Duško Tešić, Darko Božanić, D. Pamučar, Jamalud Din
{"title":"DIBR - Fuzzy MARCOS model for selecting a location for a heavy mechanized bridge","authors":"Duško Tešić, Darko Božanić, D. Pamučar, Jamalud Din","doi":"10.5937/vojtehg70-35944","DOIUrl":"https://doi.org/10.5937/vojtehg70-35944","url":null,"abstract":"Introduction/purpose: The paper presents the DIBR-FMARCOS model of multi-criteria decision-making for defining a location for placing a bridge over an obstacle using a heavy mechanized bridge (TMM-3). After the application of the proposed model, the sensitivity analysis of the output results was performed and it was concluded that the model is stable, i.e. that the model gives consistent results and that its application is possible in real situations. Methods: The DIBR method was used to determine the weight coefficients of the criteria, while the ranking of alternatives was performed by the FuzzyMARCOS method. Results: The application of this model has led to the selection of the location for placing a bridge from the TMM-3 set, based on the defined criteria. After applying the proposed model, the sensitivity analysis of the output results was performed and the consistency of the output results of the method was proven. Conclusion: Finally, it was concluded that the proposed model can be applied in practice, because it gives stable output results. It was also concluded that the DIBR method facilitates the process of obtaining the weight coefficients of the criteria, and the FMARCOS method copes well with unclear and inaccurate input data and has good stability. This model can be further improved by more detailed operationalization of the criteria, as well as by the use of other different methods for determining the weights of the criteria and ranking.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"191 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86660506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static absorber modelling","authors":"Milica Đekić","doi":"10.5937/vojtehg70-34776","DOIUrl":"https://doi.org/10.5937/vojtehg70-34776","url":null,"abstract":"Introduction/purpose: A static absorber is capable of neutralizing any signal either in the physical or virtual domain and its analysis will be presented in this paper. Methods: The approach used here includes purely scientific thoughts as well as a model with its explanations evaluated step by step applying highly sophisticated computer tools for design and simulation. No empirical results will be attached, only claims with their evidence. Results: The crucial outcome of this research is a completely new approach to binary systems that are now observed as a set of real numbers. Conclusion: The purpose of this research is to introduce something brand-new that can be used in cyber industry while a dynamic variation of the absorber is still under development.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79429067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"70 years of the Military Technical Courier","authors":"Nebojša Gaćeša","doi":"10.5937/vojtehg70-40505","DOIUrl":"https://doi.org/10.5937/vojtehg70-40505","url":null,"abstract":"This Editorial marks the jubilee which the scientific journal Military Technical Courier celebrates in 2022-70 years of regular and continuous publication. On this occasion, the Editorial Office expresses gratitude to institutions and individuals who have contributed most to the progress and success of the Journal.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89456605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Paunović, Parveen Kumar, Savita Malik, M. Kumar
{"title":"Property P in modular metric spaces","authors":"L. Paunović, Parveen Kumar, Savita Malik, M. Kumar","doi":"10.5937/vojtehg70-36958","DOIUrl":"https://doi.org/10.5937/vojtehg70-36958","url":null,"abstract":"Introduction/purpose: The aim of this paper is to present the concept of the generalized ∅-weak contractive condition involving various combinations of d(x,y) in modular metric spaces. Methods: Conventional theoretical methods of functional analysis. Results: This study presents the result of (Murthy & Vara Prasad, 2013) for a single-valued mapping satisfying a generalized ∅ -weak contractive condition involving various combinations of d(x,y). It is generalized in the setting of modular metric spaces, and then it is proved that this single-valued map satisfies the property P. In the end, an example is given in support of the result. Conclusion: With proper generalisations, it is possible to formulate well-known results of classical metric spaces to the case of modular metric spaces.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"94 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83905046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Certain integrals involving generalized Mittag-Leffler type functions","authors":"Sirazul Haq, M. Aphane, Mohammad Khan, N. Fabiano","doi":"10.5937/vojtehg70-40296","DOIUrl":"https://doi.org/10.5937/vojtehg70-40296","url":null,"abstract":"Introduction/purpose: Certain integrals involving the generalized Mittag-Leffler function with different types of polynomials are established. Methods: The properties of the generalized Mittag-Leffler function are used in conjunction with different kinds of polynomials such as Jacobi, Legendre, and Hermite in order to evaluate their integrals. Results: Some integral formulae involving the Legendre function, the Bessel Maitland function and the generalized hypergeometric functions are derived. Conclusions: The results obtained here are general in nature and could be useful to establish further integral formulae involving other kinds of polynomials.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88303385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of probability-based multi-objective optimization in material engineering","authors":"M. Zheng","doi":"10.5937/vojtehg70-35366","DOIUrl":"https://doi.org/10.5937/vojtehg70-35366","url":null,"abstract":"Introduction/purpose: Althought many methods have been proposed to deal with the problem of material selection, there are inherent defects of additive algorithms and subjective factors in such algorithms. Recently, a probability-based multi-objective optimization was developed to solve the inherent shortcomings of the previous methods, which introduces a novel concept of preferable probability to reflect the preference degree of the candidate in the optimization. In this paper, the new method is utilized to conduct an optimal scheme of the switching material of the RF-MEMS shunt capacitive switch, the sintering parameters of natural hydroxyapatite and the optimal design of the connecting claw jig. Methods: All performance utility indicators of candidate materials are divided into two groups, i.e., beneficial or unbeneficial types for the selection process; each performance utility indicator contributes quantitatively to a partial preferable probability and the product of all partial preferable probabilities makes the total preferable probability of a candidate, which transfers a multi-objective optimization problem into a single-objective optimization one and represents a uniquely decisive index in the competitive selection process. Results: Cu is the appropriate material in the material selection for RF - MEMS shunt capacitive switches; the optimal sintering parameters of natural hydroxyapatite are at 1100°C and 0 compaction pressure; and the optimal scheme is scheme No 1 for the optimal design of a connecting claw jig. Conclusion: The probability-based multi-objective optimization can be easily used to deal with an optimal problem objectively in material engineering.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91138507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes: An end-user perspective","authors":"S. Ilić, M. Gnjatović, Brankica Popović, N. Maček","doi":"10.5937/vojtehg70-36196","DOIUrl":"https://doi.org/10.5937/vojtehg70-36196","url":null,"abstract":"Introduction/purpose: This paper reports on a pilot comparative analysis of the Cuckoo and Drakvuf sandboxes. These sandboxes are selected as the subjects of the analysis because of their popularity in the professional community and their complementary approaches to analyzing malware behavior. Methods: Both sandboxes were set up with basic configurations and confronted with the same set of malware samples. The evaluation was primarily conducted with respect to the question of to what extent a sandbox is helpful to the human analyst in malware analysis. Thus, only the information available in Web console reports was considered. Results: Drakvuf is expected to perform better when confronted with evasive malware and so-called \"file-less\" malware. Although still not mature in terms of integration, customization and tools, this sandbox is considered a second generation sandbox because of its agentless design. On the other hand, the Cuckoo sandbox creates a better overall experience: it is supported through good documentation and strong professional community, better integrated with various tools, support more virtualization, operating system and sample types, and generates more informative reports. Even with a smaller capacity to prevent evasive malware, its Python 2 agent script makes it more powerful than Drakvuf. Conclusion: To achieve the optimal open-source sandbox-based protection, it is recommended to apply both the Cuckoo and Drakvuf sandboxes. In circumstances of limited resources, applying the Cuckoo sandbox is preferable, especially if exposure to malware deploying evading techniques is not frequently expected.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82718622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Golubičić, S. Simic, A. Zejak, B. Reljić, Svetislav Marić
{"title":"High speed target tracking 371 radar system based on the use of BPSK signal and digital Doppler shift compensation","authors":"Z. Golubičić, S. Simic, A. Zejak, B. Reljić, Svetislav Marić","doi":"10.5937/vojtehg70-36589","DOIUrl":"https://doi.org/10.5937/vojtehg70-36589","url":null,"abstract":"Introduction/purpose: This paper presents a model of a high speed target radar tracking system that is much simpler than the existing ones. The Doppler shift is compensated before signal compression, simultaneously with the modification of the clock signal in the compression filter. This is possible thanks to the development of FPGA technology. The most important for this application are very fast clock control units which enable operation with different frequency references up to 1 GHz with an accuracy far below 1 Hz. Methods: In this paper, the methodology of mathematical modeling and simulation is used. Results: The results of the analysis of the most important effects in radars caused by high-speed targets are presented and discussed - target migration through resolution cells and compression filter response distortion due to high target acceleration. Conclusion: Thanks to flexible RF and signal processing hardware, complex radar processing procedures are not required. The sensitivity of the BPSK signal to the Doppler shift (which is usually considered a disadvantage) can be used to reject targets at a slightly different rate. This system can be used in space debris tracking, airspace target tracking, car driving, etc.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"2016 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73564218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meiran Galis, T. Unkašević, Z. Banjac, M. Milosavljevic
{"title":"Protocols for symmetric secret key establishment: Modern approach","authors":"Meiran Galis, T. Unkašević, Z. Banjac, M. Milosavljevic","doi":"10.5937/vojtehg70-36607","DOIUrl":"https://doi.org/10.5937/vojtehg70-36607","url":null,"abstract":"Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems. Defining and implementing efficient protocols for symmetric cryptographic keys establishment in such circumstances is of great importance in raising information security in cyberspace. Methods: Using the methods of Information Theory and Secure Multiparty Computation, protocols for direct establishment of cryptographic keys between communication parties have been defined. Results: The paper defines two new approaches to the problem of establishing cryptographic keys. The novelty in the protocol defined in the security model based on information theory is based on the source of common randomness, which in this case is the EEG signal of each subject participating in the communication system. Experimental results show that the amount of information leaking to the attacker is close to zero. A novelty in the second case, which provides security with keys at the level of computer security by applying Secure Multiparty Computation, is in the new application field, namely generation and distribution of symmetric cryptographic keys. It is characteristic of both approaches that within the framework of formal theories, it is possible to draw conclusions about their security characteristics in a formal way. Conclusions: The paper describes two new approaches for establishing cryptographic keys in symmetric cryptographic systems with experimental results. The significance of the proposed solutions lies in the fact that they enable the establishment of secure communication between communication parties from end to end, avoiding the influence of a trusted third party. In that way, the achieved communication level security significantly increases in relation to classical cryptographic systems.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77363022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determination of an efficient power equipment oil through a multi-criteria decision making analysis","authors":"J. Abifarin, J. Ofodu","doi":"10.5937/vojtehg70-36024","DOIUrl":"https://doi.org/10.5937/vojtehg70-36024","url":null,"abstract":"Introduction/purpose: Several studies in the area of the development of nanofluids for power equipment have left a gap unfilled as to how to determine the best oil among the produced oils for power equipment application. Therefore, this study presents a multi-criterial decision making analysis to determine the best oil for power equipment. Methods: The Grey relational analysis (GRA) and the Probability based multi-objective optimization techniques were employed as the multi-criterial decision making analytical tools for the optimization. Dielectric strength, dielectric loss, viscosity, and flash point were analyzed as multiple performance characteristics of different oils, after which different oil candidates were ranked based on their performance. Results: Interestingly, the GRA and the Probability based multi-objective optimization techniques revealed that Jatropha oil + Neem nanofluid is the best oil candidate for power equipment and it is better than conventional mineral oil. The Probability based multi-objective optimization technique places Jatropha nanofluid over mineral oil, but not for the GRA technique. Also, mineral oil and ordinary Jatropha nanofluids are at a competitive level. Meaning, if Jatropha nanofluid is further worked on, it can beat mineral oil. Conclusion: The two techniques substantially established that when Jatropha oil is mixed with Neem oil together with nanoparticles, there will be better power equipment performance compared to mineral oil. It can be recommended that a further analysis should be conducted in the area of direct application of Jatropha + Neem nanofluid for power equipment to understand the overall behavior of power equipment compared to the conventional mineral oil","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76127553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}