首页 > 最新文献

Vojnotehnicki Glasnik最新文献

英文 中文
Identification of soldiers and weapons in military armory based on comparison image processing and RFID tag 基于对比图像处理和RFID标签的军械库士兵与武器识别
Pub Date : 2021-01-01 DOI: 10.5937/VOJTEHG69-28114
Dušan Bogićević, Ivan Tot, Radomir Prodanović, Bojana Todorović
Dušan Lj. Bogićević, Ivan A. Tot, Radomir I. Prodanović, Bojan J. Todorović a Serbian Armed Forces, General Staff, Department for Telecommunication and Informatics (Ј-6), Center for C4 and IT support, Belgrade, Republic of Serbia; University of Niš, Faculty of Electronic Engineering, Niš, Republic of Serbia, e-mail: dusan.bogicevic@gmail.com, ORCID iD: http://orcid.org/0000-0002-4300-2490 b University of Defence in Belgrade, Military Academy, Department for information systems and telecommunication engineering, Belgrade, Republic of Serbia, e-mail: ivan.tot@va.mod.gov.rs, corresponding author, ORCID iD: http://orcid.org/0000-0002-5862-9042 c Serbian Armed Forces, General Staff, Department for Telecommunication and Informatics (Ј-6), Center for Applied Mathematics and Electronics, Belgrade, Republic of Serbia, e-mail: radomir.prodanovic@vs.rs, ORCID iD: http://orcid.org/0000-0002-2067-2758 d Serbian Armed Forces, General Staff, Military Police Detachment for Special Purposes "Kobre", Belgrade, Republic of Serbia, e-mail: todorovicbojan@yahoo.com, ORCID iD: https://orcid.org/0000-0002-7028-274X
杜šLj。Bogićević, Ivan a . Tot, Radomir I. prodanovic, Bojan J. todorovic a塞尔维亚武装部队,电信和信息部总参谋部(Ј-6),塞尔维亚共和国贝尔格莱德C4和IT支持中心;塞尔维亚共和国尼日什大学电子工程学院,e-mail: dusan.bogicevic@gmail.com, ORCID iD: http://orcid.org/0000-0002-4300-2490 b塞尔维亚共和国贝尔格莱德国防大学军事学院,信息系统和电信工程系,e-mail: ivan.tot@va.mod.gov.rs,通讯作者,ORCID iD:http://orcid.org/0000-0002-5862-9042 c塞尔维亚武装部队,电信和信息部总参谋部(Ј-6),塞尔维亚共和国贝尔格莱德应用数学和电子学中心,电子邮件:radomir.prodanovic@vs.rs, ORCID iD: http://orcid.org/0000-0002-2067-2758 d塞尔维亚武装部队,特殊目的“Kobre”宪兵分队总参谋部,电子邮件:todorovicbojan@yahoo.com, ORCID iD: https://orcid.org/0000-0002-7028-274X
{"title":"Identification of soldiers and weapons in military armory based on comparison image processing and RFID tag","authors":"Dušan Bogićević, Ivan Tot, Radomir Prodanović, Bojana Todorović","doi":"10.5937/VOJTEHG69-28114","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-28114","url":null,"abstract":"Dušan Lj. Bogićević, Ivan A. Tot, Radomir I. Prodanović, Bojan J. Todorović a Serbian Armed Forces, General Staff, Department for Telecommunication and Informatics (Ј-6), Center for C4 and IT support, Belgrade, Republic of Serbia; University of Niš, Faculty of Electronic Engineering, Niš, Republic of Serbia, e-mail: dusan.bogicevic@gmail.com, ORCID iD: http://orcid.org/0000-0002-4300-2490 b University of Defence in Belgrade, Military Academy, Department for information systems and telecommunication engineering, Belgrade, Republic of Serbia, e-mail: ivan.tot@va.mod.gov.rs, corresponding author, ORCID iD: http://orcid.org/0000-0002-5862-9042 c Serbian Armed Forces, General Staff, Department for Telecommunication and Informatics (Ј-6), Center for Applied Mathematics and Electronics, Belgrade, Republic of Serbia, e-mail: radomir.prodanovic@vs.rs, ORCID iD: http://orcid.org/0000-0002-2067-2758 d Serbian Armed Forces, General Staff, Military Police Detachment for Special Purposes \"Kobre\", Belgrade, Republic of Serbia, e-mail: todorovicbojan@yahoo.com, ORCID iD: https://orcid.org/0000-0002-7028-274X","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"69 1","pages":"179-195"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71187476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiple-criteria model for optimal Anti Tank Ground missile weapon system procurement 反坦克地面导弹武器系统采购优化多准则模型
Pub Date : 2021-01-01 DOI: 10.5937/vojtehg69-32117
D. Pamučar, Slobodan Dimitrijević
Introduction: Anti Tank Ground Missiles (ATGMs) are one of the most efficient weapon systems to counter armored and mechanized units. Procurement of these weapons is imperative for armed forces of any country. Adequate evaluation and choice of an efficient ATGM system is a very important factor which affects operational capabilities of armed forces. The purpose of this paper is to present that multi criteria methods can be a useful tool for optimal procurement of ATGMs for armed forces. Methods: The implementation of the TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) and the MABAC (Multi Attributive Border Approximation Area Comparison) multi criteria methods will be proposed for decision makers to solve the problem of ATGM procurement. In this paper, four models of ATGMs will be proposed as possible solutions. These ATGMs will be presented as alternatives A1, A2, A3 and A4. Results: The implementation of the methods in this paper has led to the conclusion that the alternative A2 has the highest value and therefore the best course of action for decision makers is to chose procurement of this model of ATGMs. Conclusion: The conclusion is that the mathematical models of multi-criteria decision making presented in this paper unequivocally point to the alternative with the best characteristics, thus presenting extremely useful tools for decision makers.
反坦克地面导弹(ATGMs)是对抗装甲和机械化部队最有效的武器系统之一。采购这些武器对任何国家的武装部队来说都是必不可少的。充分评估和选择有效的ATGM系统是影响部队作战能力的一个非常重要的因素。本文的目的是提出多准则方法可以成为武装部队最佳采购反坦克导弹的有用工具。方法:将TOPSIS (Order Preference Technique by Similarity by Ideal Solution)和MABAC (Multi - attribute Border Approximation Area Comparison)两种多准则方法应用于ATGM采购决策。本文将提出四种atgm模型作为可能的解决方案。这些atgm将作为备选方案A1、A2、A3和A4呈现。结果:本文方法的实施得出了替代方案A2具有最高价值的结论,因此决策者的最佳行动方案是选择采购该型号的atgm。结论:本文提出的多准则决策的数学模型明确指出了具有最佳特征的备选方案,从而为决策者提供了非常有用的工具。
{"title":"Multiple-criteria model for optimal Anti Tank Ground missile weapon system procurement","authors":"D. Pamučar, Slobodan Dimitrijević","doi":"10.5937/vojtehg69-32117","DOIUrl":"https://doi.org/10.5937/vojtehg69-32117","url":null,"abstract":"Introduction: Anti Tank Ground Missiles (ATGMs) are one of the most efficient weapon systems to counter armored and mechanized units. Procurement of these weapons is imperative for armed forces of any country. Adequate evaluation and choice of an efficient ATGM system is a very important factor which affects operational capabilities of armed forces. The purpose of this paper is to present that multi criteria methods can be a useful tool for optimal procurement of ATGMs for armed forces. Methods: The implementation of the TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) and the MABAC (Multi Attributive Border Approximation Area Comparison) multi criteria methods will be proposed for decision makers to solve the problem of ATGM procurement. In this paper, four models of ATGMs will be proposed as possible solutions. These ATGMs will be presented as alternatives A1, A2, A3 and A4. Results: The implementation of the methods in this paper has led to the conclusion that the alternative A2 has the highest value and therefore the best course of action for decision makers is to chose procurement of this model of ATGMs. Conclusion: The conclusion is that the mathematical models of multi-criteria decision making presented in this paper unequivocally point to the alternative with the best characteristics, thus presenting extremely useful tools for decision makers.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74105692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A new operation on soft sets: 791 extended symmetric difference of soft sets 软集上的一个新运算:791扩展软集对称差分
Pub Date : 2021-01-01 DOI: 10.5937/vojtehg69-33655
Nenad Stojanović
Introduction/purpose: Molodtsov introduced the concept of soft sets as a new mathematical tool for dealing with problems containing uncertainties. In the literature, different kinds of operations of soft sets are defined and used in theory and applications. Methods: This study is based on the paper "A New Operation on Soft Sets: Extended Difference of Soft Sets" by Sezgin, Ahmad and Mehmood [Journal of New Theory 27 (2019) 33-42]. Results: In this paper, we define a new operation on soft sets, called extended symmetric difference and investigate its relationship between extended symmetric difference and restricted symmetric difference and some other operations of soft sets. Conclusion: The author believes that the obtained results represent a significant improvement of many known results in the existing literature.
简介/目的:Molodtsov引入了软集的概念,作为处理包含不确定性问题的一种新的数学工具。在文献中,定义了不同类型的软集运算,并将其应用于理论和应用中。方法:本研究基于Sezgin, Ahmad和Mehmood的论文“A New Operation on Soft Sets: Extended Difference of Soft Sets”[Journal of New Theory] 27(2019) 33-42。结果:本文在软集上定义了一种新的操作,称为扩展对称差分,并研究了它与扩展对称差分和限制对称差分之间的关系,以及其他一些软集操作。结论:作者认为所获得的结果是对现有文献中许多已知结果的显著改进。
{"title":"A new operation on soft sets: 791 extended symmetric difference of soft sets","authors":"Nenad Stojanović","doi":"10.5937/vojtehg69-33655","DOIUrl":"https://doi.org/10.5937/vojtehg69-33655","url":null,"abstract":"Introduction/purpose: Molodtsov introduced the concept of soft sets as a new mathematical tool for dealing with problems containing uncertainties. In the literature, different kinds of operations of soft sets are defined and used in theory and applications. Methods: This study is based on the paper \"A New Operation on Soft Sets: Extended Difference of Soft Sets\" by Sezgin, Ahmad and Mehmood [Journal of New Theory 27 (2019) 33-42]. Results: In this paper, we define a new operation on soft sets, called extended symmetric difference and investigate its relationship between extended symmetric difference and restricted symmetric difference and some other operations of soft sets. Conclusion: The author believes that the obtained results represent a significant improvement of many known results in the existing literature.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86169514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new version of the results of UN-hypermetric spaces 联合国超度量空间结果的新版本
Pub Date : 2021-01-01 DOI: 10.5937/vojtehg69-32197
Nezhad Dehghan, A. Forough, Nikola Mirkov, S. Radenović
Introduction/purpose: The aim of this paper is to present the concept of a universal hypermetric space. An n-dimensional (n ≥ 2) hypermetric distance over an arbitrary non-empty set X is generalized. This hypermetric distance measures how separated all n points of the space are. The paper discusses the concept of completeness, with respect to this hypermetric as well as the fixed point theorem which play an important role in applied mathematics in a variety of fields. Methods: Standard proof based theoretical methods of the functional analysis are employed. Results: The concept of a universal hypermetric space is presented. The universal properties of hypermetric spaces are described. Conclusion: This new version of the results for UN-hypermetric spaces may have applications in various disciplines where the degree of clustering is sought for.
前言/目的:本文的目的是提出一个全称超度量空间的概念。推广了任意非空集X上的n维(n≥2)超度量距离。这个超度量距离测量了空间中所有n个点之间的距离。本文讨论了关于这个超度量的完备性的概念,以及在应用数学的各个领域中起重要作用的不动点定理。方法:采用基于标准证明的功能分析理论方法。结果:提出了泛超度量空间的概念。描述了超度量空间的全称性质。结论:联合国超度量空间的这个新版本的结果可能在寻求聚类程度的各种学科中有应用。
{"title":"A new version of the results of UN-hypermetric spaces","authors":"Nezhad Dehghan, A. Forough, Nikola Mirkov, S. Radenović","doi":"10.5937/vojtehg69-32197","DOIUrl":"https://doi.org/10.5937/vojtehg69-32197","url":null,"abstract":"Introduction/purpose: The aim of this paper is to present the concept of a universal hypermetric space. An n-dimensional (n ≥ 2) hypermetric distance over an arbitrary non-empty set X is generalized. This hypermetric distance measures how separated all n points of the space are. The paper discusses the concept of completeness, with respect to this hypermetric as well as the fixed point theorem which play an important role in applied mathematics in a variety of fields. Methods: Standard proof based theoretical methods of the functional analysis are employed. Results: The concept of a universal hypermetric space is presented. The universal properties of hypermetric spaces are described. Conclusion: This new version of the results for UN-hypermetric spaces may have applications in various disciplines where the degree of clustering is sought for.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"11 5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87299031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Biometric standards and methods 生物识别标准和方法
Pub Date : 2021-01-01 DOI: 10.5937/vojtehg69-32296
Ivan Tot, J. Bajčetić, B. Jovanovic, Mladen Trikoš, Dušan Bogićević, T. Gajić
Introduction/purpose: Nowadays, user identification systems play a very important role in modern society. Complex security requirements have led experts to explore ways in which biometric data can be used to identify user identities. This paper presents an overview of biometric standards and methods which can be used to identify users in biometric systems, and therefore to protect information and communication systems. Methods: This paper deals with the problem of standardization in the field of biometrics. The first part of the paper presents concrete examples of the most widely used biometric standards. The second part of the paper gives an overview of the most used biometric methods. Results: The obtained results show that the development of biometric systems and biometric sensors contributes to better protection of identity from misuse, because biometric technologies have great potential for improving the security and accuracy of system operation. Biometric systems improve the security of users and also provide much greater precision in establishing identity. Conclusion: The development of biometric standards should focus on their interconnectivity, as well as on increasing connectivity with other IT standards.
简介/用途:如今,用户身份识别系统在现代社会中扮演着非常重要的角色。复杂的安全需求促使专家们探索利用生物特征数据来识别用户身份的方法。本文概述了生物识别标准和方法,这些标准和方法可用于识别生物识别系统中的用户,从而保护信息和通信系统。方法:探讨生物识别领域的标准化问题。论文的第一部分给出了应用最广泛的生物识别标准的具体例子。论文的第二部分概述了最常用的生物识别方法。结果:获得的结果表明,生物识别系统和生物识别传感器的发展有助于更好地保护身份免遭滥用,因为生物识别技术在提高系统运行的安全性和准确性方面具有巨大的潜力。生物识别系统提高了用户的安全性,并在确定身份方面提供了更高的精度。结论:生物识别标准的发展应注重其互联性,并加强与其他IT标准的互联性。
{"title":"Biometric standards and methods","authors":"Ivan Tot, J. Bajčetić, B. Jovanovic, Mladen Trikoš, Dušan Bogićević, T. Gajić","doi":"10.5937/vojtehg69-32296","DOIUrl":"https://doi.org/10.5937/vojtehg69-32296","url":null,"abstract":"Introduction/purpose: Nowadays, user identification systems play a very important role in modern society. Complex security requirements have led experts to explore ways in which biometric data can be used to identify user identities. This paper presents an overview of biometric standards and methods which can be used to identify users in biometric systems, and therefore to protect information and communication systems. Methods: This paper deals with the problem of standardization in the field of biometrics. The first part of the paper presents concrete examples of the most widely used biometric standards. The second part of the paper gives an overview of the most used biometric methods. Results: The obtained results show that the development of biometric systems and biometric sensors contributes to better protection of identity from misuse, because biometric technologies have great potential for improving the security and accuracy of system operation. Biometric systems improve the security of users and also provide much greater precision in establishing identity. Conclusion: The development of biometric standards should focus on their interconnectivity, as well as on increasing connectivity with other IT standards.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"s3-38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90827564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
25 years of the TETRA standard and technology for contemporary digital trunking systems of professional mobile radio communications 25年的TETRA标准和技术适用于当代专业移动无线电通信的数字集群系统
Pub Date : 2021-01-01 DOI: 10.5937/VOJTEHG69-29340
Slađan Svrzić
Introduction/purpose: For the construction of functional mobile radio communication systems today, the trunking systems of digital mobile radio communications are almost exclusively used, the main representative of which is the system with the application of TETRA standards. This article describes the beginnings and historical development of this standard, with the activities of ETSI and TETRA MoU in the fight for the availability and harmonization of the frequency spectrum. Methods: A description of relevant issues of the origin and development of the TETRA 1 standard is given as well as the analysis of the characteristic moments of the innovated TETRA 2 standard. Results: This article describes the beginnings and historical development of this standard, with the activities of ETSI and TETRA MoU in the fight for the availability and harmonization of the frequency spectrum. It also systematize the use of the key TETRA systems in the world and shows its share in the world market by sectors, emphasizing the dilemma of its further development at the crossroads after 25 years of existence. Also, a basic overview of the TETRA 1 standard is given while the basic elements and the principle of its application are described. The innovated TETRA 2 standard and the improvements achieved in the way of data transmission are described in more detail; the process of interoperability certification and, in connection with that, the entry of TETRA into the North American market is emphasized. The parameters selected for advanced data transfer according to the TETRA 2-TEDS standard are presented and analyzed, together with an overview of some limitations during practical application. Conclusion: In the conclusion, the current moment of TETRA is analyzed with a focus on its future after 25 years of development, emohasizing a possibility of modernizing and improving the TETRA network of the Ministry of the Interior of Serbia for the needs of the MoD and the Serbian Armed Forces.
简介/用途:在构建功能性移动无线电通信系统的今天,几乎都是采用数字移动无线电通信的集群系统,其中以应用TETRA标准的系统为主要代表。本文描述了该标准的起源和历史发展,以及ETSI和TETRA MoU在争取频谱可用性和协调方面的活动。方法:阐述了TETRA 1标准的起源和发展的有关问题,分析了创新后的TETRA 2标准的特征矩。结果:本文描述了该标准的起源和历史发展,以及ETSI和TETRA MoU在争取频谱可用性和协调方面的活动。它还将世界主要TETRA系统的使用情况系统化,并按部门显示其在世界市场上的份额,强调其在成立25年后处于十字路口的进一步发展的困境。此外,对TETRA 1标准进行了基本概述,同时描述了其基本元素和应用原理。详细介绍了创新的TETRA 2标准及其在数据传输方式上的改进;互操作性认证的过程以及与此有关的TETRA进入北美市场的问题都得到了强调。介绍并分析了根据TETRA 2-TEDS标准选择的高级数据传输参数,并概述了实际应用中的一些限制。结论:在结论中,分析了TETRA的现状,重点分析了经过25年发展后的未来,强调了塞尔维亚内政部TETRA网络现代化和改善的可能性,以满足国防部和塞尔维亚武装部队的需求。
{"title":"25 years of the TETRA standard and technology for contemporary digital trunking systems of professional mobile radio communications","authors":"Slađan Svrzić","doi":"10.5937/VOJTEHG69-29340","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-29340","url":null,"abstract":"Introduction/purpose: For the construction of functional mobile radio communication systems today, the trunking systems of digital mobile radio communications are almost exclusively used, the main representative of which is the system with the application of TETRA standards. This article describes the beginnings and historical development of this standard, with the activities of ETSI and TETRA MoU in the fight for the availability and harmonization of the frequency spectrum. Methods: A description of relevant issues of the origin and development of the TETRA 1 standard is given as well as the analysis of the characteristic moments of the innovated TETRA 2 standard. Results: This article describes the beginnings and historical development of this standard, with the activities of ETSI and TETRA MoU in the fight for the availability and harmonization of the frequency spectrum. It also systematize the use of the key TETRA systems in the world and shows its share in the world market by sectors, emphasizing the dilemma of its further development at the crossroads after 25 years of existence. Also, a basic overview of the TETRA 1 standard is given while the basic elements and the principle of its application are described. The innovated TETRA 2 standard and the improvements achieved in the way of data transmission are described in more detail; the process of interoperability certification and, in connection with that, the entry of TETRA into the North American market is emphasized. The parameters selected for advanced data transfer according to the TETRA 2-TEDS standard are presented and analyzed, together with an overview of some limitations during practical application. Conclusion: In the conclusion, the current moment of TETRA is analyzed with a focus on its future after 25 years of development, emohasizing a possibility of modernizing and improving the TETRA network of the Ministry of the Interior of Serbia for the needs of the MoD and the Serbian Armed Forces.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"69 1","pages":"426-460"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71187970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Description of the process of tunneling Q signaling in private telecommunication networks 描述了专用电信网中Q信令的隧道化过程
Pub Date : 2021-01-01 DOI: 10.5937/VOJTEHG69-28117
Slađan Svrzić, Z. Miličević, Z. Perišić
Introduction/purpose: The article should specify the network signaling type Q-SIG, which is standardized especially for implementation in digital telecommunication networks of integrated services (ISDN), emphasizing the possibility of its further application in the Private Telecommunications Network of Integrated Services of the Serbian Armed Forces (PISN of SAF), i.e. in the Private Automatic Telephone Network of the Serbian Armed Forces (PATN of SAF). Methods: An analysis of the existing standards was performed: ECMA355 and ECMA-336 and a synthesis of the possibilities of their application in the PATN of SAF. Results: The procedure for the application of Q-SIG is processed in a situation when the peripheral parts of the PISN of SAF, which operate on the principle of transmission and circuit switching by TDM (Time Division Multiplexing), are connected via a central Core network with the IP (Internet Protocol), which operates on the principle of packet transmission and switching with the SIP (Session Initiation Protocol). A method of the application of the tunneling of encapsulated Q-SIG messages through the IP network, defined by ECMA-355 Standard, has been developed. The necessary functions for mapping the transmission of tunneled signaling messages Q-SIG and mapping voice (and other audio) information to media streams during VoIP
介绍/目的:本文应详细说明Q-SIG网络信令类型,该网络信令类型是专门为在综合业务数字电信网络(ISDN)中实施而标准化的,强调其在塞尔维亚武装部队综合业务专用电信网(PISN of SAF),即在塞尔维亚武装部队专用自动电话网(PATN of SAF)中进一步应用的可能性。方法:对现有标准ECMA355和ECMA-336进行了分析,并综合了它们在SAF的PATN中应用的可能性。结果:在以TDM(时分多路复用)传输和电路交换为工作原理的SAF PISN的外围部分通过以SIP(会话发起协议)进行分组传输和交换的IP (Internet Protocol)为中心核心网连接的情况下,处理了Q-SIG的应用程序。根据ECMA-355标准,提出了一种通过IP网络对封装Q-SIG报文进行隧道化的应用方法。提供VoIP中映射隧道信令传输Q-SIG和映射语音(和其他音频)信息到媒体流的必要功能
{"title":"Description of the process of tunneling Q signaling in private telecommunication networks","authors":"Slađan Svrzić, Z. Miličević, Z. Perišić","doi":"10.5937/VOJTEHG69-28117","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-28117","url":null,"abstract":"Introduction/purpose: The article should specify the network signaling type Q-SIG, which is standardized especially for implementation in digital telecommunication networks of integrated services (ISDN), emphasizing the possibility of its further application in the Private Telecommunications Network of Integrated Services of the Serbian Armed Forces (PISN of SAF), i.e. in the Private Automatic Telephone Network of the Serbian Armed Forces (PATN of SAF). Methods: An analysis of the existing standards was performed: ECMA355 and ECMA-336 and a synthesis of the possibilities of their application in the PATN of SAF. Results: The procedure for the application of Q-SIG is processed in a situation when the peripheral parts of the PISN of SAF, which operate on the principle of transmission and circuit switching by TDM (Time Division Multiplexing), are connected via a central Core network with the IP (Internet Protocol), which operates on the principle of packet transmission and switching with the SIP (Session Initiation Protocol). A method of the application of the tunneling of encapsulated Q-SIG messages through the IP network, defined by ECMA-355 Standard, has been developed. The necessary functions for mapping the transmission of tunneled signaling messages Q-SIG and mapping voice (and other audio) information to media streams during VoIP","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"69 1","pages":"31-63"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71188290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety in residential buildings: Evacuation from residential buildings without fire escape stairs 居民楼安全:从没有消防楼梯的居民楼疏散
Pub Date : 2021-01-01 DOI: 10.5937/VOJTEHG69-28170
R. Jevtić
Introduction/purpose: Safety in high residential buildings presents a very important and always actual task. In case of some unforeseen and dangerous occurrences, their residents must be evacuated. Fire, earthquakes, and terrorism are only some of such situations. The speed of evacuation from high residential buildings depends on many different factors. A particularly difficult and complex evacuation task concerns buildings without fire escape stairs. Methods: The modeling method was used in this paper. Based on a real object - a residential building, an appropriate simulation model was realized in appropriate simulation software. Results: The results of this paper have shown that, out of four scenarios, the fastest evacuation was for the evacuation speed of 1.75 m/s. The first two scenarios did not report any jams, unlike the third and fourth scenario; in the third scenario, the occupants' speeds were 0.75 m/s and 1.25 m/s while in the fourth scenario, the simulated occupants' speeds were from 0.75 m/s to 1.75 m/s. Conclusion:The usage of appropriate simulation software enables fast, precise, safe and cheap calculation of evacuation times and it can significantly improve evacuation procedures and evacuation strategies.
前言/目的:高层住宅建筑的安全是一项非常重要且始终切合实际的任务。如果发生不可预见的危险事件,必须疏散居民。火灾、地震和恐怖主义只是其中的一些情况。高层住宅楼的疏散速度取决于许多不同的因素。一个特别困难和复杂的疏散任务涉及没有消防楼梯的建筑物。方法:本文采用建模方法。以住宅楼为实际对象,在合适的仿真软件中实现合适的仿真模型。结果:本文的结果表明,在4种场景中,疏散速度为1.75 m/s时,疏散速度最快。与第三和第四种情况不同,前两种情况没有报告任何堵塞;在第三个场景中,乘员的速度为0.75 m/s和1.25 m/s,而在第四个场景中,模拟乘员的速度为0.75 m/s到1.75 m/s。结论:使用合适的仿真软件可以快速、准确、安全、廉价地计算疏散时间,可以显著改善疏散程序和疏散策略。
{"title":"Safety in residential buildings: Evacuation from residential buildings without fire escape stairs","authors":"R. Jevtić","doi":"10.5937/VOJTEHG69-28170","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-28170","url":null,"abstract":"Introduction/purpose: Safety in high residential buildings presents a very important and always actual task. In case of some unforeseen and dangerous occurrences, their residents must be evacuated. Fire, earthquakes, and terrorism are only some of such situations. The speed of evacuation from high residential buildings depends on many different factors. A particularly difficult and complex evacuation task concerns buildings without fire escape stairs. Methods: The modeling method was used in this paper. Based on a real object - a residential building, an appropriate simulation model was realized in appropriate simulation software. Results: The results of this paper have shown that, out of four scenarios, the fastest evacuation was for the evacuation speed of 1.75 m/s. The first two scenarios did not report any jams, unlike the third and fourth scenario; in the third scenario, the occupants' speeds were 0.75 m/s and 1.25 m/s while in the fourth scenario, the simulated occupants' speeds were from 0.75 m/s to 1.75 m/s. Conclusion:The usage of appropriate simulation software enables fast, precise, safe and cheap calculation of evacuation times and it can significantly improve evacuation procedures and evacuation strategies.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71188359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cause-effect relationship between air quality and public health in the city of Novi Sad based on the DPSEEA model 基于DPSEEA模型的诺维萨德市空气质量与公众健康的因果关系
Pub Date : 2021-01-01 DOI: 10.5937/VOJTEHG69-29301
Emina Kričković
Introduction/purpose: The research subject in this article is the status of the air quality in the city of Novi Sad and its impact on the health of the population. The relation between these two points will be presented using the DPSEEA model. The research aim of this article is to apply proper measures in order to mitigate negative effects on human health, based on scientific knowledge related to air quality influence on the health of the Novi Sad population. The basic hypothesis of this research implies that air quality affects Novi Sad's population health. Methods: The following methods were used in this article: modeling, analysis-synthesis, statistic method, classification method, combining method, geographic-ecological method, method ofgeographic-medical description, method of the medical geography forecast as well as cartographic method. Results: Based on the DPSEEA model and the example of the air pollution in the city of Novi Sad, the following was identified: air pollution driving forces, pressures, state of the air quality, population exposure to air pollution, effects on human health as well as measures and actions that should be conducted. The mentioned model was also used to present the relationship between these segments. Conclusion: The given model deals with a wide spectrum ofpotential forces (harmful effects) and necessary community actions, bringing together professionals, people in the field and those from laboratories as well as managers in the area of environment and public health management, in order to tackle emerging problems in a comprehensive manner.
前言/目的:本文的研究主题是诺维萨德市的空气质量状况及其对人口健康的影响。这两点之间的关系将使用DPSEEA模型来表示。本文的研究目的是根据有关空气质量对诺维萨德人口健康影响的科学知识,采取适当的措施,以减轻对人类健康的负面影响。本研究的基本假设是空气质量影响诺维萨德人口的健康。方法:采用建模法、分析综合法、统计法、分类法、组合法、地理-生态法、地理-医学描述法、医学地理预测法和制图法。结果:根据DPSEEA模型和诺维萨德市空气污染的实例,确定了以下方面:空气污染的驱动力、压力、空气质量状况、人口暴露于空气污染、对人类健康的影响以及应采取的措施和行动。上述模型也用于表示这些部分之间的关系。结论:该模式涉及广泛的潜在力量(有害影响)和必要的社区行动,将专业人员、实地人员和实验室人员以及环境和公共卫生管理领域的管理人员聚集在一起,以便全面解决新出现的问题。
{"title":"Cause-effect relationship between air quality and public health in the city of Novi Sad based on the DPSEEA model","authors":"Emina Kričković","doi":"10.5937/VOJTEHG69-29301","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-29301","url":null,"abstract":"Introduction/purpose: The research subject in this article is the status of the air quality in the city of Novi Sad and its impact on the health of the population. The relation between these two points will be presented using the DPSEEA model. The research aim of this article is to apply proper measures in order to mitigate negative effects on human health, based on scientific knowledge related to air quality influence on the health of the Novi Sad population. The basic hypothesis of this research implies that air quality affects Novi Sad's population health. Methods: The following methods were used in this article: modeling, analysis-synthesis, statistic method, classification method, combining method, geographic-ecological method, method ofgeographic-medical description, method of the medical geography forecast as well as cartographic method. Results: Based on the DPSEEA model and the example of the air pollution in the city of Novi Sad, the following was identified: air pollution driving forces, pressures, state of the air quality, population exposure to air pollution, effects on human health as well as measures and actions that should be conducted. The mentioned model was also used to present the relationship between these segments. Conclusion: The given model deals with a wide spectrum ofpotential forces (harmful effects) and necessary community actions, bringing together professionals, people in the field and those from laboratories as well as managers in the area of environment and public health management, in order to tackle emerging problems in a comprehensive manner.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"69 1","pages":"88-113"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71188390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spoofing in aviation: Security threats on GPS and ADS-B systems 航空欺骗:对GPS和ADS-B系统的安全威胁
Pub Date : 2021-01-01 DOI: 10.5937/VOJTEHG69-30119
Dejan Kožović, Dragan Đurđević
Introduction/purpose: The paper provides a review of recent research in the field of GPS and ADS-B spoofing. Systems that rely on satellite positioning technology can be targeted by spoofing in order to generate incorrect positioning/timing, which is accomplished by inserting false signals into the "victim's" receiver. Attackers try to insert false positioning information into systems that, for example, provide navigation of airplanes or drones for the purpose of hijacking or distracting security/safety in airspace surveillance. New concepts of navigation and ATC will thus be necessary. Methods: Using a scientific approach, the paper gives an evaluation of GPS and ADS-B spoofing/antispoofing and how spoofing affects the cyber security of aviation systems. Results: Based on the methodological analysis used, the importance of studying spoofing/anti-spoofing in aviation is shown. Conclusion: Although spoofing in aviation is only a potential threat, its technical feasibility is realistic and its potential is considerable; it becomes more flexible and cheaper due to very rapid advancement of SDR technologies. The real risk, in the time to come, are potential spoofing attacks that could occur from the air, using drones. However, aircraft systems are not exposed to spoofing without any defense; receivers can detect it by applying various anti-spufing techniques. Also, pilots are able to detect and solve problems at every stage of the flight. However, due to a possibility of more sophisticated spoofing attacks, international organizations such as ICAO are proactively working to increase GPS and ADS-B systems robustness on spoofing.
介绍/目的:本文综述了GPS和ADS-B欺骗领域的最新研究进展。依靠卫星定位技术的系统可以被欺骗,以产生错误的定位/定时,这是通过向“受害者”的接收器插入虚假信号来实现的。攻击者试图在系统中插入虚假的定位信息,例如,为飞机或无人机提供导航,以劫持或分散空域监视的安全/安全。因此,导航和空中交通管制的新概念将是必要的。方法:采用科学的方法,对GPS和ADS-B欺骗/反欺骗以及欺骗如何影响航空系统的网络安全进行了评估。结果:基于方法学分析,指出了研究欺骗/反欺骗在航空领域的重要性。结论:航空欺骗虽然只是一种潜在的威胁,但其技术可行性是现实的,潜力是可观的;由于SDR技术的快速发展,它变得更加灵活和便宜。在未来的一段时间里,真正的风险是潜在的欺骗攻击,可能来自空中,使用无人机。然而,飞机系统不暴露于欺骗没有任何防御;接收器可以通过应用各种防喷技术来检测它。此外,飞行员能够在飞行的每个阶段发现并解决问题。然而,由于更复杂的欺骗攻击的可能性,国际民航组织等国际组织正在积极努力提高GPS和ADS-B系统对欺骗的稳健性。
{"title":"Spoofing in aviation: Security threats on GPS and ADS-B systems","authors":"Dejan Kožović, Dragan Đurđević","doi":"10.5937/VOJTEHG69-30119","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-30119","url":null,"abstract":"Introduction/purpose: The paper provides a review of recent research in the field of GPS and ADS-B spoofing. Systems that rely on satellite positioning technology can be targeted by spoofing in order to generate incorrect positioning/timing, which is accomplished by inserting false signals into the \"victim's\" receiver. Attackers try to insert false positioning information into systems that, for example, provide navigation of airplanes or drones for the purpose of hijacking or distracting security/safety in airspace surveillance. New concepts of navigation and ATC will thus be necessary. Methods: Using a scientific approach, the paper gives an evaluation of GPS and ADS-B spoofing/antispoofing and how spoofing affects the cyber security of aviation systems. Results: Based on the methodological analysis used, the importance of studying spoofing/anti-spoofing in aviation is shown. Conclusion: Although spoofing in aviation is only a potential threat, its technical feasibility is realistic and its potential is considerable; it becomes more flexible and cheaper due to very rapid advancement of SDR technologies. The real risk, in the time to come, are potential spoofing attacks that could occur from the air, using drones. However, aircraft systems are not exposed to spoofing without any defense; receivers can detect it by applying various anti-spufing techniques. Also, pilots are able to detect and solve problems at every stage of the flight. However, due to a possibility of more sophisticated spoofing attacks, international organizations such as ICAO are proactively working to increase GPS and ADS-B systems robustness on spoofing.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71188673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Vojnotehnicki Glasnik
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1