A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

              [Sort by number of followers]   [Restore default list]

  Subjects -> MILITARY (Total: 103 journals)
Showing 1 - 24 of 24 Journals sorted alphabetically
Africa Conflict Monitor     Full-text available via subscription   (Followers: 8)
Armed Conflict Survey     Full-text available via subscription   (Followers: 15)
Armed Forces & Society     Hybrid Journal   (Followers: 24)
Arms & Armour     Hybrid Journal   (Followers: 10)
British Journal for Military History     Open Access   (Followers: 40)
Bulletin of the Atomic Scientists     Hybrid Journal   (Followers: 6)
Ciencia y Poder Aéreo     Open Access   (Followers: 2)
Civil Wars     Hybrid Journal   (Followers: 21)
Coleção Meira Mattos : Revista das Ciências Militares     Open Access  
Conflict, Security & Development     Hybrid Journal   (Followers: 427)
Critical Military Studies     Hybrid Journal   (Followers: 4)
CRMA Journal of Humanities and Social Sciences     Open Access   (Followers: 1)
Cuadernos de Marte     Open Access  
Defence and Peace Economics     Hybrid Journal   (Followers: 22)
Defence Science Journal     Open Access   (Followers: 40)
Defence Studies     Hybrid Journal   (Followers: 31)
Defence Technology     Open Access   (Followers: 4)
Defense & Security Analysis     Hybrid Journal   (Followers: 31)
Digital War     Hybrid Journal   (Followers: 2)
Disaster and Military Medicine     Open Access   (Followers: 5)
Doutrina Militar Terrestre em Revista     Open Access  
Eesti Sõjaajaloo Aastaraamat / Estonian Yearbook of Military History     Open Access   (Followers: 2)
EsSEX : Revista Científica     Open Access   (Followers: 1)
First World War Studies     Hybrid Journal   (Followers: 27)
Fra Krig og Fred     Open Access   (Followers: 2)
Gettysburg Magazine     Full-text available via subscription  
Great Circle: Journal of the Australian Association for Maritime History, The     Full-text available via subscription   (Followers: 7)
Headmark     Full-text available via subscription   (Followers: 2)
Human Factors and Mechanical Engineering for Defense and Safety     Hybrid Journal   (Followers: 1)
International Journal of Intelligent Defence Support Systems     Hybrid Journal   (Followers: 5)
International Peacekeeping     Hybrid Journal   (Followers: 474)
Journal for Maritime Research     Hybrid Journal   (Followers: 12)
Journal of Bioterrorism & Biodefense     Open Access   (Followers: 6)
Journal of Archives in Military Medicine     Open Access   (Followers: 3)
Journal of Conflict and Security Law     Hybrid Journal   (Followers: 20)
Journal of Conventional Weapons Destruction     Open Access   (Followers: 3)
Journal of Defense Analytics and Logistics     Open Access  
Journal of Defense Modeling and Simulation : Applications, Methodology, Technology     Hybrid Journal   (Followers: 6)
Journal of Defense Studies & Resource Management     Hybrid Journal   (Followers: 2)
Journal of Military and Strategic Studies     Open Access   (Followers: 5)
Journal of Military and Veterans Health     Full-text available via subscription   (Followers: 10)
Journal of Military Ethics     Hybrid Journal   (Followers: 11)
Journal of Military Experience     Open Access   (Followers: 7)
Journal of Military History     Full-text available via subscription   (Followers: 34)
Journal of Military Studies     Open Access   (Followers: 5)
Journal of National Security Law & Policy     Free   (Followers: 8)
Journal of Naval Architecture and Marine Engineering     Open Access   (Followers: 5)
Journal of power institutions in post-soviet societies     Open Access   (Followers: 2)
Journal of Slavic Military Studies     Hybrid Journal   (Followers: 18)
Journal of Terrorism Research     Open Access   (Followers: 26)
Journal of the Royal Army Medical Corps     Hybrid Journal   (Followers: 9)
Journal on Baltic Security     Open Access   (Followers: 3)
Martial Arts Studies     Open Access   (Followers: 1)
Media, War & Conflict     Hybrid Journal   (Followers: 15)
Medical Journal Armed Forces India     Full-text available via subscription  
Medicine, Conflict and Survival     Hybrid Journal   (Followers: 3)
Militärgeschichtliche Zeitschrift     Hybrid Journal   (Followers: 6)
Military Behavioral Health     Hybrid Journal   (Followers: 6)
Military Medical Research     Open Access   (Followers: 4)
Military Medicine     Hybrid Journal   (Followers: 9)
Military Psychology     Hybrid Journal   (Followers: 10)
Modern Information Technologies in the Sphere of Security and Defence     Open Access   (Followers: 2)
Naval Research Logistics: an International Journal     Hybrid Journal   (Followers: 3)
Nonproliferation Review     Hybrid Journal   (Followers: 5)
O Adjunto : Revista Pedagógica da Escola de Aperfeiçoamento de Sargentos das Armas     Open Access   (Followers: 2)
Perspectives on Terrorism     Open Access   (Followers: 470)
Post-Soviet Armies Newsletter     Open Access   (Followers: 1)
Problemy Mechatroniki. Uzbrojenie, lotnictwo, inżynieria bezpieczeństwa / Problems of Mechatronics. Armament, Aviation, Safety Engineering     Open Access   (Followers: 3)
Revista Agulhas Negras     Open Access   (Followers: 1)
Revista Babilônia     Open Access   (Followers: 1)
Revista Científica Fundação Osório     Open Access  
Revista Científica General José María Córdova     Open Access  
Revista Cubana de Medicina Militar     Open Access   (Followers: 1)
Revista do Exército     Open Access   (Followers: 1)
Revista Militar de Ciência e Tecnologia     Open Access   (Followers: 1)
Revista Política y Estrategia     Open Access  
Sabretache     Full-text available via subscription   (Followers: 1)
Sanidad Militar     Open Access  
Scandinavian Journal of Military Studies     Open Access   (Followers: 1)
Scientia Militaria : South African Journal of Military Studies     Open Access   (Followers: 4)
Scientific Journal of Polish Naval Academy     Open Access  
Securitologia     Open Access   (Followers: 1)
Security and Defence Quarterly     Open Access   (Followers: 7)
Security Studies     Hybrid Journal   (Followers: 48)
Signals     Full-text available via subscription   (Followers: 2)
Small Wars & Insurgencies     Hybrid Journal   (Followers: 373)
Small Wars Journal     Open Access   (Followers: 17)
Social Development & Security : Journal of Scientific Papers     Open Access   (Followers: 1)
Special Operations Journal     Hybrid Journal   (Followers: 1)
Strategic Comments     Hybrid Journal   (Followers: 6)
The Military Balance     Hybrid Journal   (Followers: 9)
The RUSI Journal     Hybrid Journal   (Followers: 17)
Transportation Research Part E: Logistics and Transportation Review     Hybrid Journal   (Followers: 22)
United Service     Full-text available via subscription   (Followers: 1)
University of Miami National Security & Armed Conflict Law Review     Open Access   (Followers: 1)
Vierteljahrshefte für Zeitgeschichte. Das zentrale Forum der Zeitgeschichtsforschung     Hybrid Journal   (Followers: 11)
Vojnotehnički Glasnik     Open Access   (Followers: 1)
War & Society     Hybrid Journal   (Followers: 26)
War in History     Hybrid Journal   (Followers: 23)
Whitehall Papers     Hybrid Journal   (Followers: 3)
Wiedza Obronna     Open Access   (Followers: 2)
Zeitschrift für Slawistik     Hybrid Journal   (Followers: 1)
선진국방연구     Open Access  

              [Sort by number of followers]   [Restore default list]

Similar Journals
Journal Cover
Modern Information Technologies in the Sphere of Security and Defence
Number of Followers: 2  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2311-7249 - ISSN (Online) 2410-7336
Published by National Defence University of Ukraine named after Ivan Cherniakhovsky Homepage  [1 journal]

    • Authors: Natalia Korolyuk
      Pages: 5 - 10
      Abstract: The article proposes an approach to formalize knowledge about the process of determining the parameters of the planned interception using heuristic methods, which are the best in terms of practice, experience, intuition, knowledge of decision makers when aiming fighters at air targets, and looking for solutions within some subspace of possible solutions. The proposed mathematical model allows to formalize the factors that are taken into account when guiding fighters, in the form of linguistic and interval-estimated parameters for each option, which allow to take into account the uncertainty. The initial data of the method is a recommendation regarding the appropriate method of guidance, the hemisphere of the attack of the fighter during guidance. Decisions on the application of the appropriate method of guidance is possible only after the analysis of the conditions of hostilities, the tactical position of the fighter at the time of detection of air targets, taking into account the dynamic characteristics of each method of guidance. It is revealed that automation of information preparation, formation of various variants of application of parameters of the planned interception, is possible at the expense of realization of the corresponding system of support of decision-making. It is substantiated that a logical-linguistic production hierarchical model is expedient as a mathematical model for determining the parameters of interception..
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-5-10
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Hryhorii Tikhonov, Serhii Sholokhov, Yurii Hordienko
      Pages: 11 - 22
      Abstract: Annotation. Interference protection of the communication system is a relevant and important researching area, impact assessment methodology of radio (RS) and electromagnetic suppression (EMS) is rather developed and known for today. The National Telecommunication Network (NTN), as a set of communication systems and networks, in the context of a hybrid war against Ukraine requires protection improvement from the destructive influence of the enemy, which has the latest RP and EMF. Unsecured NTN will not be able to perform its main function, namely the circulation (transmission, reception, creation, processing and storage) and protection of national information resources, providing secure electronic communications, providing a range of modern secure information and communication (multiservice) services in the interests of government in peacetime, in a state of emergency and during a special period. In addition, NTN is a dual-purpose network (system) with partial usage of its resources to provide services, including cyber security, to other consumers. Qualitative development of methods and techniques to ensure interference protection of NTN elements is impossible without predicting possible scenarios of the enemy and the interference situation that may arise.It is proposed to use scenarios approach during adaptive algorithm development of interference protection of special means of communication against active radio and electromagnetic suppression of the enemy in hybrid actions and terrorist activities. The method of substantiation of scenarios of RS and EMS of the transport platform (TP) of NTM and determination of scenarios of complex signal-interference situation is developed. These scenarios are necessary for the further synthesis of adaptive interference protection algorithms of TP NTN.The method allows substantiating the composition and usage of RS and EMS measures of enemy within the timeline and b the elements of TP NTN terms of hybrid war against Ukraine.It is concluded that it is necessary to synthesize the interference protection algorithms of communication channels, which will be adaptive to different scenarios of signaling, and interference situation that may occur.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-11-22
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Vasyl Kuzavkov, Arthur Zarubenko
      Pages: 23 - 32
      Abstract: The article proposes a variant of constructing a digital system for automatic stabilization of the antenna field platform located on an object (vehicle), and also considers the structural diagrams of control channels. The choice of executive devices to ensure the performance and accuracy of the system is substantiated. The conditions of use, restrictions and initial data necessary for the synthesis of the automatic stabilization system are determined, the principles of calculating by the system - the coordinates of the position of the antenna field platform in space - are highlighted.The prerequisites for the use of a platform with stabilization at the facility is the need to ensure the most efficient use of communication facilities (antenna systems) in a complex electromagnetic environment and to reduce the deployment (folding) time, adjust radio and satellite communications in the operational-tactical and tactical control levels.The system of automatic stabilization of the antenna field platform will provide optimal conditions for the interaction of antenna systems that are part of the antenna field of radio-electronic means of the compact constellation. Optimal conditions should be understood as vertical placement of omnidirectional antennas, the possibility of changing the position of directional antennas in the azimuthal plane and ensuring the electromagnetic compatibility of radio electronic means. The deviation of the platform from the required angular positions of the reference coordinate system can be determined by accelerometers or other devices that measure the linear acceleration of an object in a given plane.It is proposed to stabilize the platform through two channels for each of the axes. The angular position of the stabilized platform in space is specified in the reference coordinate system, which is not associated with a moving object (vehicle) that is moving, and in a moving coordinate system, it is rigidly connected with this object. It is proposed to use an inertial coordinate system as a reference coordinate system, that is, motionless relative to the horizon, which is oriented at a given point on the earth's surface. The proposed automatic system is universal, with the ability to adapt to the driving performance of a moving object. Adaptability is ensured by the presence in the control loop of an automatic stabilization system of circuits, the parameters of the transfer functions of which are pre-calculated for the tactical and technical characteristics of the moving object.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-23-32
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Denys Koval
      Pages: 33 - 38
      Abstract: Modern unmanned aerial vehicles (UAVs) perform a wide range of tasks in the military sphere. The expansion of the range of such tasks causes constant technical improvement of both the drones themselves and the means of countering UAVs. The direction of tactics and technics for using drones as part of a group is rapidly developing.The existing countermeasures have limited capabilities to detect UAV groups and resolve them in the group. Thus, there is an acute problem of group detection and resolving of UAV groups.At the stages of analysis and assessment of this problem, the requirements for the detection and resolving of UAV groups must be technically justified.The purpose of this article is to develop a method to improving the quality of detection and separation of UAVs as sources of radio emission (SRE), by improving the known method of technical justification of requirements based on the use of adaptive direction finders with superresolution.As result of the study, it was found that the steepness of the change of the weight vector signal in the area of directions on SRE is much greater than the steepness of the angular spectrum peaks at the output of the adaptive antenna array. This property was investigated and used to increase the angular resolution of the UAV’s SREs in adaptive direction finder. The estimation of the boundary angular resolution is obtained by using the weight vector signal as an angular power spectrum depending on the parameters of the input signal.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-33-38
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Oleksandr Huk, Oleksandr Permiakov, Oleksandr Nesterov, Tetiana Uvarova
      Pages: 39 - 44
      Abstract: The article provides a comparative analysis of approaches, methods and formalized mathematical descriptions used to assess the functional stability of heterogeneous information systems. Features and criteria of functional stability are considered. The definitions of the concepts of functional stability, heterogeneous information systems, indicator and criterion of functional stability are given. The difference between the concepts of stability of functioning and functional stability of complex technical systems is indicated. Formalized descriptions of the structural and probabilistic criteria for the functional stability of the structure of a heterogeneous information system are given. The mathematical formalization of the functional stability indicator for structures with serial and parallel connection of elements is given. The indicator of the structural complexity of the data transmission system of the automated air traffic control system is mathematically formalized. The article presents a method for assessing the functional stability of an automated air traffic control system and a method for calculating a generalized probabilistic indicator of functional stability as a convolution of the structure connectivity matrix. The directions of further research on the assessment of the functional stability of heterogeneous information systems are determined.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-39-44
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Volodymyr Rudenko, Mykhailo Zinchenko, Natalia Gryshina, Viktor Chenchenko
      Pages: 45 - 52
      Abstract: Today, there are many standards that describe the architecture and mechanisms for monitoring and controlling elements of the Carrier Ethernet network, but there is no single methodology and requirements for the control system of such a communication network are not formed. This article proposes a solution to this problem by modeling the process of functioning of a telecommunication network based on this technology to manage its configuration. To create this model, the AnyLogic simulator was selected. The aim of the work is to identify the relationship between the reliability indicators of a telecommunication network based on Carrier Ethernet technology and the process of functioning of the telecommunication network management and recovery subsystems. As well as obtaining the dependence of the availability factor on the duration of the time between failures, the time of failure and on the quantitative characteristics of the configuration of the simulated network fragment. The multi-agent system, which is part of the control system, is in interaction with it. The use of a distributed telecommunications network control facility based on Carrier Ethernet technology at MASU will provide a demonstration of the dynamics of changes in the state of a fragment of a telecommunications network and obtain an estimate of network reliability. The solution to the problem of building the MASU model is based on the use of agent-based modeling, which belongs to the class of agent-based models. The paper uses the provisions of probability theory, control theory and system theory. The novelty of the presented model lies in the selection of a new Carrier Ethernet control object, the selection of an original set of control and management mechanisms for their inclusion in the model, and the use of the mathematical apparatus of agent modeling. Using the presented model to study the functioning of a telecommunication network allows you to track the behavior of each node and each route with its own failure and recovery rates for a network structure of any complexity, and allows you to solve problems associated with determining the length of time to lose connectivity in the route and the duration of the time between failures all routes simultaneously, allows you to form an assessment of network reliability and fault tolerance.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-45-52
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Nikolay Radchenko, Oleksiy Dragluk, Mihael Korotkov, Olexandr Bidnyi
      Pages: 53 - 60
      Abstract: In the context of ensuring the security of information in specific conditions, a number of difficulties arise due to the fact that the selected properties of information are heterogeneous and not commensurate, the areas of acceptable values of characteristics and properties of protection are not defined, which are derived from what is protected and directly depend on the properties the information itself, which in turn are set by the owner of the information. Moreover, it is of interest for the purpose of determining the value of protection, the definition of quantitative indicators of the properties of protection.Information security metrics in appropriate methodologies that are based on verification and risk-orientation approaches are not sufficiently informative, since they take into account only objective aspects of security, completely ignoring subjective ones. They do not allow to make sound judgments about the state of confidentiality, integrity and accessibility of information and the level of information security of the organization as a whole. In this regard, the authors propose an approach to determine the numerical value of a generalized indicator of the value of information on the basis of the logico-linguistic model of evaluating the properties that characterize this indicator and the method of pairwise comparisons used to determine the numerical values of the coefficients of importance of these properties.In this paper, we propose an approach for solving the task regarding the quantitative assessment of heterogeneous properties of information and the coefficients of their significance in the interests of information protection and to determine the influence of information properties that are set by the owner of the information security system on a generalized indicator of the value of information. At the same time, for the estimation of the numerical values of the considered properties of information, it is proposed to use the apparatus of the theory of fuzzy sets, and the determination of the corresponding coefficients of importance is carried out by the method of analysis of Saati hierarchies.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-53-60
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Vitalii Zubok
      Pages: 61 - 66
      Abstract: The Internet operates and is constantly growing due to global routing system, the scalability of which is indisputable. But this system has certain information security flaws, due to which there are threats of deliberate distortion of packet transmission paths in order to violate the integrity, accessibility and confidentiality of information. Such actions are called "route hijacks". The mechanisms of the mentioned cyberattacks are aimed at imposing on misconception or, in other words spoofing the network topology derived from routing tables, while mechanisms for validation of this information in the global routing protocol BGP-4 are absent. This vulnerability cannot be completely addressed without replacing the BGP-4 protocol, which could take another decade.Reducing the potential impact of cyber attacks on global routing requires a new methodology for assessing the effectiveness of interconnections and improving the network topology. Thus, the paper studies usage of a modern risk-oriented approach, when the risk owner uses the value of risk as a measure of information security. The proposed methodology is based on the analysis of the topology of the Internet, subjects, objects and processes of global routing. The owner of the risk is determined, the risks themselves are identified.New metrics have been introduced to assess the risk of route interception - a trust metric and a significance metric. The trust metric characterizes the probability of a route hijack at a certain node and depends on the metric distance between the risk owner and the target node. The concept of subject of trust and object of trust is introduced. Significance metrics characterizes the level of maximum damage associated with the area of the expected spread of the spoofed route. It is complex and takes into account the number of network prefixes routed through the target node, the weight of the prefix according to its length, and the distance between the source of the prefix and the target node. Risk assessment based on these metrics serves as a measure of the effectiveness of the topology in protecting against interception of routes, and provides an opportunity to make decisions on improving interconnections, using risk to measure the information security.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-61-66
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Igor Ruban, Vadym Tiutiunyk, Olha Tiutiunyk
      Pages: 67 - 80
      Abstract: In order to develop the scientific and technical foundations of creating an artificial intelligence system for monitoring terrorist acts, the paper presents the results of a study of the amplitude-frequency spectra of acoustic emission (AE) of the combustion process of cellulose-containing materials (as one of the main materials used to carry out arson and attacks in organizing terrorist actions in the form of law and order violations in the local territory) of various physicochemical composition. The technical implementation of this effect in the development of automated devices for monitoring acoustic space as part of an operational monitoring system for the terrorist zone, aimed at early identification of the sources of terrorist threats to the normal functioning of the local territory of the state.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-67-80
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Oleksii Kolomiitsev, Volodymyr Pustovarov
      Pages: 81 - 90
      Abstract: In basis of topography that is used in a military sphere, - a capture lies the methods of study of locality. On it, receipt of quantitative and quality descriptions of locality on space and to the airphotos - is one of basic parts of military topography presently. Architecture of U-Net zdkztncz effective enough for the decision of different tasks, such as segmentation of neuron structures, sciagraphy et cetera. A network is characterized by a coder with the sequence of levels of convolutional and maximal pool. Thus, the layer of decoding contains the mirror sequence of convolutional that transponirovan’s. He behaves as traditional automatic encode. Extractor of functions of U-Net can be modernized for the improvement of maps of segmentation of municipal structures. Unclear to the neuron decorate a pattern Vanga-Мandelja it maybe to use the classifier of the modified decoder in quality U-Net. Formal presentation of neuron network ensemble of neuron networks is in-process offered on the basis of the modified rolled up neuron network for segmentation of municipal structures (automatic encode) of U-Net as super position of functions. Architecture of ensemble of neuron networks is worked out on the basis of the modified convolutional neuron network (СNN) for segmentation of municipal structures (automatic encode) of U-Net. Modification (automatic encode) of U-Net is conducted due to modification of subnet of withdrawal of signs with using as encoder preliminary trained deep СNN VGG, and similarly due to realization of classifier of automatic encode with the use of the modified unclear neuron network Vanga-Мandelja on the basis of INМТ2 for on a pixel classification of certain municipal structures and the generalized topology of by a neuron network model is worked out for segmentation of municipal structures. Modification (automatic encode) of U-Net will allow to promote exactness of segmentation of municipal structures on digital space and airphotos at the automated monitoring of municipal environment.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-81-90
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Mychailo Shishanov, Andrei Veretnov, Igor Kondratyuk, Sergii Horbachevskiy
      Pages: 91 - 98
      Abstract: The article proposes the conceptual basis for the development of programs to ensure the maintainability of complex technical systems (СTS). The importance and urgency of the problem of ensuring maintainability for modern STS is considered. It is shown that the reliability program and other documents do not pay due attention to the justification of maintainability at the stages of development and production of СTS. The necessity in substantiation of requirements to this property taking into account three main aspects is considered: technical, economic and organizational. The classification of maintainability indicators and the main groups of factors influencing them is given.It is shown that the stage of research and development work is the main stage of СTS development, which should ensure compliance with the achieved level of maintainability of СTS, which is developed to regulatory requirements; at the same stage, all the main weak elements of the structure must be identified, the main causes of failures must be established. Measures taken at this stage to improve maintainability should take into account and be interrelated with both the manufacturing technology and the strategy of maintenance and repair.According to the results - a modern approach to the problems of improving the maintainability of СTS, as one of the areas of improving the efficiency of operation. The modern approach to the problems of СTS maintainability is defined and the tasks for its solution are specified on the basis of the analysis of the solution of this problem in the USA and other leading countries of the world.The main directions of development of the plan and the program of maintenance of serviceability of СTS at their development and production are formulated. It is shown that the development of the plan and program to ensure the maintainability of СTS will allow to assess the level of maintainability from the moment of approval of the technical task to the moment of serial production. At the same time, it is emphasized the need to take into account that the consideration of the requirements for maintainability, laid down in the program, should become part of any project, as an element of the СTS development program.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-91-98
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Yuri Klyat, Yaroslav Kubetsky, Oleh Uhrynovych, Viktor Holitsyn
      Pages: 99 - 106
      Abstract: Certain aspects of prompt delivery of material and technical means to rapid response units during joint operations at the state border with the use of software have been identified.The article highlights the concept of "transportation", its main stages and defines the basic principles of organization of transportation of material and technical means.The article reveals the methodological approaches to the formalization and calculation of key indicators that characterize the process of transportation of material and technical means.This takes into account the methods of accelerated (operational) calculation of the need for transportation of material and technical means. Their advantage is the relatively small cost of time for calculations with allowable errors and deviations from the values obtained by applying the universal method. The application of such dependencies meets the requirements of the guiding documents for mastering the methods of operational planning and organization of material and transport support, transportation of material and technical means, combat and other types of support.The calculations of the accelerated (operational) calculation of the need for transportation are based on the following operational indicators: combat composition of units, pace of hostilities, duration of hostilities, tasks performed by border rapid response units, typical and established rates of consumption and loss of logistics in battle, etc. The need for transportation is determined by the types of material and technical means that have the largest share in the cargo flow (ammunition and fuel), with the accrual of the corresponding percentage of other types of material and technical means of the total need for transportation of ammunition and fuel.Identification and disclosure of certain aspects and methodological approaches to the prompt delivery of logistics to rapid response units, will deepen research to address the issue of operational delivery of logistics to rapid response units.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-99-106
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Volodymyr Dachkovskyi
      Pages: 107 - 116
      Abstract: Arms and military equipment are the products of many enterprises of the defense-industrial complex of Ukraine, which take part in their manufacture and repair. Domestic producers to maintain their position in a competitive market need to pay more attention to assessing the level of quality of products and services provided, and use the results of this assessment in production activities in management decisions.The level of quality of samples of armaments and military equipment can be assessed by the ratio of quality characteristics based on the comparison of the obtained values with the base values of the relevant indicators.Therefore, to assess the level of quality of samples of weapons and military equipment received for the replenishment of military units (units) from factories of manufacturers of repair and restoration units (units) proposed a methodological approach to determining the quality of samples of weapons and military equipment.As an option, the quality indicators of samples of armaments and military equipment are classified into groups according to the relevant characteristics. In accordance with the purpose of assessing the level of quality of armaments and military equipment, differential, complex, mixed and statistical assessment methods are considered.To effectively assess the level of quality of samples of armaments and military equipment, it is necessary to develop a model of quality management of automated control of the technological process of manufacturing and repair of armaments and military equipment. The essence of which is to use an automated comparative assessment of indicators that are laid down in the technical documentation with the actual performance of the product.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-107-116
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Liudmyla Zaika, Oleksandr Lavrinchuk, Valerii Krainov
      Pages: 117 - 124
      Abstract: Using business games as a teaching method is based on the simulation of professional activity processes and conditions for their implementation. The hardware-software electronic software is used to their conduct allows to create a quasi-professional learning environment and contributes to the development of computer business games. Using modern combat operations simulation tools during individual and collective training of military specialists opens up additional opportunities for competence formation among game participants while solving professional situations in conditions of uncertainty. The experience of using such tools in the educational process of a higher military school during exercises (training) indicates using computer business game method indicates the need to improve educational and methodological support them for a more effective using technical capabilities of combat operations simulation tools.In the article, the authors, based on determining features of the business game method, the JCATS simulation system, develop a methodological basis for the implementation of computer business game method using combat actions simulation tools during exercises (training) with military specialists.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-117-124
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Ruslan Khomchak
      Pages: 125 - 132
      Abstract: In the article it proposed the methodological apparatus of substantiation and determination of contributions of services (branches) of troops to the required level of combat capability of Armed Forces (AF) of Ukraine during their use (repulse of armed aggression), which consists three methods: The method of determining the contributions of services (branches) of troops to the required level of capacity of the Armed Forces of Ukraine during the application (counter of armed aggression), the method of determining the optimal contributions of services (branches) of troops in the successful solution of combat tasks with a established value of prevented damage, while minimizing the necessary costs and method of determining the optimal contributions of services (branches) of troops in the successful solution of combat missions with the established amount of prevented damage provided maximum damage to the enemy created by groups of troops. The method of determining the contributions of services (branches) of troops to the required level of capacity of the Armed Forces of Ukraine during the application (counter of armed aggression) consists of three stages. At the first stage, the initial relations are determined for the subsequent calculation of the contributions of the j-th type of troops in ensuring the required level of capacity of all troops. In the second stage, the basic equations determined the contributions of the j-th type and all types of troops in providing the required number of destroyed weapons of the i-th type and all types of the enemy in order to maintain a given level of capacity of all our troops. At the third stage, there are determined the contributions of our troops to the required number of destroyed the i-th type weapons and all types of the enemy in order to maintain a given level of capacity of all our troops.The method of determining the optimal contributions of services (branches) of troops in the successful solution of combat tasks with a established value of prevented damage, while minimizing the necessary costs, which is part of the methodological apparatus of substantiation and determination of contributions of services (branches) of troops to the required level of combat capability of Armed Forces of Ukraine during their application (repulse of armed aggression) made for its further use by officials of the governing bodies of the Armed Forces of Ukraine, the Armed Forces, as well as the Ministry of Defense of Ukraine to plan the staff of the Armed Forces of Ukraine, forces and means of the tasks forces, determining of prospects for the development of a particular type (genus) of troops, etc.The method is based on the optimization problem of contributions distribution of services of the Armed Forces or military branches of troops in the general contribution of all our troops in destruction of all means of the enemy for achieving the necessary level of combat capability q ³ q вим of the Armed Forces of Ukraine. Prospects for further research are related to the development of recommendations of substantiation and determination of contributions of services (branches) of troops to the required level of combat capability of Armed Forces (AF) of Ukraine during their use (repulse of armed aggression).
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-125-132
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Oleksandr Dublayn, Valeriі Dobrogursky
      Pages: 133 - 144
      Abstract: In unstable conditions of the security environment, any state must respond flexibly to the full range of threats. At the same time, a state that is threatened with the use of military force in combination with strong informational and psychological influence, measures of political and economic pressure may not always have the resources to adequately symmetrically counteraction. This necessitates the organization of asymmetric counteraction, the main form of achieving the goal of which is a “special operation” with appropriate “local special operations”. Given the lack of security and defense sector as a single functional association special operation of asymmetric counteraction is the substantiation of tasks to the subjects that form the integrated potential for its conduction. The purpose of the article is to develop recommendations for defining the tasks of the components of integrated capacity in the local special operation. Operations are specific in purpose and objectives, and therefore limited in time and composition of forces as a form of asymmetric counteraction to the threat of both military and hybrid nature. Their content is the simultaneous or sequential impact on the vulnerable (“pain”) points of the enemy, which significantly reduces the ability of the enemy to continue the aggressive impact. The synergistic effect of asymmetric measures in operations should be provided by their implementation in various areas, which increases the requirements for justification of tasks to the entities involved. The definition of tasks is based on the decomposition of the purpose of the operation using one of the methods of building a system of goals – building a “tree” of objectives. The main system requirements for the list of goals of the lowest level are their completeness, not redundancy and measurability. The content of the goals determines the list of tasks and activities by which they are achieved. The article provides recommendations on the sequence of tasks for counteractions on the basis of a cognitive approach based on the theory and methods of expert systems, expert-significant intermediate scenarios, analysis of hierarchies, etc. Provided recommendations for the development of appropriate formalized documents.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-133-144
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Olekcandr Marchenko
      Pages: 145 - 150
      Abstract: An analysis of the experience of forcing water obstacles in local wars and armed conflicts of our time indicates that, based on the factors that affect an offensive battle with the crossing of a water obstacle, military formations of various units fulfill the tasks assigned to them and use different methods of action.However, there have been no systemic studies devoted to the determination of effective (rational) ways of performing tasks that are performed by military formations in an offensive battle with the forcing of a water barrier.Thanks to the proposed method, it is possible to solve the problem, the essence of which is to find a rational way to perform tasks, redistribute the forces and means of a military unit according to the stages of an offensive battle with the forcing of a water barrier, in which the target function will be maximum.To substantiate the recommendations regarding the choice of a rational method of offensive combat with the forcing of a water obstacle by subunits of a military unit from the set of admissible ones, the minimax method was used in the methodology, which makes it possible to select the numerical value of the degree of combat mission fulfillment in accordance with the rational option of subunits' actions.In the future, it is possible to develop a special software product, which will make it possible, on the basis of the input of initial data, to determine the degree of achievement of the required level of combat capabilities of a military formation, the duration of combat and the expected degree of accomplishment of tasks by a military formation.The main components of the improved choosing rational ways method of a separate mechanized brigade offensive operation with the forcing of a water obstacle are given in the article. The methodology is based on the use of a proven mathematical apparatus and allows the commander to make the appropriate decision. The improved ways estimation of tasks performance during conducting offensive operation with forcing of a water obstacle method allows:to determine a rational variant of forces and means redistribution on combat order elements;to assess the effectiveness of a separate mechanized offensive operation with the forcing of a water barrier at certain units courses of action;choose a rational course of action from the permissible ones to conduct the operation.
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-145-150
      Issue No: Vol. 39, No. 3 (2020)

    • Authors: Andrii Zinchenko, Kostiantyn Sjkolov, Oleh Hudyma
      Pages: 151 - 162
      Abstract: Hybrid warfare is a combination of traditional and non-traditional methods of warfare, which include the use of special forces, irregular armed groups, information warfare and propaganda, diplomatic measures, cyberattacks, economic pressure and more.The implementation of information security processes involves the mandatory detection of information threats - crisis situations.Given the significant dynamics of change and the density of the flow of crisis situations, the implementation of their identification has the following features: the complexity of formalizing the signs of a crisis situation for identification; signs of a crisis situation can be formed in the form of a set of indicators and (or) criteria; the set of features may contain both objective and subjective indicators and have stochastic or fuzzy uncertainty; lack of a share of information signs of a crisis situation in comparison with the standard; the requirement to obtain a final decision on identification in linguistic form, taking into account the degree of approximation of the object of identification to the standard; the need to obtain an explanation of the formed decision on identification, which is especially important for intelligent decision support systems; large dimension of the problem of identification in the conditions of strict requirements for the efficiency of crisis detection with the density of their flow and significant dynamics of change. The analysis of classical approaches shows their low efficiency for the conditions of crisis identification.Recently, the ideas of synergetics and methods of self-organization have become deeply developed and widespread, in particular in relation to management tasks. Self-organization arises in systems and processes that have the following properties: open architecture; are nonequilibrium; enhance fluctuations, have positive feedback and a sufficient number of interacting elements or transients.There is a uniqueness of the problem of recognizing crisis situations of information direction. It consists of a purely specific list of features for the detection of a controlled process and algorithm of self-organization, which provides a solution to the problem in a large dimension, significant dynamics of change and density of the crisis situation.The purpose of this article is to develop a method of identifying crisis situations of information orientation on the basis of self-organization
      PubDate: 2020-12-30
      DOI: 10.33099/2311-7249/2020-39-3-151-162
      Issue No: Vol. 39, No. 3 (2020)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762

Your IP address:
Home (Search)
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-