The idea of using unmanned platforms for combat tasks is progressing. The analysis of contemporary armed conflicts indicates that in the future, military operations will be largely carried out in urbanized areas. The article outlines the tactical conditions determining the operation of unmanned ground platforms on the urbanized battlefield and formulates tactical and technical requirements to be met by an autonomous combatsupport vehicle (ACSV) designed to cooperate with infantry subunits in contemporary and future military operations.
{"title":"Autonomous Combat Support Vehicles in Urban Operations: Tactical and Technical Determinants","authors":"Bużantowicz, Turek","doi":"10.3849/aimt.01350","DOIUrl":"https://doi.org/10.3849/aimt.01350","url":null,"abstract":"The idea of using unmanned platforms for combat tasks is progressing. The analysis of contemporary armed conflicts indicates that in the future, military operations will be largely carried out in urbanized areas. The article outlines the tactical conditions determining the operation of unmanned ground platforms on the urbanized battlefield and formulates tactical and technical requirements to be met by an autonomous combatsupport vehicle (ACSV) designed to cooperate with infantry subunits in contemporary and future military operations.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42939534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The article highlights the major concepts of systems integration in a military environment, especially the NATO Network Enabled Capability and Federal Mission Networking. Both concepts were implemented into the Czech Armed Forces and adapted to fit their ambitions, possibilities, tasks and specific goals. The primary goal of this adoption was to achieve the capabilities to work in a coalition environment. The experiences from Intelligence, Surveillance, and Reconnaissance integration projects are presented in the second part of the article. After assessing the current state, development goals are characterized as challenges that need to be addressed with a solution that is described.
{"title":"Systems Integration in Military Environment","authors":"Buřita, Hrabovský, Novák, Pohanka","doi":"10.3849/aimt.01334","DOIUrl":"https://doi.org/10.3849/aimt.01334","url":null,"abstract":"The article highlights the major concepts of systems integration in a military environment, especially the NATO Network Enabled Capability and Federal Mission Networking. Both concepts were implemented into the Czech Armed Forces and adapted to fit their ambitions, possibilities, tasks and specific goals. The primary goal of this adoption was to achieve the capabilities to work in a coalition environment. The experiences from Intelligence, Surveillance, and Reconnaissance integration projects are presented in the second part of the article. After assessing the current state, development goals are characterized as challenges that need to be addressed with a solution that is described.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48279053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
: Centre-of-gravity (c.g.) of combat aircraft suffers significant lateral deviation due to asymmetric release of stores, leading to a highly nonlinear and coupled dynamics. Additional nonlinearity and coupling result when the aircraft attempts some supermanoeuvres under such conditions rendering nonlinear control implementation unavoidable. However, such controls depend on accurate onboard c.g information. The present paper proposes a novel neural network aided sliding mode based hybrid control scheme which does not require such an information. The neural controller is trained offline to compensate for the changed dynamics arising from the lateral mass asymmetry, while the sliding controller is designed for the intended manoeuvres under the nominal situation. Cobra and Herbst manoeuvres are simulated for various lateral c.g. movements to validate the scheme.
{"title":"Automatic Control of an Asymmetric Fighter Aircraft Performing Supermanoeuvres","authors":"Mukherjee, Goel, Sinha","doi":"10.3849/aimt.01314","DOIUrl":"https://doi.org/10.3849/aimt.01314","url":null,"abstract":": Centre-of-gravity (c.g.) of combat aircraft suffers significant lateral deviation due to asymmetric release of stores, leading to a highly nonlinear and coupled dynamics. Additional nonlinearity and coupling result when the aircraft attempts some supermanoeuvres under such conditions rendering nonlinear control implementation unavoidable. However, such controls depend on accurate onboard c.g information. The present paper proposes a novel neural network aided sliding mode based hybrid control scheme which does not require such an information. The neural controller is trained offline to compensate for the changed dynamics arising from the lateral mass asymmetry, while the sliding controller is designed for the intended manoeuvres under the nominal situation. Cobra and Herbst manoeuvres are simulated for various lateral c.g. movements to validate the scheme.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41378381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
: Small jet and turboprop engines usually use centrifugal compressors. Compressor stable operation is very important for jet engine work and its use. This paper deals with centrifugal compressor stability margin assessment. The appropriate parameter is selected to inform us about working regime in which jet engine (compressor) works in terms of its stable operation.
{"title":"Centrifugal Compressor Rate of Stability Assessment","authors":"Jílek, Zelinka","doi":"10.3849/aimt.01352","DOIUrl":"https://doi.org/10.3849/aimt.01352","url":null,"abstract":": Small jet and turboprop engines usually use centrifugal compressors. Compressor stable operation is very important for jet engine work and its use. This paper deals with centrifugal compressor stability margin assessment. The appropriate parameter is selected to inform us about working regime in which jet engine (compressor) works in terms of its stable operation.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46592771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
: The present article explores one of the most relevant counterintelligence (CI) programs in Afghanistan. The preliminary credibility assessment screening system (PCASS) assisted to provide initial screening of suspects for further follow up of intelligence and security forces. Thus, the objective of this article is to explore the dynamics of employing this technology in fragile states in support of the intelligence activities. To that purpose, we have used an exploratory case study research, which included several sources of data collection. We found that PCASS is used to empower the Afghan police forces to identify and neutralize insider threats, but also to keep NATO-coalition forces safer. Further research should focus, for instance, on the impact of the Afghan culture on PCASS operations.
{"title":"Counterintelligence in Afghanistan: Preliminary Credibility Assessment Screening System","authors":"Reis","doi":"10.3849/aimt.01343","DOIUrl":"https://doi.org/10.3849/aimt.01343","url":null,"abstract":": The present article explores one of the most relevant counterintelligence (CI) programs in Afghanistan. The preliminary credibility assessment screening system (PCASS) assisted to provide initial screening of suspects for further follow up of intelligence and security forces. Thus, the objective of this article is to explore the dynamics of employing this technology in fragile states in support of the intelligence activities. To that purpose, we have used an exploratory case study research, which included several sources of data collection. We found that PCASS is used to empower the Afghan police forces to identify and neutralize insider threats, but also to keep NATO-coalition forces safer. Further research should focus, for instance, on the impact of the Afghan culture on PCASS operations.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41298655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Protecting war ships from torpedo attack is considered as the most challenging task in Anti-Submarine Warfare. Torpedo Defence System (TDS) is an essential fitment on modern high value platforms. Timely detection and identification of a torpedo attack is the primary function of a TDS. Localisation and countermeasures against the weapon are the next stage in torpedo defence. Detection of modern torpedoes with long endurance can only be achieved using an underwater sensor suit with wide frequency coverage. Tactical use of multiple counter measures is essential for evading an attacking torpedo with intelligent homing mechanism. Individual sensors and counter measures are no longer considered as a solution; they are rather considered as components of a large network of systems to protect the platform from torpedo attack. A System of Systems (SOS) architecture with multiple sensors, processing techniques, countermeasures and tactics are presented in this paper for achieving fail-safe torpedo defence capability.
{"title":"Systems Architecture for Generic Torpedo Defence System for Surface Ships","authors":"Jomon, Jojish, Santhanakrishnan","doi":"10.3849/aimt.01330","DOIUrl":"https://doi.org/10.3849/aimt.01330","url":null,"abstract":"Protecting war ships from torpedo attack is considered as the most challenging task in Anti-Submarine Warfare. Torpedo Defence System (TDS) is an essential fitment on modern high value platforms. Timely detection and identification of a torpedo attack is the primary function of a TDS. Localisation and countermeasures against the weapon are the next stage in torpedo defence. Detection of modern torpedoes with long endurance can only be achieved using an underwater sensor suit with wide frequency coverage. Tactical use of multiple counter measures is essential for evading an attacking torpedo with intelligent homing mechanism. Individual sensors and counter measures are no longer considered as a solution; they are rather considered as components of a large network of systems to protect the platform from torpedo attack. A System of Systems (SOS) architecture with multiple sensors, processing techniques, countermeasures and tactics are presented in this paper for achieving fail-safe torpedo defence capability.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43478962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Post-Information Age brings new challenges into the military operational environment. The current approach of the extreme hierarchical command and control cannot be sustained in this complex and dynamic environment. Thus, making the search for new command and control approaches is a critical activity. The description and classification of command and control approaches is expressed in a very abstract way. The article describes a unique, quantification technique of command and control approaches. The quantification is demonstrated by Use Case with self-synchronization as the selected command and control approach. In the Use Case, the deterministic dynamic model is implemented. The results achieved from the model demonstrate a variance of a single parameter, on which the quality of the selected Command and Control approach in the given operational scenario quantifies.
{"title":"Quantification of Command and Control Approaches – Model Based Evaluation","authors":"Hodický, Procházka, Stodola, Drozd","doi":"10.3849/aimt.01231","DOIUrl":"https://doi.org/10.3849/aimt.01231","url":null,"abstract":"The Post-Information Age brings new challenges into the military operational environment. The current approach of the extreme hierarchical command and control cannot be sustained in this complex and dynamic environment. Thus, making the search for new command and control approaches is a critical activity. The description and classification of command and control approaches is expressed in a very abstract way. The article describes a unique, quantification technique of command and control approaches. The quantification is demonstrated by Use Case with self-synchronization as the selected command and control approach. In the Use Case, the deterministic dynamic model is implemented. The results achieved from the model demonstrate a variance of a single parameter, on which the quality of the selected Command and Control approach in the given operational scenario quantifies.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44202646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An important aerodynamic noise source from lifting surface occurs from trailing edge of an aerofoil as found in wind turbine blades. In this work, semi-empirical method proposed by Brookes, Pope, Marcolini is applied to evaluate trailing edge bluntness vortex shedding noise source. For low Mach number flows (0.1884) and moderate to high chord Reynolds number, 4.73 × 10 – 3.35 × 10, change in sound power level was assessed for trailing edge thicknesses in terms of 0.1%, 0.5% and 1% chord lengths at wind speeds of 8 m/s, 10 m/s. For overall change of trailing edge thickness from 0.1% to 1% chord, an increase in noise levels up to 50 dB was found at low frequencies, while a decrease up to 30 dB was found between mid-band to high frequencies of spectra.
{"title":"Prediction of Vortex Induced Aerodynamic Noise from Wind Turbine Blades","authors":"Bhargava, Maddula, Samala","doi":"10.3849/aimt.01295","DOIUrl":"https://doi.org/10.3849/aimt.01295","url":null,"abstract":"An important aerodynamic noise source from lifting surface occurs from trailing edge of an aerofoil as found in wind turbine blades. In this work, semi-empirical method proposed by Brookes, Pope, Marcolini is applied to evaluate trailing edge bluntness vortex shedding noise source. For low Mach number flows (0.1884) and moderate to high chord Reynolds number, 4.73 × 10 – 3.35 × 10, change in sound power level was assessed for trailing edge thicknesses in terms of 0.1%, 0.5% and 1% chord lengths at wind speeds of 8 m/s, 10 m/s. For overall change of trailing edge thickness from 0.1% to 1% chord, an increase in noise levels up to 50 dB was found at low frequencies, while a decrease up to 30 dB was found between mid-band to high frequencies of spectra.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48549734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper explains the evolution of technology from obsolete military battlefield networks towards the global military battlefield information network from information and cyber security point of view. The authors focus on the threat of the communication medium which is mainly used in military battlefield information networks – the wireless channel, which is the basis of different mobile wireless systems. This paper deals with complex threats to military cyberspace, in which primarily wireless channels may be easily available by the enemy. Employed subnetworks may have different properties. A unifying extended layered model is presented in the article, which in addition to ISO/OSI model spreads cyber threat to geographic and social spheres. The article also shortly illustrates the development of electronic military warfare towards cyber military warfare.
{"title":"Cyber Security Challenges in Future Military Battlefield Information Networks","authors":"Dulik","doi":"10.3849/aimt.01248","DOIUrl":"https://doi.org/10.3849/aimt.01248","url":null,"abstract":"This paper explains the evolution of technology from obsolete military battlefield networks towards the global military battlefield information network from information and cyber security point of view. The authors focus on the threat of the communication medium which is mainly used in military battlefield information networks – the wireless channel, which is the basis of different mobile wireless systems. This paper deals with complex threats to military cyberspace, in which primarily wireless channels may be easily available by the enemy. Employed subnetworks may have different properties. A unifying extended layered model is presented in the article, which in addition to ISO/OSI model spreads cyber threat to geographic and social spheres. The article also shortly illustrates the development of electronic military warfare towards cyber military warfare.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70004435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When working in a contaminated area while wearing individual protective equipment, there is a high risk of overheating and dehydration. In accordance with the valid documents of the Army of the Czech Republic, a person using protective equipment has to be provided with an adequate fluid intake. To perform the work, it is necessary to equip the soldier with a hydration device that is resistant to chemical warfare agents and is structured in a way that allows its use when means of personal protection or other equipment is used. The aim of the experimental work was to verify resistance of the construction materials of hydration devices and to compare them. For this purpose, devices designed to provide resistance to chemical warfare agents and those that did not provide it were tested. To determine breakthrough times of selected materials, the MIKROTEST and the MINITEST methods were used.
{"title":"Hydration Bags Construction Materials Resistance to Chemical Warfare Agents and their Comparison","authors":"Kiszka, Florus","doi":"10.3849/aimt.01293","DOIUrl":"https://doi.org/10.3849/aimt.01293","url":null,"abstract":"When working in a contaminated area while wearing individual protective equipment, there is a high risk of overheating and dehydration. In accordance with the valid documents of the Army of the Czech Republic, a person using protective equipment has to be provided with an adequate fluid intake. To perform the work, it is necessary to equip the soldier with a hydration device that is resistant to chemical warfare agents and is structured in a way that allows its use when means of personal protection or other equipment is used. The aim of the experimental work was to verify resistance of the construction materials of hydration devices and to compare them. For this purpose, devices designed to provide resistance to chemical warfare agents and those that did not provide it were tested. To determine breakthrough times of selected materials, the MIKROTEST and the MINITEST methods were used.","PeriodicalId":39125,"journal":{"name":"Advances in Military Technology","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41436598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}