A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

              [Sort by number of followers]   [Restore default list]

  Subjects -> MILITARY (Total: 108 journals)
Showing 1 - 24 of 24 Journals sorted alphabetically
Africa Conflict Monitor     Full-text available via subscription   (Followers: 7)
Armed Conflict Survey     Full-text available via subscription   (Followers: 14)
Armed Forces & Society     Hybrid Journal   (Followers: 24)
Arms & Armour     Hybrid Journal   (Followers: 9)
British Journal for Military History     Open Access   (Followers: 40)
Bulletin of the Atomic Scientists     Hybrid Journal   (Followers: 6)
Ciencia y Poder Aéreo     Open Access   (Followers: 2)
Civil Wars     Hybrid Journal   (Followers: 21)
Coleção Meira Mattos : Revista das Ciências Militares     Open Access  
Conflict, Security & Development     Hybrid Journal   (Followers: 423)
Critical Military Studies     Hybrid Journal   (Followers: 4)
CRMA Journal of Humanities and Social Sciences     Open Access   (Followers: 1)
Cuadernos de Marte     Open Access  
Defence and Peace Economics     Hybrid Journal   (Followers: 22)
Defence Science Journal     Open Access   (Followers: 39)
Defence Studies     Hybrid Journal   (Followers: 30)
Defence Technology     Open Access   (Followers: 4)
Defense & Security Analysis     Hybrid Journal   (Followers: 31)
Digital War     Hybrid Journal   (Followers: 2)
Disaster and Military Medicine     Open Access   (Followers: 5)
Doutrina Militar Terrestre em Revista     Open Access   (Followers: 1)
Eesti Sõjaajaloo Aastaraamat / Estonian Yearbook of Military History     Open Access   (Followers: 2)
EsSEX : Revista Científica     Open Access   (Followers: 1)
First World War Studies     Hybrid Journal   (Followers: 28)
Fra Krig og Fred     Open Access   (Followers: 2)
Gettysburg Magazine     Full-text available via subscription  
Great Circle: Journal of the Australian Association for Maritime History, The     Full-text available via subscription   (Followers: 7)
Headmark     Full-text available via subscription   (Followers: 2)
Human Factors and Mechanical Engineering for Defense and Safety     Hybrid Journal   (Followers: 1)
International Bibliography of Military History     Hybrid Journal   (Followers: 9)
International Journal of Intelligent Defence Support Systems     Hybrid Journal   (Followers: 5)
International Peacekeeping     Hybrid Journal   (Followers: 473)
Journal for Maritime Research     Hybrid Journal   (Followers: 12)
Journal of Bioterrorism & Biodefense     Open Access   (Followers: 6)
Journal of African Military History     Hybrid Journal   (Followers: 1)
Journal of Archives in Military Medicine     Open Access   (Followers: 3)
Journal of Chinese Military History     Hybrid Journal   (Followers: 6)
Journal of Conflict and Security Law     Hybrid Journal   (Followers: 19)
Journal of Conventional Weapons Destruction     Open Access   (Followers: 3)
Journal of Defense Modeling and Simulation : Applications, Methodology, Technology     Hybrid Journal   (Followers: 5)
Journal of Defense Studies & Resource Management     Hybrid Journal   (Followers: 1)
Journal of Military and Information Science     Open Access   (Followers: 5)
Journal of Military and Strategic Studies     Open Access   (Followers: 4)
Journal of Military and Veterans Health     Full-text available via subscription   (Followers: 10)
Journal of Military Ethics     Hybrid Journal   (Followers: 11)
Journal of Military Experience     Open Access   (Followers: 7)
Journal of Military History     Full-text available via subscription   (Followers: 34)
Journal of Military Studies     Open Access   (Followers: 5)
Journal of National Security Law & Policy     Free   (Followers: 8)
Journal of Naval Architecture and Marine Engineering     Open Access   (Followers: 5)
Journal of Naval Sciences and Engineering     Open Access   (Followers: 1)
Journal of power institutions in post-soviet societies     Open Access   (Followers: 2)
Journal of Slavic Military Studies     Hybrid Journal   (Followers: 17)
Journal of Terrorism Research     Open Access   (Followers: 26)
Journal of the Royal Army Medical Corps     Hybrid Journal   (Followers: 9)
Journal on Baltic Security     Open Access   (Followers: 3)
Martial Arts Studies     Open Access   (Followers: 1)
Media, War & Conflict     Hybrid Journal   (Followers: 15)
Medical Journal Armed Forces India     Full-text available via subscription  
Medicine, Conflict and Survival     Hybrid Journal   (Followers: 3)
Militärgeschichtliche Zeitschrift     Hybrid Journal   (Followers: 6)
Military Behavioral Health     Hybrid Journal   (Followers: 6)
Military Medical Research     Open Access   (Followers: 4)
Military Medicine     Hybrid Journal   (Followers: 9)
Military Psychology     Hybrid Journal   (Followers: 10)
Modern Information Technologies in the Sphere of Security and Defence     Open Access   (Followers: 2)
Naval Research Logistics: an International Journal     Hybrid Journal   (Followers: 3)
Nonproliferation Review     Hybrid Journal   (Followers: 5)
O Adjunto : Revista Pedagógica da Escola de Aperfeiçoamento de Sargentos das Armas     Open Access   (Followers: 2)
Perspectives on Terrorism     Open Access   (Followers: 475)
Post-Soviet Armies Newsletter     Open Access   (Followers: 1)
Problemy Mechatroniki. Uzbrojenie, lotnictwo, inżynieria bezpieczeństwa / Problems of Mechatronics. Armament, Aviation, Safety Engineering     Open Access   (Followers: 3)
Revista Agulhas Negras     Open Access   (Followers: 1)
Revista Babilônia     Open Access   (Followers: 1)
Revista Científica Fundação Osório     Open Access  
Revista Científica General José María Córdova     Open Access  
Revista Cubana de Medicina Militar     Open Access   (Followers: 1)
Revista do Exército     Open Access   (Followers: 1)
Revista Militar de Ciência e Tecnologia     Open Access   (Followers: 1)
Revista Política y Estrategia     Open Access  
Sabretache     Full-text available via subscription   (Followers: 1)
Sanidad Militar     Open Access  
Scandinavian Journal of Military Studies     Open Access   (Followers: 1)
Scientia Militaria : South African Journal of Military Studies     Open Access   (Followers: 4)
Scientific Journal of Polish Naval Academy     Open Access  
Securitologia     Open Access   (Followers: 1)
Security and Defence Quarterly     Open Access   (Followers: 7)
Security Studies     Hybrid Journal   (Followers: 48)
Signals     Full-text available via subscription   (Followers: 2)
Small Wars & Insurgencies     Hybrid Journal   (Followers: 377)
Small Wars Journal     Open Access   (Followers: 17)
Social Development & Security : Journal of Scientific Papers     Open Access   (Followers: 1)
Special Operations Journal     Hybrid Journal   (Followers: 1)
Strategic Comments     Hybrid Journal   (Followers: 6)
The Military Balance     Hybrid Journal   (Followers: 9)
The RUSI Journal     Hybrid Journal   (Followers: 17)
Transportation Research Part E: Logistics and Transportation Review     Hybrid Journal   (Followers: 22)
United Service     Full-text available via subscription   (Followers: 1)
University of Miami National Security & Armed Conflict Law Review     Open Access   (Followers: 1)
Vierteljahrshefte für Zeitgeschichte. Das zentrale Forum der Zeitgeschichtsforschung     Hybrid Journal   (Followers: 11)
Vojnotehnički Glasnik     Open Access   (Followers: 1)
Vulcan     Hybrid Journal   (Followers: 1)
War & Society     Hybrid Journal   (Followers: 26)
War in History     Hybrid Journal   (Followers: 23)
Whitehall Papers     Hybrid Journal   (Followers: 3)
Wiedza Obronna     Open Access   (Followers: 2)
Zeitschrift für Slawistik     Hybrid Journal   (Followers: 1)
선진국방연구     Open Access  

              [Sort by number of followers]   [Restore default list]

Similar Journals
Journal Cover
Modern Information Technologies in the Sphere of Security and Defence
Number of Followers: 2  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2311-7249 - ISSN (Online) 2410-7336
Published by National Defence University of Ukraine named after Ivan Cherniakhovsky Homepage  [1 journal]
  • PRINCIPLES OF MODELING

    • Authors: Victor E. Bobylov, Yurii M. Zinchenko, Serhii M. Kononenko
      Pages: 18 - 23
      Abstract: Principles of modeling presented in this article were obtained from the analysis of years of experience creating computer models of military structures in the relevant ministries of defense around the world. Military Computer models are very similar to computer games and in some cases is the future of computer games. Therefore, the principles will be described below may be present and promising applicability for developers of software and games.Create interactive worlds in computergames, the Internet spaces and models for military use has recently become well-established process based on the experiences of individual designers and programmers, inclusive. However, with the emergence of a growing number of such models and games formed the principles (fundamental, basic, etc.) For their implementation, which are characteristic for all projects of this kind. The article describes the basic principles of software products, which are obtained by the analysis of the processes of creation of software products designed to simulate combat operations and war games.
      PubDate: 2016-12-29
       
  • FEATURES OF FORMING THE SUBJECT ON THE RADAR IMAGE

    • Authors: Serhii I. Boloban, Vitalii V. Zuiko, Ruslan M. Osadchuk
      Pages: 24 - 30
      Abstract: Successful solutions of many types military and civilian tasks depends on the availability of reliable information. Such information can be obtained as a result of remote sensing of the Earth from space vehicles and underway aircraft. Among the means of remote sensing a special place occupy land survey radars with synthetic aperture antenna. The land survey radars with synthetic aperture antenna allow to receive radar display of the Earth surface high and ultra high fragmentation at any time of day, regardless of light level surface, at considerable distances surveillance and, in fact, in all weather conditions. In recent years, too considerable attention is paid the use of radar equipment to solve problems given the Earth's surface, the detection little sizes objects, getting of high detailed Earth surface display.From space or aircraft land survey radars with synthetic aperture antenna obtained data passes through several stages of processing. The most responsible, time-consuming and difficult process is one of decrypting are radar images. This process refers to the intellectual and hard-formalized type of human activity and exactly it is key in determining the efficiency of the whole system remote sensing as a whole.As long as research on the development of the theory and practice of radar images decryption in the current development of remote sensing surface is an important direction in the development of science-based foundations of maintenance the radar means of remote sensing surface.Purpose of the article is the generalization of data on features of formation and manifestation deсryptographic features of immovable objects based on experience with the radar images.
      PubDate: 2016-12-29
       
  • THE SYSTEM STRATEGIES ANALYSIS METHODS IN A RADIO ELECTRONIC CONFLICT
           BASED ON THE GAME THEORY

    • Authors: Kostiantyn V. Andrieiev, Oleh I. Sadykov, Leonid O. Bondarenko, Kateryna O. Yefanova
      Pages: 5 - 8
      Abstract: The article describes a methodical approach to the solution of actual problem of substantiation of composition and structure of electronic protection radio equipment, operating in conditions of intra-system interference and the effects of electronic countermeasures of the enemy. The application of models based on probabilistic - temporal approach, the theory of Markov chains that are the subject of a separate study in the design of radio communications equipment and the basis for evaluation of radio electronic situation. The conflict model of electronic communications systems and jamming devices built on the mathematical apparatus of game theory, comparing with the above, that most appropriate to the complexity of calculations and programming for automated systems evaluation electronic environment.
      PubDate: 2015-12-24
       
  • SYNTHESIS OF THE POSSIBILITIES LEVEL DETERMINATION DECISIONS SUPPORT
           SYSTEM OF UKRAINE ARMED FORCES DURING DEFENSE PLANNING

    • Authors: Vasyl V. Bychenkov
      Pages: 9 - 17
      Abstract: In the article is presented the general chart of researches conducting of decision the question of the prognostication difficult inertia system “Military Forces of Ukraine” state of the financing volumes depending. Thus the combination method with the limited base of arguments was developed, which unlike the known methods of regressive analysis, allows in the conditions of the limited data retrieval to build a mathematical model with the necessary quantity of arguments and necessary exactness; the method of speed-up surplus of arguments variants is developed, that unlike the method of full search allowed to shorten the number of arguments variants without the decline of efficiency of implementation of operation; got further development the mathematical description of the difficult dynamic systems, in which thanks to consideration of constituents of inertia process and application of the regressive analysis method, became possible to carry out the prognosis state of the difficult inertia system taking into account the prognosis of development of inertia processes which will pass in the system without interference with the process of subjective opinion of researcher; the system of criteria, which forms equalizations from the equalizations built by the regressive analysis method, is developed, that gave possibility to get equalizations with necessary descriptions: by sufficient exactness and high sensitiveness of prognostication results; the algorithm of adaptive control by the difficult inertia system is developed, that allowed effectively to forecast the state of the difficult inertia system and state of out of control factors which the state of the difficult inertia system relies on.
      PubDate: 2015-12-29
       
  • THE COMPARATIVE ANALYSIS OF ALGORITHMS ACTIVE QUEUE MANAGEMENT WHILE
           VARYING THE PARAMETERS OF TCP/IP NETWORKS

    • Authors: Volodymyr I. Hostiev, Vadym D. Krotov
      Pages: 31 - 37
      Abstract: The problem of providing quality of service in networks, operating on the basis of the protocol stack TCP/IP, it has been and remains relevant to the development of protocols, network equipment, service providers and end users. At all levels of the network actively used by buffering mechanisms and management queuing packets, including adaptive and designed with one hand, to serve traffic bursts with minimal losses packets, and the other - to provide sufficient bandwidth and acceptable to the end user delays. In this article, the processes in the active queue management systems (AQM- systems) using PID-, PI- and RED-controllers with variable parameters of TCP/IP network (random change of traffic load - random changes in the number of TCP sessions and random round trip time RTT) based interactive system MATLAB.
      PubDate: 2015-12-17
       
  • CODE DIVISION MULTIPLEXING IN TIMER SIGNALS

    • Authors: Mykola V. Zakharchenko, Yurii S. Horokhov, Anton S. Kril, Serhii V. Kovalchuk
      Pages: 38 - 42
      Abstract: In the paper the analysis of position correcting codes are given, a number of additional elements defined by the Varshamov-Hilbert boundary with the specified values of the informational element (m) and signal distance (d) is set, boundaries of additional elements number for the fixed m are defined. The value of maximum data rate with the fixed boundaries is defined. It is shown that the power of two sources message sum multiple of equal element base  with channel character set which provides sequential transmission of polynomial coefficient corresponding to generic code word length  creating M multiple of  power, providing information capacity of each code word  with one Nyquist element  bit. Considering the main disadvantage of position coding – element multiplicity of the Nyquist distance between adjacent modulation moments in operation for presenting inter-symbol interference absence is proposed to define instead of , where z – integer to present, s – integer that provided power increasing the implementation of different signal constructions at the interval .
      PubDate: 2015-12-29
       
  • PRIVATE METHOD OF CONSTRUCTION AND SYSTEM PASSING TO RADIO-LOCATION
           INFORMATION AFTER CRITERION OF FUNCTIONAL STABILITY ON BASE ALGORITHM
           PRIMA

    • Authors: Volodymyr V. Kireienko, Oleh V. Barabash
      Pages: 43 - 46
      Abstract: The article is devoted a construction functionally to the steady system and passing to radio-location information. It is suggested to carry out providing of functional stability due to introduction and surplus between the structural elements of the system. In the article accepted, that on the knots of commutation it is possible to realize the frequent reserving of elements, realize protecting from facilities of defeat the opponent and the same decide the questions of increase and reliability, vitality and fault tolerance. Also in the article influence of correcting  connection is considered on functional stability of the system. Because of character tne hierarchical construction of the existent system of passing to radio-location information, researches were conducted by a count model, the questions the construction optimum of coherent structures were namely examined. It was also  shown that at the set amount of tops and ribs the different optimum structures of count can correspond different probabilities of existence of rib. It was there shown that the maximal amount of coverings trees answers maximal probability and coherentness not always. Thus, on the basis of the presented improved method it is possible optimum appearance to enter correctings connections, the same to promote functional stability of structure.
      PubDate: 2015-12-17
       
  • CONCEPTUAL GOING IS NEAR CONSTRUCTION OF SYSTEM OF CYBERNETIC SAFETY OF
           STATIONARY INFORMATIVELY TELECOMMUNICATION KNOTS OF UKRAINE ON PRINCIPLES
           OF DOWN-SCALING AND ADDITION

    • Authors: Igor M. Kozubtsov, Volodymyr V. Kutsaiev, Volodymyr O. Tkach, Lesja M. Kozubtsova
      Pages: 47 - 55
      Abstract: By authors on the basis of existent ideas grounded conceptual going near the construction of the system of cybernetic safety of stationary informatively telecommunication knots of Ukraine on principles of down-scaling and addition. It enables dynamically to extend functional possibilities of the system of cybernetic safety without development of additional designer document and losses of time on its concordance. Block module approach is select to forming and acquisition of knots of the system of cybernetic safety provides the rapid tuning and repair of equipment (proceeding in the capacity of the system and accordance to the new cybernetic threats). The adequate way of realization of conception of construction of the system of cybernetic safety of stationary informatively telecommunication knots of Ukraine is offered.
      PubDate: 2015-12-17
       
  • THE ANALYSIS OF ELECTRONIC WARFARE MEANS CURRENT DEVELOPMENT STATUS
           PRODUCED BY THE REPUBLIC OF BELARUS

    • Authors: Mykola M. Konotopets, Mykola Y. Pavlunko, Аndrii О. Pоpоv
      Pages: 56 - 62
      Abstract: There has been generalized potential of the Belarus military and industrial complex regarding production of up-to-date electronic warfare equipment as well as determined its primary development tendencies. Also, there has been conducted comparative analysis of technical level of presented electronic warfare pieces of equipment with their closest analogues.There has been generalized information on tactical and technical performance of up-to-date electronic warfare equipment produced in the Republic of Belarus and their closest analogues that cannot be found in open sources – thus, the needed data has been collected and generalized by various open sources. There has been defined that the technological level of electronic warfare equipment development is in line with world's top class producers. Also, there has been traced the trend on electronic suppression of communication and data transformation capabilities. The global trend can clearly be seen in relation to development of small-sized electronic warfare pieces of equipment to be able to accomplish various tasks. In modern electronic warfare capabilities there can be found a tendency to expand the frequency band of electronic suppression capabilities (from 400 MHz to 2 GHz and above).
      PubDate: 2015-03-17
       
  • THE CORRESPONDENTS DISTRIBUTION METHOD BETWEEN NODES IN THE RADIO
           COMMUNICATION SYSTEM

    • Authors: Viktor V. Korinenko
      Pages: 63 - 68
      Abstract: In this article the formalized description of the task of correspondents’ distribution between communication centers in the system of radio communication in consideration of particularities which must be considered in information processing outputting data and combat possibilities. Method for solving multi criteria task based on the approach of transition to one estimate with the help of method ELECTRE (ELECTRE – EliminationEtChoixTraduisantlaRealite – exclusion and selection reflect to reality) and using algorithm of correspondent distribution of obtained criteria maximization with consideration of restrictions, subsets probable for communication centers and category of correspondents’ priority. Example of proposed method implementation is shown.
      PubDate: 2015-12-30
       
  • THE STABILITY ESTIMATION OF AUTOMATIC CONTROL FEEDBACK SYSTEMS UPON THE
           CONDITION THAT MEANSQUARED ERRORS MINIMIZATION AND QUADRATIC INTEGRAL
           ESTIMATION OF PHASE LOCK LOOP SYSTEM TRANSIENT PROCESSES

    • Authors: Yevhen V. Lebid
      Pages: 69 - 74
      Abstract: In the article presented results analysis principles construction the system phase - locked loop (PLL) is on the example the tracker system. Dependences amplification the system, meansquared error and quadratic integral estimation transients the system phase - locked loop (PLL) factor are investigational. The presented results allow improving dynamic description the system phase - locked loop (PLL) in radiotechnical facilities the special setting. 
      PubDate: 2015-12-30
       
  • THE METHODICAL APPROACH TO THE ORGANIZATIONAL TECHNICAL STRUCTURE
           SUBSTANTIATION OF THE MILITARY COMMUNICATIONS SYSTEM WITH THE AIM OF
           INCREASING THE EFFICIENCY OF ITS FUNCTIONING

    • Authors: Mykola O. Masesov, Leonid O. Bondarenko, Oleksandr O. Herasymenko, Kostiantyn V. Andreev
      Pages: 75 - 81
      Abstract: The article describes a methodical approach to the solution of actual problem of substantiation of composition and structure of multifunctional organizational-technical systems military purposes on the basis of a formalized description of a problem situation and private decision-making problems. As an indicator of the effectiveness of system-level communication in General, it is proposed to select the generalized indicator reflecting the degree of achievement of objective justification at the level of functional subsystems of the communication system, as an indicator characterizing the level of solving the problem of a certain class. Among the advantages of the presented methodological approach are: creating the conditions for formalization of process studies the composition and structure of the system of any scale, comprehensive, multidimensional description of the system, the possibility of analysis in future interim results of assessment of efficiency justifications in the automatic mode and detection of the patterns, positive trends and areas for improvement systems to increase the efficiency of their use. 
      PubDate: 2015-12-30
       
  • THE ECONOMIC ASPECT OF MODERN INFORMATION AND CONTROL REAL-TIME SYSTEMS
           CREATION UNDER THE RANDOM FACTORS INFLUENCE

    • Authors: Yurii P. Nedaibyda, Yuliia V. Kotova, Vitalii V. Zahorodnikh, Oleh V. Fedulov
      Pages: 82 - 87
      Abstract: The article deals with current issues of development of modern information and control systems in view of the major system logical, economic and psychological aspects. Consider the economic aspect of the assessment of the creation and functioning of modern information and control systems under the influence of random factors. An analytical approach is the formalization of the external and internal parameters defining the state of the system. Marked mental properties of a human operator, representing the importance of decision-making in the context of the variability of decision-making in real time. Expressed the fundamental features of the decisionmaking at the bifurcation point and clarified the importance of the existence of the individual properties of the human operator.
      PubDate: 2015-12-30
       
  • ANTI-AIRCRAFT MISSILE COMPLEXES DIAGNOSIS AND REPAIR SYSTEM MODELING BY
           USING THE CLOSED QUEUING SYSTEMS

    • Authors: Oleksandr Y. Permiakov, Yurii B. Pribyliev, Pavlo V. Openko, Iryna V. Novikova
      Pages: 88 - 92
      Abstract: The article explored the model system diagnosis and repair of anti-aircraft missile complexes as closed queuing system. As the technical basis of the system model is considered a modern development of State Enterprise “Ukroboronservis” – universal mobile repair and diagnostic module, which is designed to undertake diagnosis and recovery of electronic radio technical systems modules anti-aircraft missile complexes. Analytic expressions are given for the calculation of key indicators system repair and maintenance model of anti-aircraft missile complexes as a closed queuing systems, for which the intensity of the input stream applications depends on the State of the system, with source-internal requirements and generates a limited flow of applications. The developed model anti-aircraft missile complex composite parts are sources of requirements (service requests) and universal mobile repair and diagnostic modules-serving channels. Anti-aircraft missile complex machine after servicing (diagnosis and repair) are used for their intended purpose and in case of failure become potential sources of origination requirements. Calculated examples of organizations of the system to regenerate and repair surface-to-air missile system using the developed model, conclusions. 
      PubDate: 2015-12-29
       
  • МАТЕМАТИЧНА МОДЕЛЬ ФУНКЦІОНУВАННЯ
           СИСТЕМИ ВІДНОВЛЕННЯ АВТОМОБІЛЬНОЇ І
           СПЕЦІАЛЬНОЇ ТЕХНІКИ ВІЙСЬКОВОГО
           ПРИЗНАЧЕННЯ

    • Authors: Vasyl V. Polishchuk
      Pages: 93 - 96
      Abstract: Для оцінки ефективності функціонування системи відновлення автомобільної і спеціальної техніки (А і СТ) застосовано математичне моделювання її функціонування з використанням теорії масового обслуговування. В якості вхідних показників моделі системи відновлення використовувались: можливості ремонтних органів в ході виконання завдань; укомплектованість ремонтниками і ремонтними засобами, забезпеченість матеріальними засобами для відновлення А і СТ; склад органів управління системою, їх оснащеність; інтенсивність інформаційного обміну в системі управління. Вихідними показниками моделі системи відновлення А і СТ є: кількість А і СТ, що виходить з ладу; можливості щодо ремонту і евакуації техніки; розподіл пошкодженої техніки за видами ремонту, які, у свою чергу, є вхідними даними для розробки методики оцінки ефективності функціонування системи відновлення А і СТ. 
      PubDate: 2015-12-29
       
  • THE USE OF THE GENETIC ALGORITHM FOR SOLVING THE COOPERATION PLANNING TASK

    • Authors: Dmytro V. Rieznik
      Pages: 97 - 102
      Abstract: The article defines the air defense units’ interaction planning task as a scheduling problem with limited resources. Offered solution is based on a heuristic method, namely on the genetic algorithm. Suggested mathematical formalization of the task concerning scheduling the interaction of air defense units. It allows to tackle the task aiming to develop the schedule table that reflects the interaction of air defence forces and facilities by three optimization criteria. The first criterion is the minimum time needed to accomplish the task; the second one is the minimum resources involved in task fulfillment; and the third relates to the minimum duration of the air defense units in active mode. Genetic algorithm suggested by the author of the article allows to develop near optimal variant of the schedule table showing interaction of air defense units by three criteria, as well as make alterations in compliance with occurred changes in real time. 
      PubDate: 2015-12-30
       
  • VIKOR-KERNEL METHOD AND ITS USING TO MAKE A MULTIPLE CRITERIA ALTERNATIVES
           COMPARISON

    • Authors: Ihor S. Romanchenko, Mykhailo М. Potomkin
      Pages: 103 - 107
      Abstract: The algorithm of method VIKOR intended for ranging of alternatives, and results of its analysis are given. It is shown that some shortcomings are inherent in known method VIKOR. It is caused by necessity of use of additional balancing factor, and also by indeterminate form of interpretation of gained results. It is noted that elimination of these shortcomings is connected with necessity of essential alteration of VIKOR method. However its basic idea about comparison of alternatives by two criteria may be used to create a new outranking method – the VIKOR-kernel method. This new method will be intended not for ranging of alternatives, but for formation of a core which will contain or one best alternative, or some incomparable alternatives which are the most perspective for the further analysis. For this new method settlement dependences, and also rules of comparison of alternatives which provide core formation are given. Possibility of practical use of the offered VIKOR-kernel method is demonstrated by two settlement instance. The results for these two settlement instance with using wellknown multiple criteria optimization methods are given in literature. Comparison of results of the calculations gained with use known and new methods, testifies that use of the VIKOR-kernel method in a combination with other methods allows to raise validity of developed recommendations or to find perspective alternatives which have not been revealed by other methods. These results allow to draw a conclusion that using of the offered VIKOR-kernel method can be perspective enough for multiple criteria optimization of complex objects. 
      PubDate: 2015-12-30
       
  • THE TCP-CONNECTIONS PROCESSING MODEL FOR STEGANOGRAPHIC DATA TRANSFER IN
           INFORMATION TELECOMMUNICATION NETWORKS

    • Authors: Ihor V. Ruban, Anton О. Smirnov
      Pages: 108 - 112
      Abstract: The model of TCP-connections processing for steganographic data transfer in informationtelecommunication networks has been proposed in this article. The requirements for the modification of the TCP for correct working of the steganographic system has been defined. The functioning of steganographic system when forming and sending of steganographic containers, receiving and extracting of messages has been considered in details. The notions of informative and uninformative values, which calculated during of search of correlations the symbols of open-text (the payload of TCP) with the symbols of the message has been introduced. The model includes blind marking, the implementation of which corresponds to the end of the process of sending (receiving) messages. Justified the lack of time delays in the functioning of the modified TCP relative to its standard version
      PubDate: 2015-12-30
       
  • THE TRACKED VEHICLE MOTION MATHEMATICAL MODEL BASED ON GIBBS-APPELL
           EQUATIONS

    • Authors: Andrii V. Rudyi, Denys V. Rudavskyi
      Pages: 113 - 116
      Abstract: This article is dedicated to the study of the curvilinear motion of tracked vehicles on the plane. Based on the Gibbs-Appell equations the mathematical model of the tracked vehicle on the two-dimensional surface has been formulated as a mechanical system with holonomic constrains. The constructed system of differential equations of tracked vehicle motion in corresponding quasi-coordinates takes into account the soil traction and resistance forces at the rectilinear sections, and at its turns. Furthermore, angles to the horizontal plane and the machine course angle relative to the slope of plane were also taken into consideration. Obtained dependences between the defined kinematic parameters of tracked vehicles can be effectively used for improving its transmission and control systems. 
      PubDate: 2015-12-30
       
  • ATTACKS DURING INTRUSION REALIZATION IN THE MANET MOBILE RADIONETWORKS

    • Authors: Serhii V. Salnyk
      Pages: 117 - 124
      Abstract: In the article the analysis of existent attacks is conducted which are used for intrusion in the MANET. Classification of category and types of intrusions, also the variants of their influence are found out on a mobile radio network on the different levels of network model of OSI is realized. Possibility of the intrusions is considered during organization of studies on the basis of teaching great number intrusions and construction methods of detection intrusions. The list of parameters that intrusions are characterized in a mobile radio network are also considered. The list of requirements to methods of detection of intrusions for their application in a mobile radio network is defined. Directions of construction modern methods of finding out intrusions offe r in mobile radio networks on the basis of neural networks at the use in the conditions of unclear network activity with the purpose providing of safety network are proposed. The direction of further researches is also determined.
      PubDate: 2015-12-30
       
  • THE WAY OF MODELING RELIABILITY PARAMETERS AT THE STAGE OF MILITARY
           EQUIPMENT PROJECTING

    • Authors: Maryna O. Sliusarenko
      Pages: 125 - 128
      Abstract: Plant and providing ground equipment analysis shows there is no correspondence that appears between the necessary reliability of equipment and much lower reliability level of the equipment while its exploitation. One of the reasons of such divergence is lack of mathematical modeling methods in the process of reliability work that exist today both at the stage of their projecting and while testing. Methods that are used at pre sent not always take into account the main factors that have an influence on these equipment conditions at the curtain conditions of use. With the purpose of this divergence decreasing we suggest the way of modeling reliability parameters at the stage of military equipment projecting. Main situation of reliability theory is used in the research. Taking into account such factors as aggressive (climate, relief, seismic conditions, natural calamity for military technique – battle influence of the enemy), according to author’s opinion will allow modeling reliability parameters at the stage of technique projecting and give their meaning in a proper way. This in direction of subsequent research.
      PubDate: 2015-12-30
       
  • THE APPROACHES TO THE INFORMATION PROTECTION IN ELECTRONIC DOCUMENT FLOW
           SYSTEMS

    • Authors: Roman M. Shtonda, Yurii O. Protsiuk, Viacheslav V. Ovsiannikov, Oleh M. Makovetskyi, Iryna R. Maltseva
      Pages: 129 - 132
      Abstract: Against the background of events that today in Ukraine and the world, as well as in mass distribution of electronic computer engineering and unauthorized actions on information it is necessary to more thoroughly protect the public, industrial, commercial and financial secrecy. Information security in general and protection of information in automated systems in particular, becomes more urgent and complex problem, whose solution must involve more skilled personnel and organizations specializing in the protection of information. For a quick and good governance in the institutions of different levels are increasingly introducing electronic document management systems that are not fully protected from malicious attacks plaguing useful purpose in the damage caused by a particular organization. In order to preserve the confidentiality, integrity and availability of information circulating in electronic document systems currently used by a number of methods and means of information protection
      PubDate: 2015-12-30
       
  • THE MODEL OF A SCIENTIFIC LEADER AND A GRADUATE STUDENT COLLABORATION IN
           THE PROCESS OF SCIENTIFICALLY PEDAGOGICAL ACCOMPANIMENT BY THE METHOD OF
           PROFESSIONAL DEVELOPMENT

    • Authors: Igor M. Kozubtsov
      Pages: 133 - 140
      Abstract: In the article by an author grounded model of collaboration of scientific leader and graduate student in the process of scientifically pedagogical accompaniment in the systems of higher military education. A research result is component part of dissertation research which answers the passport of scientific speciality 13.00.04 is “Theory and method of trade education”. The kernel of method of development is pedagogical technology of scientifically pedagogical accompaniment of graduate students (adjuncts). Unlike known maintenance in technology it is put qualitative to the contents, psychology and pedagogical and motivational approaches. In the offered scientifically pedagogical accompaniment of graduate students certainly strategy of reacting of scientific leader on the result of educational-cognitive activity of graduate student (adjunct). The developing process of graduate student (adjunct) will be realized hereupon, and consequently acquisition professional competence them. The element of scientific novelty is a model of co-operation and strategy reacting which are aimed at providing of professional development of graduate students. As a result of application of pedagogical model a socio-economic effect will grow from introduction of the got results by the improvement of index of studies.
      PubDate: 2015-12-30
       
  • USE OF AUTHENTIC VIDEO MATERIALS IN TEACHING LISTENING

    • Authors: Olena V. Kraiova, Tetiana I. Tsybaniuk
      Pages: 141 - 144
      Abstract: The current article is focused on the analysis of the impact that authentic videos have on the development of listening skills in a foreign language teaching process and on the ways to increase the effectiveness of authentic video lessons in terms of listening skills development. The implementation of authentic videos into the process of listening comprehension development has demonstrated good results in increasing the motivation of student officers, involving them into real communication process, demonstrating them the natural way of speaking, providing them with authentic cultural information and facilitating cultural adaptation. The involvement of students into a real communicative situation leads to freer adaptation of student officers to the foreign language environment while carrying out tasks in combined exercises or peacekeeping missions.
      PubDate: 2015-12-30
       
  • DISTANCE LANGUAGE LEARNING: THE KEY ASPECTS OF SUCCESSFUL IMPLEMENTATION

    • Authors: Marharyta A. Fedorovych, Yuliia V. Mozghova
      Pages: 145 - 150
      Abstract: Distance language learning has unique challenges which can be explained by the peculiarities of language learning. Distance language courses should be designed in the way that provides a wide range of opportunities for language learners for interaction and successful second language acquisition . The present article focuses on the key aspects aimed at providing the sufficient language input and output; develops the guidance for effective course design regarding the complexities of distance language learning and the factors which influence learners’ communicative competence. It also analyses two approaches to distance learning from the perspectives of effective development of language communicative skills.
      PubDate: 2015-12-30
       
  • THE USE OF THE EDUCATIONAL MULTIMEDIA COMPLEX “ARTILLERY ARMAMENT AND
           AMMUNITION” FOR EFFECTIVE STUDENTS – GUNNERS TRAINING

    • Authors: Dmytry Chopа, Anatoliy Y. Derevianchuk, Denys R. Moskalenko
      Pages: 151 - 155
      Abstract: The article shows problem of the using training multimedia complex in the teaching students of the department of military training for artillery armament and artillery ammunition, show the use elements of training multimedia complex: the device and actions of artillery weapons and ammunition from which conclusions are drawn about the effectiveness of its application. The describes the overall block diagram of the elements of multimedia educational complex, and features material used components. It is based on the comparative characteristics of the experimental data on the general progress of the students, who are trained in the study of military-technical disciplines with traditional methods, and the use of multimedia educational complex for artillery weapons. The recommendations were given for the development, implementation and effective use of multimedia systems in the learning process of students of the departmen t of military training of Sumy State University.
      PubDate: 2015-12-30
       
  • MISSIONS OF THE MILITARY COMPONENT OF THE BORDER GUARD SERVICE OF UKRAINE
           AS A SUBJECT OF NATIONAL SECURITY SYSTEM OF UKRAINE IN CONDITION OF
           ANTI-TERRORISTIC OPERATION

    • Authors: Vitalii H. Zhuravel
      Pages: 156 - 160
      Abstract: Under the influence of internal and external factors secure environment of Ukraine has changed a lot. Russian Federation the guarantor of Ukrainian security stage a large-scale aggression against our country, it has occupied Autonomous Republic of Crimea and gives support to combat operations in Donetsk and Luhansk regions. International levers of safety as well as the Department of National Security of Ukraine were not ready for such challenge and they showed their ineffectiveness. Nowadays, Ukraine continues a huge reformation process of a national security strategy due to conditions of secure environment and requirements of the state at current stage of development. Border Guard Service of Ukraine is a guarantor of national security system of Ukraine and carries out it’s duties by accomplishing combat missions. Situation of realization the antiterroristic operation needs some remarks and specification. In condition of escalation in military and political situation Border Guard Service of Ukraine will accomplish it’s missions in military way or even with providing combat operations. Border Guard Service of Ukraine has military component to perform in such situations. Targets of sub-units and elements integrally connected with state border security and defense. They are regulated by such Laws of Ukraine as “About a state border of Ukraine”, “About Border Guard Service of Ukraine” and others. Analyzing activity of sub-units and elements of Border Guard Service of Ukraine in situation of realization the anti-terroristic operation we can determine some groups of main missions: First – to stop any attempt of illegal changing of state border line on the determined territory. Second – protection (strengthening of protection) and defense of determined territory of state border, administrative border of Kherson region with a temporary occupied territory of Ukraine, controlled frontier area and safety strip in the zone of anti-terroristic operation. Third – localization of emerging (critical) situation on the state border, in port of entries, on administrative border of Kherson region with a temporary occupied territory of Ukraine, in controlled checkpoints and on the objects of Border Guard Service of Ukraine on the determined territory. Fourth - to stop together with other law-enforcement authorities armed conflicts and other disturbances on the determined territory and administrative border of Kherson region with a temporary occupied territory of Ukraine. Fifth – reflection together with Ukrainian Armed Forces, National Guard of Ukraine and other military formations invasion and aggression of sub-units and elements of other counties and groups of countries. Sixth – accomplishing measures of territory protection and steps of containing the legal regime in case of war or emergency. Seventh – to combat together with police and other law-enforcement authorities with terrorists and accomplish other missions. Eight – realization of other tasks determinated by the Ukrainian Law. Materials of this article may be used in practical work of officers and during trainings of sub-units and elements for actions in anti-terroristic operation.
      PubDate: 2015-12-30
       
  • EVENTS AND PROCESSES RESEARCH CONCEPTUAL STRUCTURE REFINEMENT PROPOSALS:
           MILITARY ASPECT

    • Authors: Oleksandr V. Maistrenko, Yurii Y. Repilo, Dmytro L. Demydko
      Pages: 161 - 165
      Abstract: The article is dedicated to linguistic research of the term elements used in military sphere to research their dialectic connection to related terms. taking into account the conceptual burden analysis, the article offers next terminological sequence: attribute, property, characteristic, capability, ability, quality, effectiveness. The conceptual burden of the term “combat capabilities” is clarified, and for this reason, use of the term “combat potential” is proposed, which interpretation is taken from foreign languages. Crossline between the terms “combat potential” and “combat potential” is drawn. Considering the intended function of military formations, the article proposes to determine the applicability to perform combat mission with the use of term “quality”. Also, the terms “quality” and “effectiveness” are proposed to use in the following manner: “quality” is used to describe the object feasibility, “effectiveness” – to depict the object adaptiveness to reach the object mission. Thus, the mentioned division would allow perform the researches including object description in relation to the functioning missions (quality) and object functioning purpose achievement process (effectiveness). 
      PubDate: 2015-12-30
       
  • DETERMINATION OF EVACUATION AND MAINTENANCE UNITS’ NECESSARY AMOUNT AND
           THE WEAPON AND MILITARY EQUIPMENT RESERVE AMOUNT

    • Authors: Oleh V. Pavlovskyi
      Pages: 166 - 169
      Abstract: The article describes the method that allows to define an amount of evacuation and maintenance units, and the amount of weapon and military equipment reserve, which in combination will ensure the maintenance of a certain level of troops’ combat capability considering financial constraints. The difference between the proposed and known methods is: the necessity numbers of evacuation and maintenance units, the number of weapon and military equipment reserve have been considered from point of view of required combat readiness level support; the solving optimization issue allows to determine maintenance units structure, which minimize cost of losses compensations and let not exceed of specified limit; the method is based on the mathematical model of joint cooperation of maintenance and evacuation units (based on pending system of mass handling) that adequately reflects the process.
      PubDate: 2015-12-30
       
  • THE DETERMINATION METHOD OF THE OPTIMUM STOREHOUSE FOR SAVING MATERIAL AND
           TECHNICAL MEANS VOLUME

    • Authors: Stanislav S. Trehubenko
      Pages: 170 - 174
      Abstract: The article deals with the determination method of optimum total volume of a storehouse for keeping material reserves that are necessary for carrying out a defensive operation of military alignment taking into account all the means given from creation and functioning of the storage. The offered method got due to using the position of theory of mathematical programming and theory averting damage (loss)provides the volume of storage that allaros in good time to provide the forces with the necessary amount of material and technical facilities in operation. For all that the facilities that are necessary to spend for acquisition keeping and transporting the material and technical facilities during T days of operation do not exceed the seen given for this purpose. With the help of determination method of optimum total volume of a storehouse for keeping material reserves that are necessary for carrying out a defensive operation of military alignment we determine the amount of means that are necessary for creation and functioning the storage for T days. In addition the method allows to define not only the optimum total volume of a storage but also a ration one that can be chosen for certain terms of operational and technical reward situation and also for lack of necessary means.
      PubDate: 2015-12-30
       
  • THE COMMANDANT’S OPERATION ALGORITHM OF THE BORDER GUARD COMMANDANT
           OFFICE IN THE PROCESS OF THE UNITS SERVICE COMBAT ACTIVITY ORGANIZATION

    • Authors: Oleh H. Trembovetskyi
      Pages: 175 - 180
      Abstract: Analysis of the organizational activities of a number of commandants of border guard commandant office (BGCO) showed different understanding of this activity and different ways of task completion. In our opinion, the unification of the process of their work and the development of an algorithm of the organization of operatively-fighting activities of BGCO will eliminate all the existing conflicts. Analysis of scientific literature and the experience of organizational activity of BGCO commanders provide the opportunity to propose the algorithm of work of the BGCO commandant in the organization of operatively-fighting activities. The proposed algorithm cannot be completed without disclosing the content of each event which is held by the BGCO commandant during performing the tactical and combat missions. Let's start with the fact that the basis for the BGCO commandant work is a number of administrative documents. Among them there are the operational instruction for border protection and participation in territorial defense and other administrative and planning documents. Operatively-fighting activity starts at the moment of receiving of administrative documents. Awareness of the problem is the most important component of the commandant’s work. Typically commandant proposes content of comprehension exercises when he first receives operational instruction and other administrative and planning documents. The BGCO commandant receives operational instruction, administrative and planning documents with a long period of action, but major commander cannot predict all possible changes in environment and the way how they may affect at the performance of tasks. That is why the commandant should estate the situation before accepting of every decision. The decision for performing service and fighting activity of BGCO is the most important stage in commandant’s work. The requirements for such decision are the following: solution must coincide with an operational instruction; should be adequate to the current situation; should be ensured with all necessary forces and facilities. The decision is recorded in the book of the border service. The next stage in BGCO commandant’s work is planning service and fighting activity. This is an important and complicated process which is closely connected with the content of the decision. While planning commandant should detalize his decision by manpowering distribution of units in the whole areas, state the time and the place of action. After planning service and fighting activity commandant defines the tasks for deputies and officers of BGCO departments. The content of the tasks should delegate a certain part of commandant’s rights, related to the control activities of the units to his deputies, these rights are: control after service and fighting activities of BGCO, missions and the order of their completion by units or individual servicemen with specializing of time, place and so on. Let’s emphasize at the plot of combat crew. On the combat crew BGCO commandant may notify the personnel, changes in the situation, the results of service and fighting activity and results of its control, which unit or group of border guards perform tasks in exact time, who makes the reserve, signals and commands for the calculation capabilities on them. Also the BGCO commandant should declare orders and directives that are needed to know by all subordinates. In commandant's work arranging of interaction is also very important. While organization of interaction he detalize the performance of their tasks in a single goal. The degree of detailizing of such actions may vary because of many factors: the nature of the problem, time availability, topography, level of training and experience of personnel. It is impossible and unnecessary to give some kind of uniform and suitable for all occasions scheme. The main issues in the organization of interaction needs to touch the order of actions in an armed attack on the border guards, the destruction of the armed groups of the enemy and repulsing an attack on a place of a BGCO dislocation. While solving main tasks of interaction the BGCO commandant determines his place during the execution service and fighting activity, destruction of the armed groups of the enemy and repel the attack on places of a dislocation, additionally he stresses at the order of communication, methods and time of reports and informing. BGCO commandant should control the situation from the command point. On the issue of comprehensive support commandant determines what action is necessary to ensure the success of the tasks of service and fighting activity of BGCO. Materials of the article can be used in the practice of officers of BGCO departments as well as in research and academic work.
      PubDate: 2015-12-30
       
  • THE MODERN CYBERSPACE SECURITY POLICY UNDER CONDITIONS OF ITS
           MILITARIZATION

    • Authors: Oleksandr M. Kosohov, Аnatoliy O. Siryk
      Pages: 181 - 186
      Abstract: The organized analysis action on provision cyber-security leading countries of the world, are chosen main trends transformations internal politicians state with provision for growing of cyber-threats. The Offered ways of the improvement politicians of Ukraine on provision of cyber-security for the reason adductions it to requirements of modern time and ensuring the sovereignty state in condition of the activations of the process to militarization of cyber-space. 
      PubDate: 2015-12-30
       
  • ANALYSIS OF LEGAL, ORGANIZATIONAL AND TECHNICAL ASPECTS OF INFORMATION
           SECURITY

    • Authors: Viacheslav V. Ovsiannikov, Sviatoslav V. Dekhtiar, Svitlana A. Palamarchuk, Yuliia O. Chernysh, Oleksandr V. Shemendiuk
      Pages: 187 - 193
      Abstract: Analysis of legal, organizational and technical aspects of information security given the global trends of informatization of modern society, the rapid development of information technology and intensive implementation of information and telecommunication systems in all spheres of state and society, there is a need for defining the concept and content of the information security system and its software. The requirements of Ukraine legal acts and international information security standards ISO/IEC were analyzed. The nature of basic concepts and content of the information security was given. In the framework of international and national standards for information security levels defined requirements for protection (of properties). In the English-language standards is a classic CIA model, to ensure the requirements of confidentiality, integrity and availability of information. Separately requirement imposed observability. At international standards, special attention is also paid to information security management system
      PubDate: 2015-12-30
       
  • THE ANALYSIS OF EXISTING CYBERNETIC INTELLIGENCE METHODS OF INFORMATION
           AND TELECOMMUNICATION NETWORKS

    • Authors: Vitalii A. Savchenko, Taras M. Dziuba, Vladyslav Y. Kyva
      Pages: 194 - 201
      Abstract: The article surveys the necessity of taking the measures to neutralize threats to national security in cyberspace, which are specified with the rapid growth of dependence of state and military authorities on the using of various automated control systems, which are the targets of the realization of cyber impact of enemy in case of a possible military-political conflict between countries. Every second, the dynamic processes take place in the cyberspace which are characterized some cybernetic activities – an action that provides access to various information resources or intelligence activities with the using of software and information networks for the purpose of collecting information about information systems and resources of enemy. Cyber influence is considered, which includes unauthorized access, which causes damage to critical information systems, to resources or general information and personal appointment by a breach of confidentiality, integrity and efficiency of information and information and telecommunication networks software, digital data, which provides a range of consumer services (telecommunication or information services). This article describes the importance of national security in the cyberspace. It is justified the urgency and the necessity of intelligence activities in cyberspace of the enemy in this article. It is defined the stages, components and the methods of cybernetic intelligence in cyberspace and critical data is identified which must be collected in the realization of intelligence activities for providing the headquarters with information gathered about the enemy. It is considered comparative characteristics of intelligence in cyberspace and it is determined the main criteria for their construction. The main advantages and disadvantages of active and passive method of intelligence gathering and integrated approach are proposed with the benefits of each method, which will allow increasing the efficiency of cybernetic intelligence in information and telecommunication networks. 
      PubDate: 2015-12-30
       
  • THE STRATEGY FOR ENSURING THE CYBER SECURITY OF THE ARMED FORCES OF
           UKRAINE

    • Authors: Oleksandr O. Chernonoh, Yevhen O. Zhyvylo, Vadym V. Mashtalir
      Pages: 202 - 212
      Abstract: The military security strategy of Ukraine cyberspace (hereinafter – the Strategy) is based on the results of the military-political situation analysis and forecasting, the defense sufficiency principles, high availability to defense, system defense planning, as well as defined of the Supreme Council of Ukraine the domestic and foreign policy principles. The main provisions of the Strategy are derived from the Military doctrine of Ukraine and the national security Strategy of Ukraine, and develop their position in the areas of ensuring military security of the Ukraine cyberspace and are aimed at countering aggression by the Russian Federation in cyberspace. That is why the fulfilment of the above conditions is necessary for gaining membership in the European Union and the North Atlantic Treaty Organization, ensuring equitable and mutually beneficial cooperation in the field of cyber security (cyber defense) in the military, military-economic and military-technical cooperation with all interested States-partners.
      PubDate: 2015-12-30
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.238.70.175
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-