12 research outputs found

    Upotreba druŔtvenih mreža u hibridnom ratovanju

    Get PDF
    nem

    An approach in the analysis of communication-information system model in military operation

    Get PDF
    This paper describes an approach to the analysis of performance of the modelled communication-information system (CIS) in military operations using RIVERBED simulation package. The basis of military operations concept and the CIS model to meet the needs of command and control (C2) have been discussed. In order to analyze the possibilities of the CIS for transfer of information the methods of analysis, modelling, operational research and simulations have been applied. The graphs of dependence on load links, the amount of transmitted information (packet) and packet loss depending on the duration of a simulated military operation are shown. The importance of the applied methods of modelling and simulation is represented by the possibility of the CIS modelling, and an analysis of its performance without using a real system due to high economic costs. The only limitation in the paper is the assumed network connectivity between the CIS elements (the effects of relief, vegetation, weather conditions, etc. on telecommunications have not been considered). In a broader sense, the paper is designed for everyone involved in modelling and simulation in order to evaluate an approach to practical application of methods of solving specific problems, and in a narrower sense to persons engaged in the CIS design and telecommunications planning in various types of operations in order to analyze the possibilities and optimize the CIS elements

    Proposal for an ad hoc computer network in the military electronic systems department at the military academy applying bluetooth technology

    No full text
    The historical development of the Bluetooth module is given in the introduction of this paper. The importance of the Bluetooth standard for wireless connection on small distances is shown as well. The organization of the Department of Military Electronic Systems is presented with its area of duties, subordinate sections and deployment. The concept of a local area network for this Department, using Bluetooth technology, includes network topology and working regimes based on the main characteristics and technical specifications for the connection with Bluetooth technology. The Department's disperse computer network is proposed as a scatter net where one piconetwork includes the Head of Department and the Heads of Sections while other piconetworks are formed from the Heads of Sections and their subordinates. The security aspect of the presented network deals with basic computer network attack categories, protection methods and aspects. The paper concludes with some recommendations for the local area network using Bluetooth technology with respect to its economical and security aspects as well as to the managing principles of the Department

    Jedan pristup u oceni efektivnosti sistema za zvukometrijsko izviđanje 'Boomerang' / One approach to the evaluation of the effectiveness of the boomerang system for acoustic source localization and identification

    No full text
    U radu je prikazan jedan pristup u oceni efektivnosti sistema za zvukometrijsko izviđanje. Sistem za zvukometrijsko izviđanje modelovan je kao sistem masovnog opsluživanja, opisana su stanja sistema, parametri i izveden izraz za određivanje verovatnoće opsluživanja sistema za zvukometrijskao izviđanje, kao kriterijuma za ocenu efektivnosti. / One approach to the evaluation of the effectiveness of a system for acoustic source localization and identification has been shown in this article. The system for acoustic source localization and identification has been presented as a model of mass servicing system. The states of the system as well as its features have been described while the formula for service probability determination has been derived as a criterion for effectiveness evaluation. The introductory part of the article describes the system for acoustic source localization and identification and shows a model for quantity estimation of the function of technical system effectiveness E (t). The system effectiveness represents a probability of system initiation as well as a probability of its successful mission accomplishment on the basis of designed capabilities within the given time period and operational conditions. The basic characteristics of the Boomerang system for acoustic source localization and identification show the system elements and its designed capability to detect, analyse and distribute acoustic source location data. The analytical model for the evaluation of the effectiveness of the Boomerang system for acoustic source localization and identification shows that 'n' stations for acoustic source localization can exchange information with each other using the network link. The system conditions are described and the expression for the determination of service probability as a criterion for system effectiveness evaluation is derived. The evaluation of the effectiveness of the Boomerang system for acoustic source localization and identification is presented with a formula for determining mass servicing system probability from the Matlab 6.5R13 program. The following graphs have been obtained: - correlation between mass servicing probability and processing acoustic signal intensity for m=1,2,3,i; - correlation between mass servicing probability and the number of stations for acoustic source localization and identification. The obtained graphs help in the optimization of the system for acoustic source localization and identification. The conclusion gives some guidelines in applying this analysis and achieving optimal resources employment in combat environment

    XVI konferencija YU INFO

    No full text
    OvogodiÅ”nja međunarodna konferencija YU INFO 2010, 16. po redu, održana je na Kopaoniku, u hotelu ā€žKonaciā€œ od 3. do 6. marta 2010. godine. IzvrÅ”ni organizator bilo je Informaciono druÅ”tvo Srbije, koje je, po miÅ”ljenju učesnika, nastavilo tradiciju dobre organizacije. YU INFO predstavlja redovni godiÅ”nji sastanak domaćih i inostranih stručnjaka iz različitih oblasti informaciono-komunikacionih tehnologija (ICT) u najlepÅ”em zimskom ambijentu Kopaonika. Učesnici konferencije imali su priliku da se kroz raznovrsne programske forme upoznaju sa iskustvima najboljih, kao i novim proizvodima, reÅ”enjima i trendovima iz oblasti ICT-a

    Informacioni sistemi u upravljanju rizicima u životnoj sredini

    No full text
    <!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif][if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman";} --> <!--[endif] --> <p class="Rezime" style="margin: 0cm 0cm 0.0001pt; text-indent: 0cm; line-height: 12pt;"><strong><span style="font-style: normal;">Sa</span></strong><strong><span style="font-style: normal;">žetak</span></strong><strong><span style="font-style: normal;">:</span></strong><strong><span style="font-style: normal;"> </span></strong><span style="font-style: normal;">Zemljotresi, poplave, nuklearni i hemijski akcidenti, zagađivanje vazduha, zemljiÅ”ta i voda, ukazuju na sve veće prisustvo nesreća nastalih intenzivnim razvojem i često nekontrolisanom primenom tehnoloÅ”kog razvoja. Pred druÅ”tvo se postavlja problem kako se Å”to bolje pripremiti, kako obezbediti veću usklađenost i funkcionisanje aktivnosti i mera za sprečavanje nastanka akcidentnih situacija i kako uneti promene u druÅ”tveni i tehnoloÅ”ki razvoj koje će ići u korist prirode, ali i za dobrobit budućih generacija. U radu je prikazano koriŔćenje različitih informacionih sistema </span><span style="font-style: normal;">(IS) </span><span style="font-style: normal;">u upravljanju rizicima u </span><span style="font-style: normal;">životnoj sredini i predlog za izradu jedinstvenog IS u </span><span style="font-style: normal;">Republici Srbiji.</span></p

    Modern insurgency: Islamic State

    No full text
    The development of new technologies, among other things, has had an effect on modern insurgency as well. Modern technologies enhance networking and synchronization of insurgent forces. Unlike traditional insurgency, which was characterized by the struggle for liberation from a certain form of oppression, the characteristic of modern insurgency is the creation and survival of new entities, identities and ideas. Islamic State, as the most successful modern insurgent organization, emerges in a wave of different social, political and economic tensions in the Middle East and wider area. It has, above all, contested the territorial division of the region imposed after the fall of the Ottoman Empire. It has also succeeded to establish a concept of government, national sovereignty and identity on the conquered territory. It is best known for its ruthless tactics used to win the control of the territory, but the question widely asked today is whether this tactics will be sufficient for this organization to create a state and, therefore, to successfully and sustainably govern and eventually gain wider support of the people on the taken territory, not only the support of fighters and power enforcers in the occupied territory. The organization has so far manifested the signs of growth and development. It is strategically flexible, economically viable, and uses the media efficiently. Religion is used as a basis for action, but also for control, although in its ranks there are people who are not motivated for action by religion 'only'. Finally, after three years of the Islamic State's existence, a new form of insurgency has been established, so that counterinsurgency must evolve if success in the fight against the Islamic State is sought
    corecore