首页 > 最新文献

Journal of Military Technology最新文献

英文 中文
Privacy and Security Concerns for the Internet of Things in the GDPR Era - A Survey GDPR时代物联网的隐私与安全问题调查
Pub Date : 2018-12-21 DOI: 10.32754/JMT.2018.2.01
Laura Vegh
Digital Object Identifier 10.32754/JMT.2018.2.01 5 Abstract—Over the past years the Internet of Things (IoT) has become a subject of utmost interest both in research and industry. Technology is now present in most areas of our lives. As a result, security and privacy have become increasingly important and the idea that they must be put first when designing new systems is accepted by more and more people. The high complexity of IoT systems makes it hard to find the perfect security solution and many wonder if this will not be what will eventually stop their evolution. This year saw the enforcement of one of the most discussed privacy regulations of the past decade – The European General Data Protection Regulation, in short, the GDPR. It is a law that aims to give back to the users the power over their personal data. Furthermore, countries worldwide are starting to understand the need for such regulations and are implementing new provisions. Many are concerned that with the known security issues of the IoT, these new laws will slow down the progress made in this area. This article presents a survey of the most important issues in security and privacy in IoT and looks at existing solutions that can be used in the current scenario.
摘要:在过去的几年里,物联网(IoT)已经成为研究和工业界最感兴趣的主题。科技现在出现在我们生活的大部分领域。因此,安全和隐私变得越来越重要,在设计新系统时必须把它们放在第一位的想法被越来越多的人所接受。物联网系统的高度复杂性使得很难找到完美的安全解决方案,许多人想知道这是否会最终阻止它们的发展。今年见证了过去十年中讨论最多的隐私法规之一——《欧洲通用数据保护条例》(简称GDPR)的实施。这是一部旨在将个人数据管理权交还给用户的法律。此外,世界各国正开始了解这种条例的必要性,并正在执行新的规定。许多人担心物联网存在已知的安全问题,这些新法律将减缓这一领域的进展。本文概述了物联网中最重要的安全和隐私问题,并介绍了可用于当前场景的现有解决方案。
{"title":"Privacy and Security Concerns for the Internet of Things in the GDPR Era - A Survey","authors":"Laura Vegh","doi":"10.32754/JMT.2018.2.01","DOIUrl":"https://doi.org/10.32754/JMT.2018.2.01","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.2.01 5 Abstract—Over the past years the Internet of Things (IoT) has become a subject of utmost interest both in research and industry. Technology is now present in most areas of our lives. As a result, security and privacy have become increasingly important and the idea that they must be put first when designing new systems is accepted by more and more people. The high complexity of IoT systems makes it hard to find the perfect security solution and many wonder if this will not be what will eventually stop their evolution. This year saw the enforcement of one of the most discussed privacy regulations of the past decade – The European General Data Protection Regulation, in short, the GDPR. It is a law that aims to give back to the users the power over their personal data. Furthermore, countries worldwide are starting to understand the need for such regulations and are implementing new provisions. Many are concerned that with the known security issues of the IoT, these new laws will slow down the progress made in this area. This article presents a survey of the most important issues in security and privacy in IoT and looks at existing solutions that can be used in the current scenario.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133204369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Driving Style Influence on Vehicles Performances 驾驶风格对车辆性能的影响
Pub Date : 2018-06-18 DOI: 10.32754/jmt.2018.1.07
L. Barothi, Academia Tehnică Militară, D. Sava, Cătălin-Dumitru Darie, L. Cucu, I. Copae, City Insurance Expert, Asirom Insurance
Digital Object Identifier 10.32754/JMT.2018.1.07 39 1 Abstract—Vehicle dynamics and fuel saving performances are largely influenced by the driving style of the driver. This paper will give an account of this important aspect mentioned in specialty literature, defining some driving style assessment criteria and setting their values based on the experimental data obtained from the tests conducted on a Logan Laureate. The experimental data corresponds to 50 starting samples and 50 normal movement samples, the latter being called “nonstarting” in the paper.
摘要/ abstract摘要:驾驶员的驾驶风格对车辆的动力学和节油性能有很大的影响。本文将介绍专业文献中提到的这一重要方面,定义一些驾驶风格评估标准,并根据在洛根桂冠上进行的测试获得的实验数据设置其值。实验数据对应50个启动样本和50个正常运动样本,其中正常运动样本在文中称为“非启动”。
{"title":"Driving Style Influence on Vehicles Performances","authors":"L. Barothi, Academia Tehnică Militară, D. Sava, Cătălin-Dumitru Darie, L. Cucu, I. Copae, City Insurance Expert, Asirom Insurance","doi":"10.32754/jmt.2018.1.07","DOIUrl":"https://doi.org/10.32754/jmt.2018.1.07","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.07 39 1 Abstract—Vehicle dynamics and fuel saving performances are largely influenced by the driving style of the driver. This paper will give an account of this important aspect mentioned in specialty literature, defining some driving style assessment criteria and setting their values based on the experimental data obtained from the tests conducted on a Logan Laureate. The experimental data corresponds to 50 starting samples and 50 normal movement samples, the latter being called “nonstarting” in the paper.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126234305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid MPLS - Internet VPN Networks 混合MPLS - Internet VPN网络
Pub Date : 2018-06-18 DOI: 10.32754/jmt.2018.1.05
V. Nicolae, Academia Tehnică Militară, Stefania Nistor, P. Ciotirnae
29 Abstract—Nowadays, the data network area offers a very wide range of data switching techniques according to user needs. The current paper is concerned with a new broadband solution, namely the use of an MPLS-Internet VPN hybrid network. Even though MPLS is the basic solution in most private transport networks, with the explosive growth of the Internet, it has begun to be an alternative solution for data transmission. The purpose of this study is to balance the advantages and disadvantages of implementing this solution by bringing arguments on both sides and, finally, to draw an objective conclusion as to its applicability.
摘要:目前,数据网络领域根据用户的需要提供了非常广泛的数据交换技术。本文讨论了一种新的宽带解决方案,即MPLS-Internet VPN混合网络的使用。尽管MPLS是大多数专用传输网络的基本解决方案,但随着Internet的爆炸式增长,它已开始成为数据传输的替代解决方案。本研究的目的是通过双方的争论来平衡实施这一解决方案的优点和缺点,最后,就其适用性得出客观结论。
{"title":"Hybrid MPLS - Internet VPN Networks","authors":"V. Nicolae, Academia Tehnică Militară, Stefania Nistor, P. Ciotirnae","doi":"10.32754/jmt.2018.1.05","DOIUrl":"https://doi.org/10.32754/jmt.2018.1.05","url":null,"abstract":"29 Abstract—Nowadays, the data network area offers a very wide range of data switching techniques according to user needs. The current paper is concerned with a new broadband solution, namely the use of an MPLS-Internet VPN hybrid network. Even though MPLS is the basic solution in most private transport networks, with the explosive growth of the Internet, it has begun to be an alternative solution for data transmission. The purpose of this study is to balance the advantages and disadvantages of implementing this solution by bringing arguments on both sides and, finally, to draw an objective conclusion as to its applicability.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116930155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey on ID-Based Cryptography for Wireless Sensor Networks 基于id的无线传感器网络加密技术综述
Pub Date : 2018-06-18 DOI: 10.32754/JMT.2018.1.10
Constantin Grumazescu, Academia Tehnică Militară, V. Patriciu
Digital Object Identifier 10.32754/JMT.2018.1.10 57 Abstract—Wireless Sensor Networks (WSN) are considered to be the eyes and ears of the Internet of Things (IoT). Whereas sensor boards are becoming cheaper and a lot more diverse, WSN and IoT applications are on a steady upward trend. This leads to an increasing need to ensure the security of data collected and transmitted by these types of applications and networks. Because sensor nodes are still relatively simple, highly constrained devices, security becomes very difficult to implement. While lightweight cryptographic algorithms are still under close supervision by NIST, identity based cryptography (IBC) holds its ground as a viable security approach for WSN based applications. In this paper we are presenting a thorough analysis on identity based cryptographic primitives, techniques, implementation variants and issues. Throughout the paper we are discussing all of these aspects in relation to the specificity of WSN based network infrastructures and applications.
摘要:无线传感器网络(WSN)被认为是物联网(IoT)的眼睛和耳朵。随着传感器板变得越来越便宜和多样化,WSN和物联网应用正处于稳步上升的趋势。这导致越来越需要确保这些类型的应用程序和网络收集和传输的数据的安全性。由于传感器节点仍然是相对简单、高度受限的设备,因此安全性变得非常难以实现。虽然轻量级加密算法仍然受到NIST的密切监督,但基于身份的加密(IBC)作为基于WSN的应用程序的可行安全方法占据了一席之地。在本文中,我们对基于身份的密码原语、技术、实现变体和问题进行了全面的分析。在本文中,我们讨论了与基于WSN的网络基础设施和应用的特殊性有关的所有这些方面。
{"title":"A Comprehensive Survey on ID-Based Cryptography for Wireless Sensor Networks","authors":"Constantin Grumazescu, Academia Tehnică Militară, V. Patriciu","doi":"10.32754/JMT.2018.1.10","DOIUrl":"https://doi.org/10.32754/JMT.2018.1.10","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.10 57 Abstract—Wireless Sensor Networks (WSN) are considered to be the eyes and ears of the Internet of Things (IoT). Whereas sensor boards are becoming cheaper and a lot more diverse, WSN and IoT applications are on a steady upward trend. This leads to an increasing need to ensure the security of data collected and transmitted by these types of applications and networks. Because sensor nodes are still relatively simple, highly constrained devices, security becomes very difficult to implement. While lightweight cryptographic algorithms are still under close supervision by NIST, identity based cryptography (IBC) holds its ground as a viable security approach for WSN based applications. In this paper we are presenting a thorough analysis on identity based cryptographic primitives, techniques, implementation variants and issues. Throughout the paper we are discussing all of these aspects in relation to the specificity of WSN based network infrastructures and applications.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Helical Antenna Design for Automated UAV Tracking System 无人机自动跟踪系统的螺旋天线设计
Pub Date : 2018-06-18 DOI: 10.32754/jmt.2018.1.04
Florin Catargiu, Academia Tehnică Militară, Cristian Vidan, R. Mihai, Gavril Alexandru
Digital Object Identifier 10.32754/JMT.2018.1.04 25 Abstract—Recently, the use of unmanned aerial systems (UAS) has increased dramatically in the civilian and military environments. The current paper is mainly concerned with the limitations of radio communications between a UAV and ground control stations. A new approach will be presented by creating a dynamic ground control station that can automatically and real-time track a UAV that has a 5.8 GHz video transmitter on board. To do that, an axial mode helical antenna is proposed. The antenna is simulated and the performance analysis is presented. Helical antennas play an important role in establishing communications for UAV. Also it describes a portable tracking antenna system that is used for line of sight communications with the small UAVs. Our antenna is mechanically rotated in an elevation and azimuth mode in response to the tracking signals derived from the UAV video link transmissions. The antenna tracking system with 7 turns and a pitch angle of 18o has achieved good results. This satisfies the requirements for establishing a reliable communication in UAV applications.
摘要:近年来,无人机系统(UAS)在民用和军事环境中的应用急剧增加。本文主要关注无人机与地面控制站之间无线电通信的局限性。将提出一种新方法,即创建一个动态地面控制站,可以自动实时跟踪机载5.8 GHz视频发射机的无人机。为此,提出了一种轴向型螺旋天线。对天线进行了仿真并进行了性能分析。螺旋天线在无人机通信中起着重要的作用。它还描述了一种便携式跟踪天线系统,用于与小型无人机的视线通信。我们的天线以机械方式在仰角和方位模式下旋转,以响应来自无人机视频链路传输的跟踪信号。7转180俯仰角的天线跟踪系统取得了良好的效果。这满足了在无人机应用中建立可靠通信的要求。
{"title":"Helical Antenna Design for Automated UAV Tracking System","authors":"Florin Catargiu, Academia Tehnică Militară, Cristian Vidan, R. Mihai, Gavril Alexandru","doi":"10.32754/jmt.2018.1.04","DOIUrl":"https://doi.org/10.32754/jmt.2018.1.04","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.04 25 Abstract—Recently, the use of unmanned aerial systems (UAS) has increased dramatically in the civilian and military environments. The current paper is mainly concerned with the limitations of radio communications between a UAV and ground control stations. A new approach will be presented by creating a dynamic ground control station that can automatically and real-time track a UAV that has a 5.8 GHz video transmitter on board. To do that, an axial mode helical antenna is proposed. The antenna is simulated and the performance analysis is presented. Helical antennas play an important role in establishing communications for UAV. Also it describes a portable tracking antenna system that is used for line of sight communications with the small UAVs. Our antenna is mechanically rotated in an elevation and azimuth mode in response to the tracking signals derived from the UAV video link transmissions. The antenna tracking system with 7 turns and a pitch angle of 18o has achieved good results. This satisfies the requirements for establishing a reliable communication in UAV applications.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134066138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Digital Filtering Techniques in Ultrasound and Carotid Bifurcation Atherosclerosis 超声数字滤波技术与颈动脉分叉动脉粥样硬化的比较研究
Pub Date : 2018-06-18 DOI: 10.32754/jmt.2018.1.01
A. Milăşan, Academia Tehnică Militară, C. Molder, S. Dumitrescu
Digital Object Identifier 10.32754/JMT.2018.1.01 5 Abstract—The current paper presents a method for speckle cancellation in digital images obtained in ultrasound and carotid bifurcation atherosclerosis. Filtering techniques are usually used for noise reduction and contrast enhancement in digital images. Due to interferences and other phenomena in the acquisition chain, ultrasound images usually have perturbations and artifacts. Speckle is often considered a powerful source of noise in the ultrasound imagery and it must be filtered without affecting the rest of the most important features in the image. Linear, nonlinear, diffusion and wavelet filters are applied on various ultrasound images of carotid bifurcation. In order to evaluate the quality difference between original and anti-speckle filtered images, a comparative study of results is presented at the end.
摘要:本文提出了一种对超声和颈动脉分叉动脉粥样硬化的数字图像进行斑点消除的方法。滤波技术通常用于数字图像的降噪和增强对比度。由于采集链中的干扰和其他现象,超声图像通常存在扰动和伪影。斑点通常被认为是超声图像中的一个强大的噪声源,必须在不影响图像中其余最重要特征的情况下对其进行过滤。应用线性滤波器、非线性滤波器、扩散滤波器和小波滤波器对颈动脉分岔的超声图像进行处理。为了评价原始图像和抗散斑滤波图像的质量差异,最后对结果进行了比较研究。
{"title":"A Comparative Study of Digital Filtering Techniques in Ultrasound and Carotid Bifurcation Atherosclerosis","authors":"A. Milăşan, Academia Tehnică Militară, C. Molder, S. Dumitrescu","doi":"10.32754/jmt.2018.1.01","DOIUrl":"https://doi.org/10.32754/jmt.2018.1.01","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.01 5 Abstract—The current paper presents a method for speckle cancellation in digital images obtained in ultrasound and carotid bifurcation atherosclerosis. Filtering techniques are usually used for noise reduction and contrast enhancement in digital images. Due to interferences and other phenomena in the acquisition chain, ultrasound images usually have perturbations and artifacts. Speckle is often considered a powerful source of noise in the ultrasound imagery and it must be filtered without affecting the rest of the most important features in the image. Linear, nonlinear, diffusion and wavelet filters are applied on various ultrasound images of carotid bifurcation. In order to evaluate the quality difference between original and anti-speckle filtered images, a comparative study of results is presented at the end.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124226706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mission Planner for GEOINT Data Acquisition GEOINT数据采集任务规划人员
Pub Date : 2018-06-18 DOI: 10.32754/jmt.2018.1.09
Daniel Didulescu, Academia Tehnică Militară, Claudiu Buciu, D. Raducanu
Digital Object Identifier 10.32754/JMT.2018.1.09 51 Abstract—Across all North Atlantic Treaty nations there is a very well implemented way of military thinking when preparing for war or for crisis operations. Starting from scratch we consider first the military intelligence, afterwards looking for planning, carrying out the operation, and finally assessing the whole campaign. The real first step of this process is the Geospatial Intelligence (GEOINT). In order to collect, analyze, and disseminate as much intelligence as possible, the military maps will look for integrating data from different aerial and spatial sensors. Having in mind that not all the enemy’s soil could be surveyed by us, we are trying to match pan-sharpened digital pictures taken by Copter Unmanned Air Vehicles with images taken by commercial satellites and to extend by induction, using the relationship between the different levels of grey of the multi-sensors final products, the geographical knowledge management over the white spots.
摘要-在所有北大西洋公约国家中,在准备战争或危机行动时,都有一种非常有效的军事思维方式。从零开始,我们首先考虑军事情报,然后寻找计划,执行行动,最后评估整个战役。这个过程真正的第一步是地理空间情报(GEOINT)。为了收集、分析和传播尽可能多的情报,军用地图将寻找来自不同航空和空间传感器的综合数据。考虑到并非所有敌人的土壤都可以被我们调查,我们正在尝试将无人机拍摄的pan-锐化数字图像与商业卫星拍摄的图像相匹配,并利用多传感器最终产品的不同灰度水平之间的关系,通过归纳来扩展白点上的地理知识管理。
{"title":"Mission Planner for GEOINT Data Acquisition","authors":"Daniel Didulescu, Academia Tehnică Militară, Claudiu Buciu, D. Raducanu","doi":"10.32754/jmt.2018.1.09","DOIUrl":"https://doi.org/10.32754/jmt.2018.1.09","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.09 51 Abstract—Across all North Atlantic Treaty nations there is a very well implemented way of military thinking when preparing for war or for crisis operations. Starting from scratch we consider first the military intelligence, afterwards looking for planning, carrying out the operation, and finally assessing the whole campaign. The real first step of this process is the Geospatial Intelligence (GEOINT). In order to collect, analyze, and disseminate as much intelligence as possible, the military maps will look for integrating data from different aerial and spatial sensors. Having in mind that not all the enemy’s soil could be surveyed by us, we are trying to match pan-sharpened digital pictures taken by Copter Unmanned Air Vehicles with images taken by commercial satellites and to extend by induction, using the relationship between the different levels of grey of the multi-sensors final products, the geographical knowledge management over the white spots.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130547953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Ducted Fan Design for Small Flexible Wing Unmanned Air Vehicle 小型柔性翼无人机风道扇改进设计
Pub Date : 2018-06-18 DOI: 10.32754/JMT.2018.1.06
R. Pahonie, Academia Tehnică Militară, R. Mihai, Radu Buse, Mihai Mihăilă-Andres
Digital Object Identifier 10.32754/JMT.2018.1.06 33 Abstract—Nowadays, equipment transportation or real time surveillance flights can be done with different types of UAVs (Unmanned Aerial Vehicles) ranging from quads to fixed wing vehicles and flexible winged ones. The purpose of this article is to build upon the research available in the field of small unmanned paramotor flexible winged gliders. Such a functional aerial vehicle has been built and initial flight data evaluation undertaken. In this paper we improve upon the initial design of the UAV and the flight behavior of its initial fan configuration. A new ducted structure is proposed and tested (numerically and experimental) for the electric fan propulsion system.
摘要:目前,设备运输或实时监视飞行可以使用不同类型的无人机(uav),从四翼飞行器到固定翼飞行器和柔性翼飞行器。本文的目的是在小型无人机动柔性翼滑翔机领域现有研究的基础上进行研究。已经建造了这种功能齐全的飞行器,并进行了初步飞行数据评估。本文对无人机的初始设计及其初始风扇配置的飞行性能进行了改进。提出了一种新的电风扇推进系统的导管结构,并对其进行了数值和实验测试。
{"title":"Improved Ducted Fan Design for Small Flexible Wing Unmanned Air Vehicle","authors":"R. Pahonie, Academia Tehnică Militară, R. Mihai, Radu Buse, Mihai Mihăilă-Andres","doi":"10.32754/JMT.2018.1.06","DOIUrl":"https://doi.org/10.32754/JMT.2018.1.06","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.06 33 Abstract—Nowadays, equipment transportation or real time surveillance flights can be done with different types of UAVs (Unmanned Aerial Vehicles) ranging from quads to fixed wing vehicles and flexible winged ones. The purpose of this article is to build upon the research available in the field of small unmanned paramotor flexible winged gliders. Such a functional aerial vehicle has been built and initial flight data evaluation undertaken. In this paper we improve upon the initial design of the UAV and the flight behavior of its initial fan configuration. A new ducted structure is proposed and tested (numerically and experimental) for the electric fan propulsion system.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130552274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Forensics in Cyber Security Exercises 网络安全演习中的数字取证
Pub Date : 2018-06-18 DOI: 10.32754/JMT.2018.1.02
L. Roşu, Academia Tehnică Militară, Georgiana Subaşu
Digital Object Identifier 10.32754/JMT.2018.1.02 13 Abstract—The increased exposure to cyber threats is determined by the use of digital systems and their highly available connectivity. In order to mitigate cyber risks, optimum solutions are sought regarding the development of various methods for training in cyber security. Cyber training exercises have been created from the need to improve knowledge and skills, currently providing an enhancement to the detection and response capability to security incidents. One area in which cyber training exercises bring a major benefit is digital forensics. This paper aims to review the required criteria for building cyber exercises for training in the digital forensics field. It also emphasizes the importance of these training exercises in acquiring and improving the necessary skills for a promptly and efficiently response to security incidents. Our paper focuses on the benefits of using digital forensics methods and techniques to extract the information needed for monitoring and scoring participants' activities.
摘要-数字系统的使用及其高可用性连接决定了网络威胁暴露的增加。为了降低网络风险,在开发各种网络安全培训方法方面寻求最佳解决方案。由于需要提高知识和技能,我们开办了网络训练演习,以加强侦测和应对保安事故的能力。网络训练带来重大好处的一个领域是数字取证。本文旨在回顾在数字取证领域建立网络训练所需的标准。它还强调了这些训练活动在获得和改进迅速有效地对安全事件作出反应的必要技能方面的重要性。我们的论文着重于使用数字取证方法和技术来提取监控和评分参与者活动所需的信息的好处。
{"title":"Digital Forensics in Cyber Security Exercises","authors":"L. Roşu, Academia Tehnică Militară, Georgiana Subaşu","doi":"10.32754/JMT.2018.1.02","DOIUrl":"https://doi.org/10.32754/JMT.2018.1.02","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.02 13 Abstract—The increased exposure to cyber threats is determined by the use of digital systems and their highly available connectivity. In order to mitigate cyber risks, optimum solutions are sought regarding the development of various methods for training in cyber security. Cyber training exercises have been created from the need to improve knowledge and skills, currently providing an enhancement to the detection and response capability to security incidents. One area in which cyber training exercises bring a major benefit is digital forensics. This paper aims to review the required criteria for building cyber exercises for training in the digital forensics field. It also emphasizes the importance of these training exercises in acquiring and improving the necessary skills for a promptly and efficiently response to security incidents. Our paper focuses on the benefits of using digital forensics methods and techniques to extract the information needed for monitoring and scoring participants' activities.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131065851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical Simulation of a Ballistic Impact on Tensylon® UHMWPE Laminates Using the Plastic Kinematic Model in LS-Dyna® 基于LS-Dyna®塑性运动学模型的Tensylon®超高分子量聚乙烯层合板弹道冲击数值模拟
Pub Date : 2018-06-18 DOI: 10.32754/JMT.2018.1.08
L. Alil, Academia Tehnică Militară, L. Matache, S. Sandu
Digital Object Identifier 10.32754/JMT.2018.1.08 43 Abstract—Based on experimental results, the numerical simulation of a ballistic impact between a Ultra-High Molecular Weight Polyethylene (UHMWPE) laminate panel and a 7.62×39 lead core bullet is performed. The aim of the paper is to demonstrate that a simple constitutive model, such as the plastic kinematic model available in LS-Dyna® version R7.0.0, can be used to accurately describe real ballistic impact events with UHMWPE laminate targets, which are normally simulated using orthotropic material models. Two representations of the UHMWPE laminate panel are proposed: a version constituted by a number of identical layers, treated individually as isentropic solids with the possibility of detaching from each other (in order to simulate delamination), and a version containing additional layers between the main UHMWPE layers, having the role of acting, on one hand, as an interface which plays the main role in delamination phenomenon and, on the other hand, to introduce a softer component by imitating the behavior of a resin. Having clearly advantages over the simple non-adhesive version, the adhesive version proposed within this paper had a less accurate performance than the simple version.
摘要基于实验结果,对超高分子量聚乙烯(UHMWPE)层压板与7.62×39铅芯弹的弹道碰撞进行了数值模拟。本文的目的是证明一个简单的本构模型,如LS-Dyna®版本R7.0.0中可用的塑性运动学模型,可以用来准确地描述UHMWPE层压靶的真实弹道撞击事件,这通常是使用正交异性材料模型来模拟的。提出了超高分子量聚乙烯层压板的两种表现形式:一种是由许多相同的层组成的版本,它们被单独视为具有相互分离可能性的等熵固体(为了模拟分层),另一种是在主要UHMWPE层之间包含额外层的版本,一方面作为在分层现象中起主要作用的界面,另一方面,通过模仿树脂的行为来引入更柔软的成分。虽然与简单的无胶版相比有明显的优势,但本文提出的粘接版的精度不如简单版。
{"title":"Numerical Simulation of a Ballistic Impact on Tensylon® UHMWPE Laminates Using the Plastic Kinematic Model in LS-Dyna®","authors":"L. Alil, Academia Tehnică Militară, L. Matache, S. Sandu","doi":"10.32754/JMT.2018.1.08","DOIUrl":"https://doi.org/10.32754/JMT.2018.1.08","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2018.1.08 43 Abstract—Based on experimental results, the numerical simulation of a ballistic impact between a Ultra-High Molecular Weight Polyethylene (UHMWPE) laminate panel and a 7.62×39 lead core bullet is performed. The aim of the paper is to demonstrate that a simple constitutive model, such as the plastic kinematic model available in LS-Dyna® version R7.0.0, can be used to accurately describe real ballistic impact events with UHMWPE laminate targets, which are normally simulated using orthotropic material models. Two representations of the UHMWPE laminate panel are proposed: a version constituted by a number of identical layers, treated individually as isentropic solids with the possibility of detaching from each other (in order to simulate delamination), and a version containing additional layers between the main UHMWPE layers, having the role of acting, on one hand, as an interface which plays the main role in delamination phenomenon and, on the other hand, to introduce a softer component by imitating the behavior of a resin. Having clearly advantages over the simple non-adhesive version, the adhesive version proposed within this paper had a less accurate performance than the simple version.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131479141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Journal of Military Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1