This research is of essential importance because it analyzes the stresses and deformation of armor plates whose basic role is the protection of personnel and equipment from the projectile impact. In this regard, the thickness of the armored plate for semi-penetration of the projectile is determined.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76356222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence of heat input on the tensile properties of austenitic-ferritic welded joints 热输入对奥氏体-铁素体焊接接头拉伸性能的影响
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-36252
A. Bukvić, D. Petrović, I. Radisavljević, Saša Dimitrić
Introduction/purpose: During exploitation tests of gasoline storage tanks, cracks can form in an austenitic-ferrite welded joint, which can compromise the entire tank. Methods: In order to obtain a welded joint of satisfactory strength and durability, the paper analyzes the influence of heat input on the tensile characteristics of welded joints. In the current literature and practice, additional materials for welding the tank elements are selected according to the chemical compositions of the elements of basic materials, with the help of the Schaeffler diagram. In this paper, the characteristics of welded joints of gasoline storage tanks are examined, when the largest part of the tank is made of fine - grained microalloyed steel NIOMOL 490 K, while the roof part of the tank is made of austenitic steel. Slabs of these two materials were welded by the MIG process with additional material MIG 18/8/6, at different amounts of heat input. Conclusion: The analysis of the results obtained by tensile testing according to SRPS EN ISO 6892-1: 2020 standard concluded that the behavior of the joint as a whole depends on the properties of each individual part of the welded joint and their mutual influence. It was also concluded that the mutual influence is better if welding is performed with a lower amount of heat input, because then a lower degree of mixing of additional material with basic materials is achieved.
简介/用途:在汽油储罐开采试验中,奥氏体-铁素体焊接接头会产生裂纹,危及整个储罐。方法:为了获得令人满意的强度和耐久性焊接接头,分析了热输入对焊接接头拉伸特性的影响。在目前的文献和实践中,根据基本材料中元素的化学组成,借助舍弗勒图选择焊接罐件的附加材料。本文对汽油储罐的焊接接头特性进行了研究,当储罐的最大部分采用细晶微合金钢NIOMOL 490 K,罐顶部分采用奥氏体钢。这两种材料的板在不同的热量输入下,用MIG工艺与额外的材料MIG 18/8/6焊接。结论:根据SRPS EN ISO 6892-1: 2020标准对拉伸试验结果进行分析,得出的结论是,接头的整体行为取决于焊接接头各个单独部分的性能及其相互影响。还得出结论,如果以较低的热输入量进行焊接,则相互影响更好,因为这样可以实现较低程度的附加材料与基本材料的混合。
{"title":"Influence of heat input on the tensile properties of austenitic-ferritic welded joints","authors":"A. Bukvić, D. Petrović, I. Radisavljević, Saša Dimitrić","doi":"10.5937/vojtehg70-36252","DOIUrl":"https://doi.org/10.5937/vojtehg70-36252","url":null,"abstract":"Introduction/purpose: During exploitation tests of gasoline storage tanks, cracks can form in an austenitic-ferrite welded joint, which can compromise the entire tank. Methods: In order to obtain a welded joint of satisfactory strength and durability, the paper analyzes the influence of heat input on the tensile characteristics of welded joints. In the current literature and practice, additional materials for welding the tank elements are selected according to the chemical compositions of the elements of basic materials, with the help of the Schaeffler diagram. In this paper, the characteristics of welded joints of gasoline storage tanks are examined, when the largest part of the tank is made of fine - grained microalloyed steel NIOMOL 490 K, while the roof part of the tank is made of austenitic steel. Slabs of these two materials were welded by the MIG process with additional material MIG 18/8/6, at different amounts of heat input. Conclusion: The analysis of the results obtained by tensile testing according to SRPS EN ISO 6892-1: 2020 standard concluded that the behavior of the joint as a whole depends on the properties of each individual part of the welded joint and their mutual influence. It was also concluded that the mutual influence is better if welding is performed with a lower amount of heat input, because then a lower degree of mixing of additional material with basic materials is achieved.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74885267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A different approach to b(an,bn)-hypermetric spaces b(an,bn)-超度量空间的另一种方法
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-35303
Nezhad Deghan, Nikola Mirkov, Vesna Todorčević, S. Radenović
Introduction/purpose: The aim of this paper is to present the concept of b(an,bn)-hypermetric spaces. Methods: Conventional theoretical methods of functional analysis. Results: This study presents the initial results on the topic of b(an,bn)-hypermetric spaces. In the first part, we generalize an n-dimensional (n ≥ 2) hypermetric distance over an arbitrary non-empty set X. The b(an,bn)-hyperdistance function is defined in any way we like, the only constraint being the simultaneous satisfaction of the three properties, viz, non-negativity and positive-definiteness, symmetry and (an, bn)-triangle inequality. In the second part, we discuss the concept of (an, bn)-completeness, with respect to this b(an,bn)-hypermetric, and the fixed point theorem which plays an important role in applied mathematics in a variety of fields. Conclusion: With proper generalisations, it is possible to formulate well-known results of classical metric spaces to the case of b(an,bn)-hypermetric spaces.
前言/目的:本文的目的是提出b(an,bn)-超度量空间的概念。方法:常规的功能分析理论方法。结果:本文给出了b(an,bn)-超度量空间的初步结果。在第一部分中,我们推广了任意非空集合x上的n维(n≥2)超距函数。b(an,bn)-超距函数可以任意定义,唯一的约束条件是同时满足三个性质,即非负性和正定性、对称性和(an,bn)-三角形不等式。在第二部分,我们讨论了关于b(an,bn)-超度量的(an,bn)-完备性的概念,以及在应用数学的各个领域中起重要作用的不动点定理。结论:通过适当的推广,可以将经典度量空间的众所周知的结果表述为b(an,bn)-超度量空间的情况。
{"title":"A different approach to b(an,bn)-hypermetric spaces","authors":"Nezhad Deghan, Nikola Mirkov, Vesna Todorčević, S. Radenović","doi":"10.5937/vojtehg70-35303","DOIUrl":"https://doi.org/10.5937/vojtehg70-35303","url":null,"abstract":"Introduction/purpose: The aim of this paper is to present the concept of b(an,bn)-hypermetric spaces. Methods: Conventional theoretical methods of functional analysis. Results: This study presents the initial results on the topic of b(an,bn)-hypermetric spaces. In the first part, we generalize an n-dimensional (n ≥ 2) hypermetric distance over an arbitrary non-empty set X. The b(an,bn)-hyperdistance function is defined in any way we like, the only constraint being the simultaneous satisfaction of the three properties, viz, non-negativity and positive-definiteness, symmetry and (an, bn)-triangle inequality. In the second part, we discuss the concept of (an, bn)-completeness, with respect to this b(an,bn)-hypermetric, and the fixed point theorem which plays an important role in applied mathematics in a variety of fields. Conclusion: With proper generalisations, it is possible to formulate well-known results of classical metric spaces to the case of b(an,bn)-hypermetric spaces.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80155604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vojnotehnicki Glasnik
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1