A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

              [Sort by number of followers]   [Restore default list]

  Subjects -> MILITARY (Total: 106 journals)
Showing 1 - 24 of 24 Journals sorted alphabetically
A Fragata     Open Access   (Followers: 7)
Acanto     Open Access   (Followers: 2)
Africa Conflict Monitor     Full-text available via subscription   (Followers: 7)
Âncoras e Fuzis     Open Access   (Followers: 2)
Armed Conflict Survey     Full-text available via subscription   (Followers: 12)
Armed Forces & Society     Hybrid Journal   (Followers: 21)
Arms & Armour     Hybrid Journal   (Followers: 10)
British Journal for Military History     Open Access   (Followers: 36)
Bulletin of the Atomic Scientists     Hybrid Journal   (Followers: 7)
Caderno de Ciências Navais     Open Access   (Followers: 2)
Ciencia y Poder Aéreo     Open Access   (Followers: 3)
Civil Wars     Hybrid Journal   (Followers: 21)
Coleção Meira Mattos : Revista das Ciências Militares     Open Access  
Conflict, Security & Development     Hybrid Journal   (Followers: 269)
Critical Military Studies     Hybrid Journal   (Followers: 3)
CRMA Journal of Humanities and Social Sciences     Open Access   (Followers: 1)
Cuadernos de Marte     Open Access  
Defence and Peace Economics     Hybrid Journal   (Followers: 17)
Defence Science Journal     Open Access   (Followers: 32)
Defence Studies     Hybrid Journal   (Followers: 27)
Defence Technology     Open Access   (Followers: 2)
Defense & Security Analysis     Hybrid Journal   (Followers: 26)
Digital War     Hybrid Journal   (Followers: 1)
Doutrina Militar Terrestre em Revista     Open Access  
Eesti Sõjaajaloo Aastaraamat / Estonian Yearbook of Military History     Open Access   (Followers: 2)
Espírito de Corpo     Open Access   (Followers: 2)
EsSEX : Revista Científica     Open Access  
First World War Studies     Hybrid Journal   (Followers: 20)
Fra Krig og Fred     Open Access   (Followers: 1)
Gettysburg Magazine     Full-text available via subscription  
Human Factors and Mechanical Engineering for Defense and Safety     Hybrid Journal   (Followers: 1)
Informativo Marítimo     Open Access   (Followers: 2)
International Bibliography of Military History     Hybrid Journal   (Followers: 7)
International Journal of Intelligent Defence Support Systems     Hybrid Journal   (Followers: 3)
International Journal of Military History and Historiography     Hybrid Journal  
International Peacekeeping     Hybrid Journal   (Followers: 249)
Journal for Maritime Research     Hybrid Journal   (Followers: 9)
Journal of African Military History     Hybrid Journal   (Followers: 1)
Journal of Archives in Military Medicine     Open Access   (Followers: 2)
Journal of Bioterrorism & Biodefense     Open Access   (Followers: 4)
Journal of Chinese Military History     Hybrid Journal   (Followers: 5)
Journal of Conflict and Security Law     Hybrid Journal   (Followers: 18)
Journal of Conventional Weapons Destruction     Open Access  
Journal of Defense Analytics and Logistics     Open Access  
Journal of Defense Modeling and Simulation : Applications, Methodology, Technology     Hybrid Journal   (Followers: 3)
Journal of Defense Studies & Resource Management     Hybrid Journal   (Followers: 1)
Journal of Military and Strategic Studies     Open Access   (Followers: 2)
Journal of Military and Veterans Health     Full-text available via subscription   (Followers: 6)
Journal of Military Ethics     Hybrid Journal   (Followers: 11)
Journal of Military Experience     Open Access   (Followers: 5)
Journal of Military History     Full-text available via subscription   (Followers: 31)
Journal of Military Studies     Open Access   (Followers: 4)
Journal of National Security Law & Policy     Free   (Followers: 6)
Journal of Naval Architecture and Marine Engineering     Open Access   (Followers: 5)
Journal of power institutions in post-soviet societies     Open Access   (Followers: 2)
Journal of Slavic Military Studies     Hybrid Journal   (Followers: 17)
Journal of Terrorism Research     Open Access   (Followers: 21)
Journal of the Royal Army Medical Corps     Hybrid Journal   (Followers: 6)
Journal on Baltic Security     Open Access   (Followers: 1)
Martial Arts Studies     Open Access  
Media, War & Conflict     Hybrid Journal   (Followers: 17)
Medical Journal Armed Forces India     Full-text available via subscription  
Medicine, Conflict and Survival     Hybrid Journal   (Followers: 3)
Military Behavioral Health     Hybrid Journal   (Followers: 5)
Military Medical Research     Open Access   (Followers: 4)
Military Medicine     Hybrid Journal   (Followers: 7)
Military Psychology     Hybrid Journal   (Followers: 10)
Modern Information Technologies in the Sphere of Security and Defence     Open Access   (Followers: 1)
Naval Research Logistics: an International Journal     Hybrid Journal  
Navigator     Open Access   (Followers: 2)
Nonproliferation Review     Hybrid Journal   (Followers: 5)
O Adjunto : Revista Pedagógica da Escola de Aperfeiçoamento de Sargentos das Armas     Open Access  
O Periscópio     Open Access   (Followers: 3)
Perspectives on Terrorism     Open Access   (Followers: 257)
Post-Soviet Armies Newsletter     Open Access   (Followers: 1)
Problemy Mechatroniki. Uzbrojenie, lotnictwo, inżynieria bezpieczeństwa / Problems of Mechatronics. Armament, Aviation, Safety Engineering     Open Access   (Followers: 3)
Revista Agulhas Negras     Open Access  
Revista Babilônia     Open Access  
Revista Científica Fundação Osório     Open Access  
Revista Científica General José María Córdova     Open Access  
Revista Cubana de Medicina Militar     Open Access   (Followers: 1)
Revista do Exército     Open Access  
Revista Militar de Ciência e Tecnologia     Open Access  
Revista Naval de Odontologia On Line / Naval Dental Journal     Open Access   (Followers: 3)
Revista Política y Estrategia     Open Access  
Sabretache     Full-text available via subscription   (Followers: 1)
Sanidad Militar     Open Access  
Scandinavian Journal of Military Studies     Open Access   (Followers: 1)
Scientia Militaria : South African Journal of Military Studies     Open Access   (Followers: 3)
Scientific Journal of Polish Naval Academy     Open Access  
Security and Defence Quarterly     Open Access   (Followers: 5)
Security Studies     Hybrid Journal   (Followers: 44)
Signals     Full-text available via subscription   (Followers: 4)
Small Wars & Insurgencies     Hybrid Journal   (Followers: 252)
Small Wars Journal     Open Access   (Followers: 17)
Social Development & Security : Journal of Scientific Papers     Open Access  
Special Operations Journal     Hybrid Journal   (Followers: 2)
Strategic Comments     Hybrid Journal   (Followers: 6)
The Military Balance     Hybrid Journal   (Followers: 7)
The RUSI Journal     Hybrid Journal   (Followers: 14)
Transportation Research Part E: Logistics and Transportation Review     Hybrid Journal   (Followers: 17)
United Service     Full-text available via subscription   (Followers: 1)
University of Miami National Security & Armed Conflict Law Review     Open Access  
Vojnotehnički Glasnik     Open Access   (Followers: 1)
War & Society     Hybrid Journal   (Followers: 27)
War in History     Hybrid Journal   (Followers: 23)
Whitehall Papers     Hybrid Journal   (Followers: 3)
Wiedza Obronna     Open Access  
선진국방연구     Open Access  

              [Sort by number of followers]   [Restore default list]

Similar Journals
Journal Cover
Modern Information Technologies in the Sphere of Security and Defence
Number of Followers: 1  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2311-7249 - ISSN (Online) 2410-7336
Published by National Defence University of Ukraine named after Ivan Cherniakhovsky Homepage  [1 journal]
  • Application of the method of two functions for solving the tasks of combat
           support of missile troops and artillery

    • Authors: Oleksandr Maistrenko , Oleksandr Lykholot, Maksym Kolchenko
      Pages: 5 - 16
      Abstract: The study is devoted to the substantiation of approaches to the development and implementation of a program related to determining the need for meteorological equipment and the completeness of meteorological information in the respective military formations. The article analyzes the existing forms of meteorological information. It was found that the forms of providing such information depend on the needs of the consumer, but have some information that is useful for the needs of military consumers, in particular for the needs of missile troops and artillery. Such information includes: air temperature, atmospheric pressure, wind speed and direction, humidity. Also, the paper develops the procedure for translating metrological information obtained from various sources into the form required for military formations. The main stages of the order are: transfer of atmospheric pressure; construction of a graph of vertical distribution of standard isobaric surfaces and transfer of this graph from standard isobaric surfaces to standard heights accepted in missile troops and artillery; plotting the dependence of air temperature, direction and wind speed on standard heights; recalculation of wind direction and speed into ballistic wind components at standard heights; taking into account the predicted values ​​of meteorological elements; generalization of meteorological and hydrological phenomena. In addition, the article develops a method of optimal distribution of sources of meteorological information by consumers. The essence of the method is to apply the method of nonlinear programming, the so-called method of two functions, for the distribution of inhomogeneous, if possible, sources of metadata between inhomogeneous, as needed, consumers of such information. This technique allows to quickly distribute the available sources of meteorological information among consumers of such information. The study also proposed a procedure for using the software "Completeness of meteorological information". This procedure includes a sequence of actions and their content for the use of the specified software. The specified procedure allows to reduce time for mastering of skills of work with the specified software.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-5-16
      Issue No: Vol. 42, No. 3 (2021)
       
  • Improved method of evaluating the efficiency functioning of the tactical
           level air defense system

    • Authors: Kostiantyn Horbacov
      Pages: 17 - 24
      Abstract: Changes in the methods of warfare, which are taking place as a result of the rapid development of air attack weapons, including unmanned ones, as well as aircraft weapons, cause an increase in the requirements for air defense systems. This is especially true for military formations of the tactical level, which form the basis for the creation of groupings of troops and the implementation of tasks for conducting combined arms combat. That is, the effectiveness of the functioning of the air defense system will significantly affect the success of military formations in the implementation of the tactical level tasks of combined arms combat. But, at present, the question of ensuring the correspondence of the forecasting results to the real conditions of the situation remains open. First of all, because the methods used to assess the effectiveness of the functioning of the air defense system of military formations at the tactical level are not perfect. Thus, the results of the analysis of the provisions of the existing assessment methods indicate that they are not fully intended for the tactical level or do not take into account the peculiarities of the preparation and conduct of combined arms combat, and also do not cover the changes in the concepts of using air attack weapons that have occurred recently. Therefore, taking into account the ongoing military aggression against our state, the solution of the scientific task of improving the methodology for assessing the effectiveness of the functioning of the air defense system of military formations of the tactical level in a combined arms battle is very urgent. The article presents the general provisions of the improved methodology, which were determined as a result of the study of the process of performing the tasks of combined arms combat by military formations at the tactical level. Ensuring the sensitivity of the proposed methodology to the operating conditions of the air defense system in combined arms combat, in contrast to the existing ones, will allow in the future, based on the results of calculations, to make reasonable proposals to improve the efficiency of its functioning.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-17-24
      Issue No: Vol. 42, No. 3 (2021)
       
  • Determination of the differential-taylor spectrum of a complex function
           for a variant of superposition in analysis of the accuracy of dynamic
           systems

    • Authors: Mykhailo Rakushev, Mykola Filatov
      Pages: 25 - 30
      Abstract: In the article, dependences are obtained for determining the differential-Taylor spectrum of a complex function, given in the form of a superposition of functions. Namely, for the case when the original function is given by the Taylor series in the degree of some variable - the first argument, and the final function is given by the Taylor series in the degree of the original function. Next, we solve the problem of determining the differential Taylor spectrum - the coefficients of the Taylor series of a finite function in powers of the first argument. In the classical literature on differential-Taylor transformations, the specified differential-Taylor spectrum (individual terms of the Taylor series) is presented as an infinite sum in powers of the first argument. In the article, dependences are obtained that define the differential-Taylor spectrum of a superposition of functions as a finite sum in powers of the first argument. At the same time, dependences are given in two different forms, which makes it possible to choose a form that is more convenient for specific practical use. A feature of the obtained formulas is the use of reduced algebraic convolution when calculating the differential-Taylor spectrum of the power function for the first argument - the convolution does not take into account the zero discrete of the differential-Taylor spectrum of the original function with respect to the first argument. At the same time, dependences are given in two different forms, which makes it possible to choose a form that is more convenient for specific practical use. A feature of the obtained formulas is the use of reduced algebraic convolution when calculating the differential-Taylor spectrum of the power function for the first argument - the convolution does not take into account the zero discrete of the differential-Taylor spectrum of the original function with respect to the first argument. The obtained relations are essential for the problems of analyzing the dependence of the accuracy of the representation of a finite function on a given number of taken into account discrete differential-Taylor spectrum of the original function, as well as solving the problem of estimating the dependence of the accuracy of the solution of the Cauchy problem for ordinary differential equations by the method of differential-Taylor transformations when the number of taken into account discrete Taylor spectrum that take part in the calculations. The obtained dependences are a further development of the theoretical foundations of the domestic mathematical apparatus of Pukhov's differential-Taylor transformations.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-25-30
      Issue No: Vol. 42, No. 3 (2021)
       
  • Approach to building multi-position system of radiation sources

    • Authors: Serhii Hatsenko , Kostiantyn Sapozhnykov, Vitalii Stashko, Yefim Seifetdinov
      Pages: 31 - 36
      Abstract: Conditions for solving the problem of building a reliable monitoring system requires solving the important problem of locating sources of radio radiation. Among the variety of methods for determining the coordinates of a radio source (DRV) of the short-wave range (HF), the most widely used triangulation (angular) method. Its implementation requires at least two direction-finding receivers spaced at a distance defined as the direction-finding base, with accurate mutual time synchronization with electromagnetic availability of the direction-finding object simultaneously for all posts. Continuous fulfillment of these conditions in the HF range is complicated by the fact that the characteristics of radio wave propagation significantly depend on the profile and electrophysical parameters of radio paths and are subject to seasonal and diurnal fluctuations in the concentration of charged particles in the ionosphere. In case of violation of the conditions of availability or lack of temporary synchronization in the positioning system, the only parameter available for measurement is the direction to the DRV from one direction finder, which eliminates the possibility of triangulation estimation of coordinates. To eliminate this shortcoming, the article analyzes the conditions of ionospheric propagation of radio waves and identifies the main factors influencing the violation of electromagnetic availability of radio sources for direction finders of the triangulation system for positioning in the shortwave range. A method for estimating the coordinates of emitters by measuring the amplitudes of their signals by a system of software-controlled receivers located in areas of electromagnetic accessibility is presented. Estimates of changes in the areas of location of objects in the joint assessment of the amplitudes of signals in the multi-position system of receivers-meters and directions of their arrival by remote direction finders.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-31-36
      Issue No: Vol. 42, No. 3 (2021)
       
  • Typology of cyber security systems in information and telecommunication
           systems of military (special) purpose

    • Authors: Yevhen Zhyvylo , Dmytro Shevchenko, Oleksandr Chernonog
      Pages: 37 - 44
      Abstract: The article considers the topical issue of approaches to determining the typology of cybersecurity systems in information and telecommunication systems for military (special) purposes. Recent research and publications on this issue are analyzed. The analysis and experience of the leading countries of the world show that in the conditions of modern military operations the effective functioning of the cybersecurity system in information and telecommunication systems of military (special) purpose will be in the conditions of constant enemy influence. Under these conditions, the transformation of views on the creation of cybersecurity and cyber defense systems and, accordingly, the development of their structures and typologies in leading countries is influenced by technology, changes in the security environment, forms, methods and technologies of warfare and new advances. The article proposes an approach to the typology of cybersecurity systems in information and telecommunication systems for military (special) purposes. The article identifies the objects of cyber influence: technical systems, the society of the opposing party, socio-technical systems and cognitive space. Areas and areas subject to cyber defense and cyber defense are considered and a brief description is given. The typology of cybersecurity systems in information and telecommunication systems of military (special) purpose on its functional purpose and component is offered. The functional subsystems of the leading countries of the world and NATO member states have been analyzed in the ITS military (special) cyber security system. The methodical approach for the decision of an applied problem which consists in definition of approaches for creation of typologies of the specified systems is considered in article. The proposed typology of cybersecurity systems in military information and telecommunication systems takes into account the objects of cyber influence, which are due to the peculiarities of cyberdia in cyberspace in modern conditions. This makes it possible to implement the typology of the cybersecurity system in the information and telecommunication systems of the military (special) as a whole, individual elements and its components. The most rational variant of creating a typology of cybersecurity systems is proposed, which in accordance with current development trends, taking into account the military-political situation, national interests and legislation, will provide informational, cyber and cognitive advantage over the enemy and will promote the practical implementation of the concept of smart-defense.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-37-44
      Issue No: Vol. 42, No. 3 (2021)
       
  • Method of increasing the reliability of knowledge software-oriented
           systems due to code re-use mechanisms

    • Authors: Ihor Kostiuk, Maxim Pavlenko , Serhii Osiievskyi , Oleksii Nesmiian
      Pages: 45 - 54
      Abstract: The possibilities of application of the code reuse mechanism in the process of designing and developing software of knowledge-oriented systems are considered. The necessity of a separate study of the issues of software development of analytical and information resources that provide support to all participants in the process of software development of knowledge-oriented systems is proved. The necessity of using the mechanisms of reuse of previously developed and verified program code as an element of the information resource is shown. In the framework of the developed method of increasing the reliability of knowledge-oriented systems software due to the mechanisms of code reuse, a new visual form of representation of function libraries in the form of a single software shell is proposed. As a basic tool for solving the problem of information resource development, it is proposed to use UML (Unified Modeling Language) - a unified modeling language, which is based on the paradigm of object-oriented programming. This choice is justified by the fact that UML is an integral part of a unified software development process and is essentially an open standard that uses graphical notation to create an abstract model of the system. The obtained theoretical provisions are reflected in a cross-cutting example, which reflects one of the possible options for organizing libraries of functions as an element of the information resource. Diagrams of use cases, interaction diagrams, sequence diagrams, class diagrams are developed and substantiated. Based on the obtained practical results, a block diagram of the method is proposed, which, in contrast to existing solutions, includes a procedure for making corrections for basic UML diagrams according to the requirements of programming environments.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-45-54
      Issue No: Vol. 42, No. 3 (2021)
       
  • Conditions of application of the method of own radiation in solving tasks
           of technical diagnosis of semiconductor structures

    • Authors: Vasyl Kuzavkov , Mariia Romanenko , Julia Bolotyuk
      Pages: 55 - 62
      Abstract: The article considers the peculiarities of the application of the method of own radiation for complex semiconductor structures (microprocessors, microcontrollers, programmable-logic integrated circuits, etc.). The method of own radiation is associated with the registration of the parameters of the electromagnetic field in the infrared wavelength range. The parameters of this radiation directly depend on the temperature of the object of control - the temperature of the semiconductor structure. The use of temperature as a diagnostic parameter requires an analytical description of the processes in semiconductor structures, namely the physical and chemical processes associated with the thermodynamic properties of the crystal structure and the surface that insulates the crystal from the environment. In order to activate functional units that are part of large integrated circuits, the proposed method uses a specially prepared test sequence. The length of the specified sequence must ensure that the temperature process reaches a steady state. However, in this case, distortion of diagnostic information is possible as a result of the mutual influence of temperature from adjacent functional units. In this work, the registration time (length of the activating influence) of the diagnostic parameter of individual functional units is determined. The conditions of heat propagation in the insulating layer of a semiconductor structure, which includes several separate functional units with a known geometric location on the substrate, are analyzed. Research is aimed at solving problems of technical diagnostics, namely: determining the actual technical condition of digital electronic equipment and forecasting the technical condition.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-55-62
      Issue No: Vol. 42, No. 3 (2021)
       
  • Algorithm of multifractal loading balance of special purpose information
           telecommunications networks

    • Authors: Oleksandr Permiakov, Natalia Korolyuk , Dmitro Golubnychiy , Petro Skoropaniuk
      Pages: 63 - 70
      Abstract: The article establishes that the basis of the information infrastructure of an effective control system is modern multiservice telecommunication networks, the effectiveness of which, taking into account the experience of the operation of the Joint Forces, depends on the degree of automation and intellectualization. There is a rapid growth in the volume of data traffic and the demand for the size of information flows in the process of providing types of services. The existing telecommunication networks turned out to be insolvent in servicing subscribers with the specified quality indicators, solving traffic management problems. The existing tools for assessing, managing, shaping traffic, distribution, routing and rate limiting are distributional in nature. Heuristic models of assessment, traffic management, and finding the shortest path in the network are not able to take into account changes in the current load of a network node, characteristics of user traffic. The requirements for the communication system, which are necessary to ensure high-quality control of units and subdivisions of the Air Force, have been determined. The main factors influencing the assessment of the throughput are analyzed and recommendations for balancing the load in the information and telecommunications network of the Air Force are formulated. Based on the analysis of multifractal properties of incoming traffic, a dynamic traffic balancing algorithm is proposed. Substantiated expediency of using a unified approach in assessing the capacity in the information and telecommunication networks of the Air Force. The ways to achieve the required level of communication system throughput have been determined, allowing in difficult conditions to ensure the quality of the throughput not lower than that of the communication system. To achieve high performance, throughput, it is advisable to reduce the response time in distributed systems by balancing the network load. This ensures traffic management and maximum utilization of all servers in the cluster. The proposed approach to load balancing should provide statistically even distribution of the load on the servers, high performance, throughput, fault tolerance, and low response time. The balancing algorithm should distribute requests among servers so that the deviation of the average server load is minimal.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-63-70
      Issue No: Vol. 42, No. 3 (2021)
       
  • Prospects for the development of tropospheric communication in information
           and telecommunication systems for special purpose

    • Authors: Yevhen Stepanenko , Viacheslav Dumitrash , Olha Dumitrash , Vitalii Kokoshynskyi
      Pages: 71 - 78
      Abstract: Modern military conflicts have changed the general approach to the conduct of hostilities. Previously, wars developed by increasing the scale (mass character) with direct contact of troops (forces), but modern wars are waged on the principle of a decrease in human resources with an increase in the use of highly intelligent weapons at significant distances. Today, the widespread use of high-precision weapons, means of fire destruction in combination with reconnaissance means, sabotage and reconnaissance groups, illegal armed formations, means of electronic suppression significantly affects the functioning of the military communications system. This trend will only intensify in the future, which creates threats to the functioning of the control system. In the war of the future, each state sets its task to adequately and timely identify key risks, the direction of technological development and understand how it can affect the potential of a possible future military conflict. In the foreseeable future, the basis of the promising information and telecommunications system of the Armed Forces of Ukraine should be a united automated digital communication system, which should include a space, air, ground (field and stationary) and marine component, an automated communications control system and an information security system and should contribute to closer convergence (mutual integration) of command and control systems of troops and weapons into a single information-reconnaissance-fire (strike) spatially distributed system, the key elements of which are reconnaissance-strike complexes. In this regard, it became necessary to adjust the approaches to determining the main directions of development of means and complexes of tropospheric communication as a component of the information and telecommunication system of the Armed Forces of Ukraine. The article contains proposals regarding the prospects for the development of tropospheric radio communications in the interests of the Armed Forces of Ukraine.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-71-78
      Issue No: Vol. 42, No. 3 (2021)
       
  • Digitalization of society and organizational and legal mechanisms of
           functioning of the unified state reserves register

    • Authors: Oleksandr Pravdivets
      Pages: 79 - 84
      Abstract: The article describes the organizational and legal mechanisms of the Unified State Register. An analysis of the regulatory and legal support of state mechanisms for the functioning of the Unified State Register, as a direction of state policy of Ukraine. Recommendations for improving the regulations that determine the organizational and legal mechanisms of the Unified State Register are substantiated. The application of these recommendations in the practice of the Central Executive Bodies, in particular during the formation of the digital transformation policy in the Ministry of Defense of Ukraine on the integration of the Unified State Register will introduce the necessary legal mechanisms for organizing and ensuring information interaction between state registers. military registration of citizens of Ukraine for manning troops (forces). In addition, the practical implementation of the recommendations will create a legal basis for the implementation by the Ministry of Defense of Ukraine of projects envisaged by the Government Action Plan for the introduction of electronic military records and the creation of an electronic Territorial Center for Recruitment and Social Support.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-79-84
      Issue No: Vol. 42, No. 3 (2021)
       
  • Simulation the functioning of subsystem of delivery of material means to
           troops using logical functions

    • Authors: Oleksandr Khazanovich , Victor Lazorenko , Volodymyr Loza
      Pages: 85 - 88
      Abstract: The article is dedicated to a topical issue which is related to improving the efficiency of the transportation material resources subsystem based on the introduction of an automated management system and monitoring of logistics processes in the Armed Forces of Ukraine.It is necessary to apply a logistical approach and military logistics to effective provision by material resources and services of Armed Forces of Ukraine. The logistic system is created with a logistic approach to the provision of materiel and services to the troops. The logistics system functions as an organizational and economic mechanism for managing material and information flows. It usually consists of several subsystems and has developed connections with the external environment. The purpose of the logistics system is delivery in a timely manner, in a given place the required number and range of the most prepared material resources at minimum cost. This task is solved by the subsystem for the supply of material resources.The issues of improving the subsystem of transportation of material resources, as a component of logistics systems, on the basis of modeling the process of transportation of material resources to the troops are considered.At the present stage of development, the problem of developing a logical and mathematical model of a subsystem for the supply of material resources to troops on the basis of the analysis of the application of mathematical modeling of the support of troops (forces) of the Armed Forces of Ukraine has been identified. The description of the process of modeling this subsystem using logistic functions to determine the time for the delivery of materiel to the troops during the operation has been made. In the end, the directions of further research in this direction are formulated, which are connected with the development of logical-mathematical models of other processes of providing troops.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-85-88
      Issue No: Vol. 42, No. 3 (2021)
       
  • Use simulation capabilities of combat actions in the training process of
           military administrative bodies

    • Authors: Liudmyla Zaika , Oleksandr Lavrinchuk , Valerii Krainov
      Pages: 89 - 96
      Abstract: Modern trends in the development of information and communication technologies; in particular, in the environment of military simulation tools, world experiences in the operational and combat training of troops create favorable conditions for the development of various aspects of their use. In the article, authors considered the classification of such means, substantiated using of simulation means capabilities in combat exercises to develop intellectual, emotional, and volitional qualities of servicemen in a combat training environment to increase the level of their training. Based on the results of the research, the experience of  use the modern combat operations simulation tool JCATS (Joint Conflict and Tactical Simulation) in the Ukrainian Armed Forces over the past years, authors have investigated ways of use simulation results to assess practical component of military administrative bodies training at one of the stages of brigade staffs preparation during command exercises of the basic stage of combat training of the Ground Forces of the Armed Forces of Ukraine. Guided by the indicated assessment methods and results obtained in the course of simulation modeling on JCATS (quantitative, observation results of mediators, experts, etc.), authors consider the possibility of obtaining a quantitative assessment of level training of the military administrative body.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-89-96
      Issue No: Vol. 42, No. 3 (2021)
       
  • Comparative simulation of monitoring of cognitive information space of
           Ukrainian defense forces

    • Authors: Vitalii Katsalap , Serhii Kovalov, Oleksandr Marchenko
      Pages: 97 - 104
      Abstract: The article considers the issues of theoretical substantiation of the processes of modeling the monitoring of the cognitive information space of the defense forces of Ukraine. At the same time, due to lack of knowledge in theory and practice of modeling monitoring of cognitive information space, research was conducted mainly by "mirroring" the order of determining changes in intentions in the behavior of subjects of information and psychological influence, both for defense and enemy. Substantiation of the content of the process of modeling monitoring of cognitive information space in the interests of information and psychological influence of defense forces is due to the impossibility of free access to target enemy audiences and collecting necessary information, as well as inconsistency of assessment of the degree of change in their behavior. These characteristics classify the target audiences and subjects of information and psychological influence according to certain indicators of remote information management of social and individual behavior of possible objects of information and psychological influence. Using the formulated conditions and based on psychological and psychophysiological characteristics of the individual form the basis of vulnerabilities of the target audience, which reflects the dependence of changing perceptions of social behavior on the intensity of external negative information and psychological influences. The algorithm of information perception forms the cognitive information space of a certain target audience. Therefore, the application of modeling of planned behavior during the monitoring of the cognitive information space provides an opportunity to ignore the inflated small values of probabilities. The proposed approach to modeling the monitoring of the cognitive information space of the defense forces allows to obtain initial data on which to build a model of behavior of the target audience in any situation.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-97-104
      Issue No: Vol. 42, No. 3 (2021)
       
  • Electronic communications as an important element of sustainable
           functioning of critical infrastructure

    • Authors: Serhii Gnatiuk , Natalia Skibun, Yevhen Zhyvylo , Serhii Voloshko
      Pages: 105 - 110
      Abstract: The study of the role of the electronic network of the Internet allows a huge variety of research approaches: it can be seen as information technology, as a psychosociological phenomenon, as a community, as folklore, as a universal database, etc. From the point of view of communicative purposes, communication via the Internet has all the diversity that is inherent in other types of communication - it is visible to the naked eye when you first turn to the content of electronic messages. In the framework of this study, electronic communications were considered in the context of an important element of sustainable and secure operation of critical infrastructure in Ukraine. It was noted that electronic communications together with the information infrastructure are, in modern conditions, the basis of information and communication systems for the management of information critical and critical infrastructures. The level of impact of electronic communications on the sustainable and safe operation of critical infrastructure is growing with the further digitalization of communications and processes, the introduction of automatic and automated control systems, the use of artificial intelligence and the Internet of Things.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-105-110
      Issue No: Vol. 42, No. 3 (2021)
       
  • Model of the process of determining threats to military security as a
           component of national security of the state

    • Authors: Serhii Hatsenko , Kostiantyn Pashchenko, Yurіj Sveredyuk, Maksim Starish
      Pages: 111 - 116
      Abstract: The events of the last few years show that in modern interstate relations the role of military force is becoming increasingly important. To achieve their goals, geopolitical players increasingly resort to the use of military force or use other instruments of external influence (economic, energy, political), which directly or indirectly pose a threat to national security and its components, especially military security (WBD). Increasingly, external influences are becoming less predictable and predictable, and, consequently, their destructive power is growing. In this regard, the question of creating tools for determining the level of WBD in order to respond to the state in a timely manner to challenges and threats becomes relevant. A comprehensive analysis of world scientific achievements and views on the problem of assessing and forecasting the level of WBD allows us to conclude that WBD is a component of national security and is a system of political, legal, organizational, military and technical measures of the state to ensure timely detection, prevention and neutralization. threats (risks, challenges) to national interests, in particular with the use of military force. In turn, the assessment of the level of WBD can be presented as an integral indicator of the state's ability to timely identify and prevent (neutralize) challenges, risks and threats according to certain indicators.
      PubDate: 2021-12-17
      DOI: 10.33099/2311-7249/2021-42-3-111-116
      Issue No: Vol. 42, No. 3 (2021)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 34.204.174.110
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-