首页 > 最新文献

Vojnotehnicki Glasnik最新文献

英文 中文
DIBR - Fuzzy MARCOS model for selecting a location for a heavy mechanized bridge 重型机械化桥梁选址的模糊MARCOS模型
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-35944
Duško Tešić, Darko Božanić, D. Pamučar, Jamalud Din
Introduction/purpose: The paper presents the DIBR-FMARCOS model of multi-criteria decision-making for defining a location for placing a bridge over an obstacle using a heavy mechanized bridge (TMM-3). After the application of the proposed model, the sensitivity analysis of the output results was performed and it was concluded that the model is stable, i.e. that the model gives consistent results and that its application is possible in real situations. Methods: The DIBR method was used to determine the weight coefficients of the criteria, while the ranking of alternatives was performed by the FuzzyMARCOS method. Results: The application of this model has led to the selection of the location for placing a bridge from the TMM-3 set, based on the defined criteria. After applying the proposed model, the sensitivity analysis of the output results was performed and the consistency of the output results of the method was proven. Conclusion: Finally, it was concluded that the proposed model can be applied in practice, because it gives stable output results. It was also concluded that the DIBR method facilitates the process of obtaining the weight coefficients of the criteria, and the FMARCOS method copes well with unclear and inaccurate input data and has good stability. This model can be further improved by more detailed operationalization of the criteria, as well as by the use of other different methods for determining the weights of the criteria and ranking.
介绍/目的:本文提出了一种多准则决策的DIBR-FMARCOS模型,用于确定使用重型机械化桥梁(TMM-3)在障碍物上架设桥梁的位置。应用所提出的模型后,对输出结果进行敏感性分析,得出模型是稳定的,即模型给出的结果一致,可以应用于实际情况。方法:采用DIBR法确定各指标的权重系数,采用FuzzyMARCOS法对备选方案进行排序。结果:应用该模型,根据定义的标准,从TMM-3组中选择放置桥架的位置。应用该模型对输出结果进行敏感性分析,验证了该方法输出结果的一致性。结论:最后得出结论,该模型可以在实际中应用,因为它的输出结果稳定。结果表明,DIBR方法简化了准则权重系数的获取过程,FMARCOS方法能较好地应对输入数据不清晰、不准确的情况,且具有较好的稳定性。通过对标准进行更详细的操作化,以及使用其他不同的方法来确定标准的权重和排名,可以进一步改进该模型。
{"title":"DIBR - Fuzzy MARCOS model for selecting a location for a heavy mechanized bridge","authors":"Duško Tešić, Darko Božanić, D. Pamučar, Jamalud Din","doi":"10.5937/vojtehg70-35944","DOIUrl":"https://doi.org/10.5937/vojtehg70-35944","url":null,"abstract":"Introduction/purpose: The paper presents the DIBR-FMARCOS model of multi-criteria decision-making for defining a location for placing a bridge over an obstacle using a heavy mechanized bridge (TMM-3). After the application of the proposed model, the sensitivity analysis of the output results was performed and it was concluded that the model is stable, i.e. that the model gives consistent results and that its application is possible in real situations. Methods: The DIBR method was used to determine the weight coefficients of the criteria, while the ranking of alternatives was performed by the FuzzyMARCOS method. Results: The application of this model has led to the selection of the location for placing a bridge from the TMM-3 set, based on the defined criteria. After applying the proposed model, the sensitivity analysis of the output results was performed and the consistency of the output results of the method was proven. Conclusion: Finally, it was concluded that the proposed model can be applied in practice, because it gives stable output results. It was also concluded that the DIBR method facilitates the process of obtaining the weight coefficients of the criteria, and the FMARCOS method copes well with unclear and inaccurate input data and has good stability. This model can be further improved by more detailed operationalization of the criteria, as well as by the use of other different methods for determining the weights of the criteria and ranking.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"191 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86660506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Static absorber modelling 静态吸收器模型
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-34776
Milica Đekić
Introduction/purpose: A static absorber is capable of neutralizing any signal either in the physical or virtual domain and its analysis will be presented in this paper. Methods: The approach used here includes purely scientific thoughts as well as a model with its explanations evaluated step by step applying highly sophisticated computer tools for design and simulation. No empirical results will be attached, only claims with their evidence. Results: The crucial outcome of this research is a completely new approach to binary systems that are now observed as a set of real numbers. Conclusion: The purpose of this research is to introduce something brand-new that can be used in cyber industry while a dynamic variation of the absorber is still under development.
介绍/用途:静态吸收器能够中和物理或虚拟域的任何信号,本文将介绍其分析。方法:这里使用的方法包括纯粹的科学思想,以及一个模型,其解释逐步评估应用高度复杂的计算机工具进行设计和模拟。不附带任何实证结果,只附带带有证据的主张。结果:这项研究的关键成果是一个全新的方法来二进制系统,现在被观察为一组实数。结论:本研究的目的是在吸波器的动态变化仍处于开发阶段的情况下,引入一种全新的可用于网络工业的吸波器。
{"title":"Static absorber modelling","authors":"Milica Đekić","doi":"10.5937/vojtehg70-34776","DOIUrl":"https://doi.org/10.5937/vojtehg70-34776","url":null,"abstract":"Introduction/purpose: A static absorber is capable of neutralizing any signal either in the physical or virtual domain and its analysis will be presented in this paper. Methods: The approach used here includes purely scientific thoughts as well as a model with its explanations evaluated step by step applying highly sophisticated computer tools for design and simulation. No empirical results will be attached, only claims with their evidence. Results: The crucial outcome of this research is a completely new approach to binary systems that are now observed as a set of real numbers. Conclusion: The purpose of this research is to introduce something brand-new that can be used in cyber industry while a dynamic variation of the absorber is still under development.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79429067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Property P in modular metric spaces 模度量空间中P的性质
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-36958
L. Paunović, Parveen Kumar, Savita Malik, M. Kumar
Introduction/purpose: The aim of this paper is to present the concept of the generalized ∅-weak contractive condition involving various combinations of d(x,y) in modular metric spaces. Methods: Conventional theoretical methods of functional analysis. Results: This study presents the result of (Murthy & Vara Prasad, 2013) for a single-valued mapping satisfying a generalized ∅ -weak contractive condition involving various combinations of d(x,y). It is generalized in the setting of modular metric spaces, and then it is proved that this single-valued map satisfies the property P. In the end, an example is given in support of the result. Conclusion: With proper generalisations, it is possible to formulate well-known results of classical metric spaces to the case of modular metric spaces.
介绍/目的:本文的目的是给出模度量空间中d(x,y)的各种组合的广义∅-弱压缩条件的概念。方法:常规的功能分析理论方法。结果:本文给出了(Murthy & Vara Prasad, 2013)对于满足广义∅-弱压缩条件的单值映射,涉及d(x,y)的各种组合的结果。将其推广到模度量空间的集合中,证明了该单值映射满足性质p,最后给出了一个例子来支持这一结果。结论:通过适当的推广,可以将经典度量空间的众所周知的结果公式化到模度量空间的情况。
{"title":"Property P in modular metric spaces","authors":"L. Paunović, Parveen Kumar, Savita Malik, M. Kumar","doi":"10.5937/vojtehg70-36958","DOIUrl":"https://doi.org/10.5937/vojtehg70-36958","url":null,"abstract":"Introduction/purpose: The aim of this paper is to present the concept of the generalized ∅-weak contractive condition involving various combinations of d(x,y) in modular metric spaces. Methods: Conventional theoretical methods of functional analysis. Results: This study presents the result of (Murthy & Vara Prasad, 2013) for a single-valued mapping satisfying a generalized ∅ -weak contractive condition involving various combinations of d(x,y). It is generalized in the setting of modular metric spaces, and then it is proved that this single-valued map satisfies the property P. In the end, an example is given in support of the result. Conclusion: With proper generalisations, it is possible to formulate well-known results of classical metric spaces to the case of modular metric spaces.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"94 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83905046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
70 years of the Military Technical Courier 70年的军事技术信使
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-40505
Nebojša Gaćeša
This Editorial marks the jubilee which the scientific journal Military Technical Courier celebrates in 2022-70 years of regular and continuous publication. On this occasion, the Editorial Office expresses gratitude to institutions and individuals who have contributed most to the progress and success of the Journal.
这篇社论标志着科学杂志《军事技术信使》将在2022年迎来70周年纪念——70年的定期和连续出版。在此,编辑部向对《华尔街日报》的进步和成功做出最大贡献的机构和个人表示感谢。
{"title":"70 years of the Military Technical Courier","authors":"Nebojša Gaćeša","doi":"10.5937/vojtehg70-40505","DOIUrl":"https://doi.org/10.5937/vojtehg70-40505","url":null,"abstract":"This Editorial marks the jubilee which the scientific journal Military Technical Courier celebrates in 2022-70 years of regular and continuous publication. On this occasion, the Editorial Office expresses gratitude to institutions and individuals who have contributed most to the progress and success of the Journal.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89456605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of probability-based multi-objective optimization in material engineering 基于概率的多目标优化在材料工程中的应用
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-35366
M. Zheng
Introduction/purpose: Althought many methods have been proposed to deal with the problem of material selection, there are inherent defects of additive algorithms and subjective factors in such algorithms. Recently, a probability-based multi-objective optimization was developed to solve the inherent shortcomings of the previous methods, which introduces a novel concept of preferable probability to reflect the preference degree of the candidate in the optimization. In this paper, the new method is utilized to conduct an optimal scheme of the switching material of the RF-MEMS shunt capacitive switch, the sintering parameters of natural hydroxyapatite and the optimal design of the connecting claw jig. Methods: All performance utility indicators of candidate materials are divided into two groups, i.e., beneficial or unbeneficial types for the selection process; each performance utility indicator contributes quantitatively to a partial preferable probability and the product of all partial preferable probabilities makes the total preferable probability of a candidate, which transfers a multi-objective optimization problem into a single-objective optimization one and represents a uniquely decisive index in the competitive selection process. Results: Cu is the appropriate material in the material selection for RF - MEMS shunt capacitive switches; the optimal sintering parameters of natural hydroxyapatite are at 1100°C and 0 compaction pressure; and the optimal scheme is scheme No 1 for the optimal design of a connecting claw jig. Conclusion: The probability-based multi-objective optimization can be easily used to deal with an optimal problem objectively in material engineering.
前言/目的:虽然已经提出了许多方法来处理材料选择问题,但这些算法存在固有的加性算法缺陷和主观因素。近年来,一种基于概率的多目标优化方法解决了以往方法的固有缺陷,该方法引入了优选概率的概念来反映优化过程中候选对象的偏好程度。本文利用该方法对RF-MEMS并联电容开关的开关材料、天然羟基磷灰石的烧结参数和连接爪夹具进行了优化设计。方法:将候选材料的所有性能效用指标分为有利型和不利型两组进行选择;每个性能效用指标定量地贡献了一个部分优选概率,所有部分优选概率的乘积即为候选产品的总优选概率,将多目标优化问题转化为单目标优化问题,是竞争选择过程中唯一的决定性指标。结果:Cu是RF - MEMS并联电容开关材料选择的理想材料;天然羟基磷灰石的最佳烧结温度为1100℃,压实压力为0;连接爪夹具优化设计的最优方案为方案1。结论:基于概率的多目标优化方法可方便客观地处理材料工程中的优化问题。
{"title":"Application of probability-based multi-objective optimization in material engineering","authors":"M. Zheng","doi":"10.5937/vojtehg70-35366","DOIUrl":"https://doi.org/10.5937/vojtehg70-35366","url":null,"abstract":"Introduction/purpose: Althought many methods have been proposed to deal with the problem of material selection, there are inherent defects of additive algorithms and subjective factors in such algorithms. Recently, a probability-based multi-objective optimization was developed to solve the inherent shortcomings of the previous methods, which introduces a novel concept of preferable probability to reflect the preference degree of the candidate in the optimization. In this paper, the new method is utilized to conduct an optimal scheme of the switching material of the RF-MEMS shunt capacitive switch, the sintering parameters of natural hydroxyapatite and the optimal design of the connecting claw jig. Methods: All performance utility indicators of candidate materials are divided into two groups, i.e., beneficial or unbeneficial types for the selection process; each performance utility indicator contributes quantitatively to a partial preferable probability and the product of all partial preferable probabilities makes the total preferable probability of a candidate, which transfers a multi-objective optimization problem into a single-objective optimization one and represents a uniquely decisive index in the competitive selection process. Results: Cu is the appropriate material in the material selection for RF - MEMS shunt capacitive switches; the optimal sintering parameters of natural hydroxyapatite are at 1100°C and 0 compaction pressure; and the optimal scheme is scheme No 1 for the optimal design of a connecting claw jig. Conclusion: The probability-based multi-objective optimization can be easily used to deal with an optimal problem objectively in material engineering.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91138507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes: An end-user perspective Cuckoo和Drakvuf沙盒的试点比较分析:最终用户视角
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-36196
S. Ilić, M. Gnjatović, Brankica Popović, N. Maček
Introduction/purpose: This paper reports on a pilot comparative analysis of the Cuckoo and Drakvuf sandboxes. These sandboxes are selected as the subjects of the analysis because of their popularity in the professional community and their complementary approaches to analyzing malware behavior. Methods: Both sandboxes were set up with basic configurations and confronted with the same set of malware samples. The evaluation was primarily conducted with respect to the question of to what extent a sandbox is helpful to the human analyst in malware analysis. Thus, only the information available in Web console reports was considered. Results: Drakvuf is expected to perform better when confronted with evasive malware and so-called "file-less" malware. Although still not mature in terms of integration, customization and tools, this sandbox is considered a second generation sandbox because of its agentless design. On the other hand, the Cuckoo sandbox creates a better overall experience: it is supported through good documentation and strong professional community, better integrated with various tools, support more virtualization, operating system and sample types, and generates more informative reports. Even with a smaller capacity to prevent evasive malware, its Python 2 agent script makes it more powerful than Drakvuf. Conclusion: To achieve the optimal open-source sandbox-based protection, it is recommended to apply both the Cuckoo and Drakvuf sandboxes. In circumstances of limited resources, applying the Cuckoo sandbox is preferable, especially if exposure to malware deploying evading techniques is not frequently expected.
简介/目的:本文报道了杜鹃沙盒和德拉库夫沙盒的试点对比分析。之所以选择这些沙箱作为分析的主题,是因为它们在专业社区中很受欢迎,并且它们是分析恶意软件行为的补充方法。方法:两个沙箱设置基本配置,面对同一组恶意软件样本。评估主要是针对沙箱在多大程度上对恶意软件分析人员有帮助的问题进行的。因此,只考虑Web控制台报告中可用的信息。结果:Drakvuf有望在面对规避性恶意软件和所谓的“无文件”恶意软件时表现更好。尽管在集成、定制和工具方面还不成熟,但由于其无代理设计,该沙盒被认为是第二代沙盒。另一方面,Cuckoo沙盒创造了更好的整体体验:它通过良好的文档和强大的专业社区提供支持,与各种工具更好地集成,支持更多的虚拟化、操作系统和示例类型,并生成更多信息丰富的报告。即使防范规避性恶意软件的能力较小,其Python 2代理脚本也使其比Drakvuf更强大。结论:为达到最佳的开源沙盒保护效果,建议同时使用布谷鸟沙盒和Drakvuf沙盒。在资源有限的情况下,应用布谷鸟沙盒是可取的,特别是如果不经常暴露于部署规避技术的恶意软件。
{"title":"A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes: An end-user perspective","authors":"S. Ilić, M. Gnjatović, Brankica Popović, N. Maček","doi":"10.5937/vojtehg70-36196","DOIUrl":"https://doi.org/10.5937/vojtehg70-36196","url":null,"abstract":"Introduction/purpose: This paper reports on a pilot comparative analysis of the Cuckoo and Drakvuf sandboxes. These sandboxes are selected as the subjects of the analysis because of their popularity in the professional community and their complementary approaches to analyzing malware behavior. Methods: Both sandboxes were set up with basic configurations and confronted with the same set of malware samples. The evaluation was primarily conducted with respect to the question of to what extent a sandbox is helpful to the human analyst in malware analysis. Thus, only the information available in Web console reports was considered. Results: Drakvuf is expected to perform better when confronted with evasive malware and so-called \"file-less\" malware. Although still not mature in terms of integration, customization and tools, this sandbox is considered a second generation sandbox because of its agentless design. On the other hand, the Cuckoo sandbox creates a better overall experience: it is supported through good documentation and strong professional community, better integrated with various tools, support more virtualization, operating system and sample types, and generates more informative reports. Even with a smaller capacity to prevent evasive malware, its Python 2 agent script makes it more powerful than Drakvuf. Conclusion: To achieve the optimal open-source sandbox-based protection, it is recommended to apply both the Cuckoo and Drakvuf sandboxes. In circumstances of limited resources, applying the Cuckoo sandbox is preferable, especially if exposure to malware deploying evading techniques is not frequently expected.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82718622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Certain integrals involving generalized Mittag-Leffler type functions 涉及广义Mittag-Leffler型函数的某些积分
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-40296
Sirazul Haq, M. Aphane, Mohammad Khan, N. Fabiano
Introduction/purpose: Certain integrals involving the generalized Mittag-Leffler function with different types of polynomials are established. Methods: The properties of the generalized Mittag-Leffler function are used in conjunction with different kinds of polynomials such as Jacobi, Legendre, and Hermite in order to evaluate their integrals. Results: Some integral formulae involving the Legendre function, the Bessel Maitland function and the generalized hypergeometric functions are derived. Conclusions: The results obtained here are general in nature and could be useful to establish further integral formulae involving other kinds of polynomials.
介绍/目的:建立了涉及不同类型多项式的广义Mittag-Leffler函数的若干积分。方法:利用广义Mittag-Leffler函数的性质,结合Jacobi、Legendre、Hermite等不同类型的多项式,对其积分进行求值。结果:导出了一些涉及Legendre函数、Bessel Maitland函数和广义超几何函数的积分公式。结论:所得结果具有通用性,可用于进一步建立涉及其他多项式的积分公式。
{"title":"Certain integrals involving generalized Mittag-Leffler type functions","authors":"Sirazul Haq, M. Aphane, Mohammad Khan, N. Fabiano","doi":"10.5937/vojtehg70-40296","DOIUrl":"https://doi.org/10.5937/vojtehg70-40296","url":null,"abstract":"Introduction/purpose: Certain integrals involving the generalized Mittag-Leffler function with different types of polynomials are established. Methods: The properties of the generalized Mittag-Leffler function are used in conjunction with different kinds of polynomials such as Jacobi, Legendre, and Hermite in order to evaluate their integrals. Results: Some integral formulae involving the Legendre function, the Bessel Maitland function and the generalized hypergeometric functions are derived. Conclusions: The results obtained here are general in nature and could be useful to establish further integral formulae involving other kinds of polynomials.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88303385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High speed target tracking 371 radar system based on the use of BPSK signal and digital Doppler shift compensation 基于BPSK信号和数字多普勒频移补偿的高速目标跟踪371雷达系统
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-36589
Z. Golubičić, S. Simic, A. Zejak, B. Reljić, Svetislav Marić
Introduction/purpose: This paper presents a model of a high speed target radar tracking system that is much simpler than the existing ones. The Doppler shift is compensated before signal compression, simultaneously with the modification of the clock signal in the compression filter. This is possible thanks to the development of FPGA technology. The most important for this application are very fast clock control units which enable operation with different frequency references up to 1 GHz with an accuracy far below 1 Hz. Methods: In this paper, the methodology of mathematical modeling and simulation is used. Results: The results of the analysis of the most important effects in radars caused by high-speed targets are presented and discussed - target migration through resolution cells and compression filter response distortion due to high target acceleration. Conclusion: Thanks to flexible RF and signal processing hardware, complex radar processing procedures are not required. The sensitivity of the BPSK signal to the Doppler shift (which is usually considered a disadvantage) can be used to reject targets at a slightly different rate. This system can be used in space debris tracking, airspace target tracking, car driving, etc.
介绍/目的:本文提出了一种比现有的高速目标雷达跟踪系统简单得多的模型。在信号压缩前对多普勒频移进行补偿,同时对压缩滤波器中的时钟信号进行修改。由于FPGA技术的发展,这成为可能。对于这个应用来说,最重要的是非常快的时钟控制单元,它可以在高达1 GHz的不同频率参考下运行,精度远低于1 Hz。方法:本文采用数学建模和仿真的方法。结果:给出并讨论了高速目标对雷达产生的最重要影响——目标通过分辨单元的偏移和高目标加速度引起的压缩滤波器响应失真。结论:由于灵活的射频和信号处理硬件,不需要复杂的雷达处理程序。BPSK信号对多普勒频移的灵敏度(这通常被认为是一个缺点)可以用来以稍微不同的速率拒绝目标。该系统可用于空间碎片跟踪、空域目标跟踪、汽车驾驶等。
{"title":"High speed target tracking 371 radar system based on the use of BPSK signal and digital Doppler shift compensation","authors":"Z. Golubičić, S. Simic, A. Zejak, B. Reljić, Svetislav Marić","doi":"10.5937/vojtehg70-36589","DOIUrl":"https://doi.org/10.5937/vojtehg70-36589","url":null,"abstract":"Introduction/purpose: This paper presents a model of a high speed target radar tracking system that is much simpler than the existing ones. The Doppler shift is compensated before signal compression, simultaneously with the modification of the clock signal in the compression filter. This is possible thanks to the development of FPGA technology. The most important for this application are very fast clock control units which enable operation with different frequency references up to 1 GHz with an accuracy far below 1 Hz. Methods: In this paper, the methodology of mathematical modeling and simulation is used. Results: The results of the analysis of the most important effects in radars caused by high-speed targets are presented and discussed - target migration through resolution cells and compression filter response distortion due to high target acceleration. Conclusion: Thanks to flexible RF and signal processing hardware, complex radar processing procedures are not required. The sensitivity of the BPSK signal to the Doppler shift (which is usually considered a disadvantage) can be used to reject targets at a slightly different rate. This system can be used in space debris tracking, airspace target tracking, car driving, etc.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"2016 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73564218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determination of an efficient power equipment oil through a multi-criteria decision making analysis 通过多准则决策分析确定动力设备的高效油
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-36024
J. Abifarin, J. Ofodu
Introduction/purpose: Several studies in the area of the development of nanofluids for power equipment have left a gap unfilled as to how to determine the best oil among the produced oils for power equipment application. Therefore, this study presents a multi-criterial decision making analysis to determine the best oil for power equipment. Methods: The Grey relational analysis (GRA) and the Probability based multi-objective optimization techniques were employed as the multi-criterial decision making analytical tools for the optimization. Dielectric strength, dielectric loss, viscosity, and flash point were analyzed as multiple performance characteristics of different oils, after which different oil candidates were ranked based on their performance. Results: Interestingly, the GRA and the Probability based multi-objective optimization techniques revealed that Jatropha oil + Neem nanofluid is the best oil candidate for power equipment and it is better than conventional mineral oil. The Probability based multi-objective optimization technique places Jatropha nanofluid over mineral oil, but not for the GRA technique. Also, mineral oil and ordinary Jatropha nanofluids are at a competitive level. Meaning, if Jatropha nanofluid is further worked on, it can beat mineral oil. Conclusion: The two techniques substantially established that when Jatropha oil is mixed with Neem oil together with nanoparticles, there will be better power equipment performance compared to mineral oil. It can be recommended that a further analysis should be conducted in the area of direct application of Jatropha + Neem nanofluid for power equipment to understand the overall behavior of power equipment compared to the conventional mineral oil
前言/目的:在开发用于电力设备的纳米流体领域进行的几项研究留下了一个空白,即如何在已生产的油中确定用于电力设备的最佳油。因此,本研究提出了一种多准则决策分析方法,以确定电力设备的最佳油。方法:采用灰色关联分析(GRA)和基于概率的多目标优化技术作为多准则优化决策分析工具。将介电强度、介电损耗、粘度和闪点作为不同油品的多重性能特征进行分析,然后根据其性能对不同的候选油品进行排序。结果:基于GRA和基于概率的多目标优化技术表明,麻疯树油+楝树纳米流体是电力设备的最佳候选油,其性能优于常规矿物油。基于概率的多目标优化技术将麻疯树纳米流体置于矿物油之上,而不是用于GRA技术。此外,矿物油和普通麻风树纳米流体也处于竞争水平。也就是说,如果进一步研究麻疯树纳米液,它可以打败矿物油。结论:两种技术基本确定了麻疯树油与印楝油混合后,纳米颗粒比矿物油具有更好的动力设备性能。建议在麻疯树+楝树纳米流体直接应用于电力设备的领域进行进一步分析,以了解电力设备与常规矿物油相比的整体行为
{"title":"Determination of an efficient power equipment oil through a multi-criteria decision making analysis","authors":"J. Abifarin, J. Ofodu","doi":"10.5937/vojtehg70-36024","DOIUrl":"https://doi.org/10.5937/vojtehg70-36024","url":null,"abstract":"Introduction/purpose: Several studies in the area of the development of nanofluids for power equipment have left a gap unfilled as to how to determine the best oil among the produced oils for power equipment application. Therefore, this study presents a multi-criterial decision making analysis to determine the best oil for power equipment. Methods: The Grey relational analysis (GRA) and the Probability based multi-objective optimization techniques were employed as the multi-criterial decision making analytical tools for the optimization. Dielectric strength, dielectric loss, viscosity, and flash point were analyzed as multiple performance characteristics of different oils, after which different oil candidates were ranked based on their performance. Results: Interestingly, the GRA and the Probability based multi-objective optimization techniques revealed that Jatropha oil + Neem nanofluid is the best oil candidate for power equipment and it is better than conventional mineral oil. The Probability based multi-objective optimization technique places Jatropha nanofluid over mineral oil, but not for the GRA technique. Also, mineral oil and ordinary Jatropha nanofluids are at a competitive level. Meaning, if Jatropha nanofluid is further worked on, it can beat mineral oil. Conclusion: The two techniques substantially established that when Jatropha oil is mixed with Neem oil together with nanoparticles, there will be better power equipment performance compared to mineral oil. It can be recommended that a further analysis should be conducted in the area of direct application of Jatropha + Neem nanofluid for power equipment to understand the overall behavior of power equipment compared to the conventional mineral oil","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76127553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Protocols for symmetric secret key establishment: Modern approach 对称密钥建立协议:现代方法
Pub Date : 2022-01-01 DOI: 10.5937/vojtehg70-36607
Meiran Galis, T. Unkašević, Z. Banjac, M. Milosavljevic
Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems. Defining and implementing efficient protocols for symmetric cryptographic keys establishment in such circumstances is of great importance in raising information security in cyberspace. Methods: Using the methods of Information Theory and Secure Multiparty Computation, protocols for direct establishment of cryptographic keys between communication parties have been defined. Results: The paper defines two new approaches to the problem of establishing cryptographic keys. The novelty in the protocol defined in the security model based on information theory is based on the source of common randomness, which in this case is the EEG signal of each subject participating in the communication system. Experimental results show that the amount of information leaking to the attacker is close to zero. A novelty in the second case, which provides security with keys at the level of computer security by applying Secure Multiparty Computation, is in the new application field, namely generation and distribution of symmetric cryptographic keys. It is characteristic of both approaches that within the framework of formal theories, it is possible to draw conclusions about their security characteristics in a formal way. Conclusions: The paper describes two new approaches for establishing cryptographic keys in symmetric cryptographic systems with experimental results. The significance of the proposed solutions lies in the fact that they enable the establishment of secure communication between communication parties from end to end, avoiding the influence of a trusted third party. In that way, the achieved communication level security significantly increases in relation to classical cryptographic systems.
简介/目的:通信系统中密码密钥的有效分配问题从一开始就存在,并且随着大众通信系统的出现而得到特别强调。在这种情况下,定义和实现有效的对称密钥建立协议,对于提高网络空间的信息安全具有重要意义。方法:利用信息论和安全多方计算的方法,定义通信各方之间直接建立密钥的协议。结果:本文定义了两种新的解决密钥建立问题的方法。基于信息论的安全模型所定义的协议的新颖性是基于共同随机性的来源,即参与通信系统的每个被试的脑电图信号。实验结果表明,泄露给攻击者的信息量接近于零。第二种情况的新颖之处在于新的应用领域,即对称加密密钥的生成和分发,它通过应用安全多方计算在计算机安全层面上提供密钥的安全性。这两种方法的特点是,在形式化理论的框架内,可以以形式化的方式得出关于它们的安全特征的结论。结论:本文给出了在对称密码系统中建立密钥的两种新方法,并给出了实验结果。所提出的解决方案的意义在于能够在通信双方之间建立端到端的安全通信,避免了可信第三方的影响。通过这种方式,所实现的通信级安全性相对于传统密码系统有了显著的提高。
{"title":"Protocols for symmetric secret key establishment: Modern approach","authors":"Meiran Galis, T. Unkašević, Z. Banjac, M. Milosavljevic","doi":"10.5937/vojtehg70-36607","DOIUrl":"https://doi.org/10.5937/vojtehg70-36607","url":null,"abstract":"Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems. Defining and implementing efficient protocols for symmetric cryptographic keys establishment in such circumstances is of great importance in raising information security in cyberspace. Methods: Using the methods of Information Theory and Secure Multiparty Computation, protocols for direct establishment of cryptographic keys between communication parties have been defined. Results: The paper defines two new approaches to the problem of establishing cryptographic keys. The novelty in the protocol defined in the security model based on information theory is based on the source of common randomness, which in this case is the EEG signal of each subject participating in the communication system. Experimental results show that the amount of information leaking to the attacker is close to zero. A novelty in the second case, which provides security with keys at the level of computer security by applying Secure Multiparty Computation, is in the new application field, namely generation and distribution of symmetric cryptographic keys. It is characteristic of both approaches that within the framework of formal theories, it is possible to draw conclusions about their security characteristics in a formal way. Conclusions: The paper describes two new approaches for establishing cryptographic keys in symmetric cryptographic systems with experimental results. The significance of the proposed solutions lies in the fact that they enable the establishment of secure communication between communication parties from end to end, avoiding the influence of a trusted third party. In that way, the achieved communication level security significantly increases in relation to classical cryptographic systems.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77363022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vojnotehnicki Glasnik
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1