Zoran Obradović, B. Nikolić, Goran Popović, Nikolay Gadzhalov, Krastyu Krastev
{"title":"Application of the modeling method to the calculation of the probability of hitting a stationary target during the fire action of a tank squad in defense","authors":"Zoran Obradović, B. Nikolić, Goran Popović, Nikolay Gadzhalov, Krastyu Krastev","doi":"10.5937/vojtehg71-44670","DOIUrl":"https://doi.org/10.5937/vojtehg71-44670","url":null,"abstract":"Introduction/purpose: The theory of direct firing of armored units deals with the calculation of the probability of hitting the target depending on the number of projectiles fired, in certain combat circumstances as well as under certain meteorological conditions. Successful performance of the combat task of armored units in defensive actions against stationary targets depends to the greatest extent on the effectiveness of fire of tank weapons. Under the tactical assumptions that define real combat conditions, i.e., that the attacking formation opens fire from small arms and anti-tank weapons, that the defense is organized in a timely manner on maneuvering ground and in optimal meteorological conditions, and that the tank squad opens fire while stationary, the scientific goal of the research is to determine the probability of hitting and destroying the target as closely as possible depending on the method of determining the distance to the target and the number of projectiles fired. Methods: Mainly applying the method of situation modeling in scientific research, the authors try to determine, as precisely as possible, the percentage of the probability of hitting (destroying) a stationary target, with the first, second, or third projectile. Results: The main scientific contribution of the research would be the determination of various quantitative indicators as significant parameters necessary for a successful design of defense operations of ground army units. Conclusion: By creating an appropriate model for a specific situation in order to solve a problem (combat task), it is possible to precisely determine the probability of hitting and the probability of destroying the target in relation to the number of projectiles fired, as well as the expected consumption of ammunition.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"93 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76062136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Jovanović, D. Protić, V. Antić, Milena Grdović, Dejan Bajić
{"title":"Security of wireless keyboards: Threats, vulnerabilities and countermeasures","authors":"S. Jovanović, D. Protić, V. Antić, Milena Grdović, Dejan Bajić","doi":"10.5937/vojtehg71-43239","DOIUrl":"https://doi.org/10.5937/vojtehg71-43239","url":null,"abstract":"Introduction/purpose: This paper provides an overview of research on computer system vulnerabilities caused by compromised electromagnetic radiation by wireless keyboards. Wireless devices that use event-triggered communication have been shown to have critical privacy issues due to the inherent leakage associated with radio frequency emissions. Wireless connectivity technology is a source of signal emanation that must be protected in terms of performance and security. Methods: Wireless device vulnerabilities and side-channel attacks are observed, along with electromagnetic emission of radio waves. Results: The findings highlight a specific wireless keyboard's security and encryption flaws. The results of penetration testing reveal vulnerabilities of targeted wireless keyboards in terms of outdated firmware, encryption, wireless reliability, and connection strength. Conclusion: Wireless keyboards have security flaws that disrupt radio communication, giving a malicious user complete access to the computer to which the keyboard is connected. An attacker can steal sensitive data by observing how the system works using compromised electromagnetic emissions.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84695937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximum electric field estimation in the vicinity of 5G base stations before their start-up","authors":"A. Lebl, Đurađ Budimir","doi":"10.5937/vojtehg71-42426","DOIUrl":"https://doi.org/10.5937/vojtehg71-42426","url":null,"abstract":"Introduction/purpose: This paper presents initial development of the procedure for electric field estimation in the vicinity of 5G base stations. Methods: The procedure allows determination of future radiation levels before traffic is established over applied antenna systems on the basis of measured values of electric field levels caused by the signal forming Synchronization Signal Block. It is possible to perform necessary calculations for a very accurate estimation even if some important parameters of the radiation characteristics (such as the frequency span between the frequency carriers on the radio interface) are not a priori known. In this way, communication with mobile system operators before measurement is significantly simplified because operators do not need to know system technical details. Results: The developed formula for electric field estimation is verified comparing the calculated values by its implementation to the practical results obtained by intensive measurements on a great number of 5G base stations in a highly developed country. The formula gives a pessimistic result, i.e. a higher electric field level than it is obtained by all such performed measurements. Conclusion: This estimation allows mobile system operators to predict whether the electromagnetic field around base stations could be dangerous for human health when systems come to full operation while considering national and international recommendations dealing with radiation levels.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85431535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomalies in quantum field theories","authors":"N. Fabiano","doi":"10.5937/vojtehg71-38164","DOIUrl":"https://doi.org/10.5937/vojtehg71-38164","url":null,"abstract":"Introduction:purpose: Noether's theorem connects symmetry of the Lagrangian to conserved quantities. Quantum effects cancel the conserved quantities. Methods: Triangle diagram, Path integral, Pauli-Villars regularisation. Results: Quantum effects that spoil conserved quantities of local gauge symmetries endager renormalisability. Conclusion: A careful treatment of anomalies is needed in order to obtain correct results. The p 0 → gg decay is perhaps the most notable \"impossible\" effect allowed by anomalies.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"102 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85825315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Employment of probability-based multi-response optimization in high voltage thermofluids","authors":"J. Ofodu, J. Abifarin","doi":"10.5937/vojtehg70-35764","DOIUrl":"https://doi.org/10.5937/vojtehg70-35764","url":null,"abstract":"Introduction/purpose: Researchers of fluids for high voltage engineering application always experience problems when selecting and recommending specific fluids suitable for high voltage application. This is due to the dual functionality of fluids required for high voltage equipment. Methods: This study introduced and employed a probability-based multi-objective optimization technique in the selection of high voltage thermofluids. Beneficial and unbeneficial preferable probability utility indexes were employed based on the desired properties of oils. Results: It was shown that the nanofluid with 0.6 wt% Al2O3 is the most promising candidate for high voltage equipment compared to other produced fluids considered. It is also noteworthy to state that coconut oil exhibited better performance efficiency compared to standard oil. This study also identifies that the produced Jatropha oil was inadequate for high voltage equipment. Conclusion: In conclusion, a preliminary study essential for final usage of 0.6 wt% Al2O3 nanofluids and coconut oil for high voltage equipment is recommended as well as the improvement of the performance characteristics of Jatropha oil for usage in high voltage equipment.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73801269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Path integral in quantum field theories","authors":"N. Fabiano","doi":"10.5937/vojtehg70-35882","DOIUrl":"https://doi.org/10.5937/vojtehg70-35882","url":null,"abstract":"Introduction/purpose: Starting from the Hamiltonian an alternative description of quantum mechanics has been given, based on the sum of all possible paths between an initial and a final point. Methods: Theoretical methods of mathematical physics. Integral method based on the path integral. Results: The method and concepts of the path integral could be applied to other branches of physics, not limited to quantum mechanics. Conclusions: The Path Integral approach gives a global description of fields, unlike the usual Lagrangian approach which is a local description of fields.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76067077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defining risks on road sections during the transport of dangerous goods in the Serbian army using the linear mathematical programming model","authors":"Jovana Planić","doi":"10.5937/vojtehg70-36071","DOIUrl":"https://doi.org/10.5937/vojtehg70-36071","url":null,"abstract":"Introduction/purpose: The paper presents a model for the selection of a route for the transport of dangerous goods using DEA (Data Envelopment Analysis) models and fuzzy logic systems. The presented model is used to define the risk on road sections during the transport of dangerous goods as well as to select the optimal route for the realization of the transport task. Methods: The model consists of two phases. The first phase includes the application of DEA models in which formed input and output models are connected in the output DEA final form which shows routes with a satisfactory level of traffic safety and at the same time eliminates routes with low traffic safety. The second phase involves the application of fuzzy logic systems, and as a way out of the fuzzy system, preference is given to one route. Route evaluation is based on six criteria, namely: route length, number of access points, AADT (annual average daily traffic), the number of traffic accidents with fatalities, the number of traffic accidents with the injured and the number of traffic accidents with material damage. When the values of the input criteria are entered, a calculation and evaluation is performed, and, as an exit from the fuzzy system, preference is given to one of the entered routes (the route with the lowest level of risk). The criteria used were defined on the basis of expert assessments. Results: A user program that represents decision support in traffic service. Conclusion: The user platform was created for the Matlab R2015a software package with the ability to be adapted to specific problems.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87914140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Domination on cactus chains of pentagons","authors":"Miroslava Mihajlov-Carević","doi":"10.5937/vojtehg70-36576","DOIUrl":"https://doi.org/10.5937/vojtehg70-36576","url":null,"abstract":"Introduction/purpose: A graph as a mathematical object occupies a special place in science. Graph theory is increasingly used in many spheres of business and scientific fields. This paper analyzes pentagonal cactus chains, a special type of graphs composed of pentagonal cycles in which two adjacent cycles have only one node in common. The aim of the research is to determine the dominant set and the dominance number on ortho and meta pentagonal cactus chains. Methods: When the corresponding destinations are treated as graph nodes and the connections between them as branches in the graph, the complete structure of the graph is obtained, to which the laws of graph theory are applied. The vertices of the pentagon are treated as nodes of the graph and the sides as branches in the graph. By applying mathematical methods, the dominance was determined on one pentagon, then on two pentagons with a common node, and then on ortho and meta pentagonal cactus chains. Results: The research has shown that the dominance number on the ortho chain 𝑂ℎ of the length h ≥ 2 is equal to the value of the expression ⌈ 3ℎ 2 ⌉ while on the meta chain 𝑀ℎ it is equal to the value of the expression h+1, which was proven in this paper. Conclusion: The results show that the dominant sets and the dominance numbers on ortho and meta pentagonal cactus chains are determined and explicitly expressed by mathematical expressions. They also point to the possibility of their application in the fields of science as well as in the spheres of business in which these structures appear.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87402704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Logistics support of the Serbian Armed Forces: Supply and maintenance through public procurement","authors":"M. Ilić","doi":"10.5937/vojtehg70-35171","DOIUrl":"https://doi.org/10.5937/vojtehg70-35171","url":null,"abstract":"Introduction/purpose: The work is based on the Rule of the Technical Service, the Law on Public Procurement, as well as on the experience gained in performing the duties of the Chief of Logistics in the Logistics Battalion of the Armed Forces. It contains the concept of Logistics Support and presents a part of the supply and maintenance system through Public Procurement in the Logistics Battalion of the Armed Forces. Methods: The theoretical system of supply and maintenance is very complex and consists of a number of elements, organizational units, as well as certain principles. During the implementation, it is necessary to take into account all the principles and adhere to the rules and instructions. Also important was the help of colleagues from the Armed Forces and other state institutions who are in relevant positions and are important for logistics support. Results: The final result of the work is a presentation of some activities performed by the logistics body in the battalion with a review of procurement under account 4252. In the final part of the paper, the emphasis is placed on the instructions which regulate and define the division of procurement in more detail, as well as on the implementation according to expenditure account 4252 on \"ongoing maintenance and repair of equipment\". Conclusion: During the preparation of the paper, the biggest difficulty was the change of various rules and laws. Some rules and literature were written in the 1970s, and are still in force. A proposal for further tendencies would be to define new rules and organizations based on the experience of the countries in the region where the system has taken root.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77000435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Saddle point approximation to Higher order","authors":"N. Fabiano, Nikola Mirkov","doi":"10.5937/vojtehg70-33507","DOIUrl":"https://doi.org/10.5937/vojtehg70-33507","url":null,"abstract":"Introduction/purpose: Saddle point approximation has been considered in the paper Methods: The saddle point method is used in several different fields of mathematics and physics. Several terms of the expansion for the factorial function have been explicitely computed. Results: The integrals estimated in this way have values close to the exact one. Conclusions: Higher order corrections are not negligible even when requiring moderate levels of precision.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83946906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}