Dušan Bogićević, Ivan Tot, Radomir Prodanović, Bojana Todorović
{"title":"Identification of soldiers and weapons in military armory based on comparison image processing and RFID tag","authors":"Dušan Bogićević, Ivan Tot, Radomir Prodanović, Bojana Todorović","doi":"10.5937/VOJTEHG69-28114","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-28114","url":null,"abstract":"Dušan Lj. Bogićević, Ivan A. Tot, Radomir I. Prodanović, Bojan J. Todorović a Serbian Armed Forces, General Staff, Department for Telecommunication and Informatics (Ј-6), Center for C4 and IT support, Belgrade, Republic of Serbia; University of Niš, Faculty of Electronic Engineering, Niš, Republic of Serbia, e-mail: dusan.bogicevic@gmail.com, ORCID iD: http://orcid.org/0000-0002-4300-2490 b University of Defence in Belgrade, Military Academy, Department for information systems and telecommunication engineering, Belgrade, Republic of Serbia, e-mail: ivan.tot@va.mod.gov.rs, corresponding author, ORCID iD: http://orcid.org/0000-0002-5862-9042 c Serbian Armed Forces, General Staff, Department for Telecommunication and Informatics (Ј-6), Center for Applied Mathematics and Electronics, Belgrade, Republic of Serbia, e-mail: radomir.prodanovic@vs.rs, ORCID iD: http://orcid.org/0000-0002-2067-2758 d Serbian Armed Forces, General Staff, Military Police Detachment for Special Purposes \"Kobre\", Belgrade, Republic of Serbia, e-mail: todorovicbojan@yahoo.com, ORCID iD: https://orcid.org/0000-0002-7028-274X","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"69 1","pages":"179-195"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71187476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple-criteria model for optimal Anti Tank Ground missile weapon system procurement","authors":"D. Pamučar, Slobodan Dimitrijević","doi":"10.5937/vojtehg69-32117","DOIUrl":"https://doi.org/10.5937/vojtehg69-32117","url":null,"abstract":"Introduction: Anti Tank Ground Missiles (ATGMs) are one of the most efficient weapon systems to counter armored and mechanized units. Procurement of these weapons is imperative for armed forces of any country. Adequate evaluation and choice of an efficient ATGM system is a very important factor which affects operational capabilities of armed forces. The purpose of this paper is to present that multi criteria methods can be a useful tool for optimal procurement of ATGMs for armed forces. Methods: The implementation of the TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) and the MABAC (Multi Attributive Border Approximation Area Comparison) multi criteria methods will be proposed for decision makers to solve the problem of ATGM procurement. In this paper, four models of ATGMs will be proposed as possible solutions. These ATGMs will be presented as alternatives A1, A2, A3 and A4. Results: The implementation of the methods in this paper has led to the conclusion that the alternative A2 has the highest value and therefore the best course of action for decision makers is to chose procurement of this model of ATGMs. Conclusion: The conclusion is that the mathematical models of multi-criteria decision making presented in this paper unequivocally point to the alternative with the best characteristics, thus presenting extremely useful tools for decision makers.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74105692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new operation on soft sets: 791 extended symmetric difference of soft sets","authors":"Nenad Stojanović","doi":"10.5937/vojtehg69-33655","DOIUrl":"https://doi.org/10.5937/vojtehg69-33655","url":null,"abstract":"Introduction/purpose: Molodtsov introduced the concept of soft sets as a new mathematical tool for dealing with problems containing uncertainties. In the literature, different kinds of operations of soft sets are defined and used in theory and applications. Methods: This study is based on the paper \"A New Operation on Soft Sets: Extended Difference of Soft Sets\" by Sezgin, Ahmad and Mehmood [Journal of New Theory 27 (2019) 33-42]. Results: In this paper, we define a new operation on soft sets, called extended symmetric difference and investigate its relationship between extended symmetric difference and restricted symmetric difference and some other operations of soft sets. Conclusion: The author believes that the obtained results represent a significant improvement of many known results in the existing literature.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86169514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nezhad Dehghan, A. Forough, Nikola Mirkov, S. Radenović
{"title":"A new version of the results of UN-hypermetric spaces","authors":"Nezhad Dehghan, A. Forough, Nikola Mirkov, S. Radenović","doi":"10.5937/vojtehg69-32197","DOIUrl":"https://doi.org/10.5937/vojtehg69-32197","url":null,"abstract":"Introduction/purpose: The aim of this paper is to present the concept of a universal hypermetric space. An n-dimensional (n ≥ 2) hypermetric distance over an arbitrary non-empty set X is generalized. This hypermetric distance measures how separated all n points of the space are. The paper discusses the concept of completeness, with respect to this hypermetric as well as the fixed point theorem which play an important role in applied mathematics in a variety of fields. Methods: Standard proof based theoretical methods of the functional analysis are employed. Results: The concept of a universal hypermetric space is presented. The universal properties of hypermetric spaces are described. Conclusion: This new version of the results for UN-hypermetric spaces may have applications in various disciplines where the degree of clustering is sought for.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"11 5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87299031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ivan Tot, J. Bajčetić, B. Jovanovic, Mladen Trikoš, Dušan Bogićević, T. Gajić
{"title":"Biometric standards and methods","authors":"Ivan Tot, J. Bajčetić, B. Jovanovic, Mladen Trikoš, Dušan Bogićević, T. Gajić","doi":"10.5937/vojtehg69-32296","DOIUrl":"https://doi.org/10.5937/vojtehg69-32296","url":null,"abstract":"Introduction/purpose: Nowadays, user identification systems play a very important role in modern society. Complex security requirements have led experts to explore ways in which biometric data can be used to identify user identities. This paper presents an overview of biometric standards and methods which can be used to identify users in biometric systems, and therefore to protect information and communication systems. Methods: This paper deals with the problem of standardization in the field of biometrics. The first part of the paper presents concrete examples of the most widely used biometric standards. The second part of the paper gives an overview of the most used biometric methods. Results: The obtained results show that the development of biometric systems and biometric sensors contributes to better protection of identity from misuse, because biometric technologies have great potential for improving the security and accuracy of system operation. Biometric systems improve the security of users and also provide much greater precision in establishing identity. Conclusion: The development of biometric standards should focus on their interconnectivity, as well as on increasing connectivity with other IT standards.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"s3-38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90827564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"25 years of the TETRA standard and technology for contemporary digital trunking systems of professional mobile radio communications","authors":"Slađan Svrzić","doi":"10.5937/VOJTEHG69-29340","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-29340","url":null,"abstract":"Introduction/purpose: For the construction of functional mobile radio communication systems today, the trunking systems of digital mobile radio communications are almost exclusively used, the main representative of which is the system with the application of TETRA standards. This article describes the beginnings and historical development of this standard, with the activities of ETSI and TETRA MoU in the fight for the availability and harmonization of the frequency spectrum. Methods: A description of relevant issues of the origin and development of the TETRA 1 standard is given as well as the analysis of the characteristic moments of the innovated TETRA 2 standard. Results: This article describes the beginnings and historical development of this standard, with the activities of ETSI and TETRA MoU in the fight for the availability and harmonization of the frequency spectrum. It also systematize the use of the key TETRA systems in the world and shows its share in the world market by sectors, emphasizing the dilemma of its further development at the crossroads after 25 years of existence. Also, a basic overview of the TETRA 1 standard is given while the basic elements and the principle of its application are described. The innovated TETRA 2 standard and the improvements achieved in the way of data transmission are described in more detail; the process of interoperability certification and, in connection with that, the entry of TETRA into the North American market is emphasized. The parameters selected for advanced data transfer according to the TETRA 2-TEDS standard are presented and analyzed, together with an overview of some limitations during practical application. Conclusion: In the conclusion, the current moment of TETRA is analyzed with a focus on its future after 25 years of development, emohasizing a possibility of modernizing and improving the TETRA network of the Ministry of the Interior of Serbia for the needs of the MoD and the Serbian Armed Forces.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"69 1","pages":"426-460"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71187970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Description of the process of tunneling Q signaling in private telecommunication networks","authors":"Slađan Svrzić, Z. Miličević, Z. Perišić","doi":"10.5937/VOJTEHG69-28117","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-28117","url":null,"abstract":"Introduction/purpose: The article should specify the network signaling type Q-SIG, which is standardized especially for implementation in digital telecommunication networks of integrated services (ISDN), emphasizing the possibility of its further application in the Private Telecommunications Network of Integrated Services of the Serbian Armed Forces (PISN of SAF), i.e. in the Private Automatic Telephone Network of the Serbian Armed Forces (PATN of SAF). Methods: An analysis of the existing standards was performed: ECMA355 and ECMA-336 and a synthesis of the possibilities of their application in the PATN of SAF. Results: The procedure for the application of Q-SIG is processed in a situation when the peripheral parts of the PISN of SAF, which operate on the principle of transmission and circuit switching by TDM (Time Division Multiplexing), are connected via a central Core network with the IP (Internet Protocol), which operates on the principle of packet transmission and switching with the SIP (Session Initiation Protocol). A method of the application of the tunneling of encapsulated Q-SIG messages through the IP network, defined by ECMA-355 Standard, has been developed. The necessary functions for mapping the transmission of tunneled signaling messages Q-SIG and mapping voice (and other audio) information to media streams during VoIP","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"69 1","pages":"31-63"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71188290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safety in residential buildings: Evacuation from residential buildings without fire escape stairs","authors":"R. Jevtić","doi":"10.5937/VOJTEHG69-28170","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-28170","url":null,"abstract":"Introduction/purpose: Safety in high residential buildings presents a very important and always actual task. In case of some unforeseen and dangerous occurrences, their residents must be evacuated. Fire, earthquakes, and terrorism are only some of such situations. The speed of evacuation from high residential buildings depends on many different factors. A particularly difficult and complex evacuation task concerns buildings without fire escape stairs. Methods: The modeling method was used in this paper. Based on a real object - a residential building, an appropriate simulation model was realized in appropriate simulation software. Results: The results of this paper have shown that, out of four scenarios, the fastest evacuation was for the evacuation speed of 1.75 m/s. The first two scenarios did not report any jams, unlike the third and fourth scenario; in the third scenario, the occupants' speeds were 0.75 m/s and 1.25 m/s while in the fourth scenario, the simulated occupants' speeds were from 0.75 m/s to 1.75 m/s. Conclusion:The usage of appropriate simulation software enables fast, precise, safe and cheap calculation of evacuation times and it can significantly improve evacuation procedures and evacuation strategies.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71188359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cause-effect relationship between air quality and public health in the city of Novi Sad based on the DPSEEA model","authors":"Emina Kričković","doi":"10.5937/VOJTEHG69-29301","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-29301","url":null,"abstract":"Introduction/purpose: The research subject in this article is the status of the air quality in the city of Novi Sad and its impact on the health of the population. The relation between these two points will be presented using the DPSEEA model. The research aim of this article is to apply proper measures in order to mitigate negative effects on human health, based on scientific knowledge related to air quality influence on the health of the Novi Sad population. The basic hypothesis of this research implies that air quality affects Novi Sad's population health. Methods: The following methods were used in this article: modeling, analysis-synthesis, statistic method, classification method, combining method, geographic-ecological method, method ofgeographic-medical description, method of the medical geography forecast as well as cartographic method. Results: Based on the DPSEEA model and the example of the air pollution in the city of Novi Sad, the following was identified: air pollution driving forces, pressures, state of the air quality, population exposure to air pollution, effects on human health as well as measures and actions that should be conducted. The mentioned model was also used to present the relationship between these segments. Conclusion: The given model deals with a wide spectrum ofpotential forces (harmful effects) and necessary community actions, bringing together professionals, people in the field and those from laboratories as well as managers in the area of environment and public health management, in order to tackle emerging problems in a comprehensive manner.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"69 1","pages":"88-113"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71188390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spoofing in aviation: Security threats on GPS and ADS-B systems","authors":"Dejan Kožović, Dragan Đurđević","doi":"10.5937/VOJTEHG69-30119","DOIUrl":"https://doi.org/10.5937/VOJTEHG69-30119","url":null,"abstract":"Introduction/purpose: The paper provides a review of recent research in the field of GPS and ADS-B spoofing. Systems that rely on satellite positioning technology can be targeted by spoofing in order to generate incorrect positioning/timing, which is accomplished by inserting false signals into the \"victim's\" receiver. Attackers try to insert false positioning information into systems that, for example, provide navigation of airplanes or drones for the purpose of hijacking or distracting security/safety in airspace surveillance. New concepts of navigation and ATC will thus be necessary. Methods: Using a scientific approach, the paper gives an evaluation of GPS and ADS-B spoofing/antispoofing and how spoofing affects the cyber security of aviation systems. Results: Based on the methodological analysis used, the importance of studying spoofing/anti-spoofing in aviation is shown. Conclusion: Although spoofing in aviation is only a potential threat, its technical feasibility is realistic and its potential is considerable; it becomes more flexible and cheaper due to very rapid advancement of SDR technologies. The real risk, in the time to come, are potential spoofing attacks that could occur from the air, using drones. However, aircraft systems are not exposed to spoofing without any defense; receivers can detect it by applying various anti-spufing techniques. Also, pilots are able to detect and solve problems at every stage of the flight. However, due to a possibility of more sophisticated spoofing attacks, international organizations such as ICAO are proactively working to increase GPS and ADS-B systems robustness on spoofing.","PeriodicalId":30576,"journal":{"name":"Vojnotehnicki Glasnik","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71188673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}