Abstract: The purpose of the research is to investigate the energetic feature of the backpack load on soldier’s gait with variation of the trunk flexion angle. It is believed that the trunk flexion variation of the loaded gait may cause a significant difference in the energy cost which is often in practice in daily life. To this end, seven healthy Korea military personnel participated in the experiment and are tested under three different walking postures comprised of the small, natural and large trunk flexion. There are around 5 degree differences of waist angle between each trunk flexion. The ground reaction forces were collected from the force plates and motion kinematic data are measured by the motion capture system. Based on these data, the impulses, momentums and mechanical works done on the center of body mass (COM) during the double support phase were computed. The result shows that the push-off and heel strike impulse are not relevant to the trunk flexion change, however the mechanical work by the push-off and heel strike were changed by the trunk flexion variation. It is because the vertical velocity of the COM during the double support phase is increased significantly with an increase in the trunk flexion. Therefore, we can know that the gait efficiency of the loaded gait depends on the trunk flexion angle. Also, even though the gravitational impulse and pre-collision momentum are changed by the trunk flexion variation, the after-collision momentum is almost constant regardless of the trunk flexion variation.
Abstract: Fault detection determines faultexistence and detecting
time. This paper discusses two layered fault detection methods to
enhance the reliability and safety. Two layered fault detection methods
consist of fault detection methods of component level controllers and
system level controllers. Component level controllers detect faults by
using limit checking, model-based detection, and data-driven
detection and system level controllers execute detection by stability
analysis which can detect unknown changes. System level controllers
compare detection results via stability with fault signals from lower
level controllers. This paper addresses fault detection methods via
stability and suggests fault detection criteria in nonlinear systems. The
fault detection method applies tothe hybrid control unit of a military
hybrid electric vehicleso that the hybrid control unit can detect faults
of the traction motor.
Abstract: the article analyzes the national security as a scientific and practical problem, characterized by the state's political institutions to ensure effective action to maintain optimal conditions for the existence and development of the individual and society. National security, as a category of political science reflects the relationship between the security to the nation, including public relations and social consciousness, social institutions and their activities, ensuring the realization of national interests in a particular historical situation. In national security are three security levels: individual, society and state. Their role and place determined by the nature of social relations, political systems, the presence of internal and external threats. In terms of content in the concept of national security is taken to provide political, economic, military, environmental, information security and safety of the cultural development of the nation.
Abstract: Unmanned Aerial Vehicles (UAVs) have gained tremendous importance, in both Military and Civil, during first decade of this century. In a UAV, onboard computer (autopilot) autonomously controls the flight and navigation of the aircraft. Based on the aircraft role and flight envelope, basic to complex and sophisticated controllers are used to stabilize the aircraft flight parameters. These controllers constitute the autopilot system for UAVs. The autopilot systems, most commonly, provide lateral and longitudinal control through Proportional-Integral-Derivative (PID) controllers or Phase-lead or Lag Compensators. Various techniques are commonly used to ‘tune’ gains of these controllers. Some techniques used are, in-flight step-by-step tuning, software-in-loop or hardware-in-loop tuning methods. Subsequently, numerous in-flight tests are required to actually ‘fine-tune’ these gains. However, an optimization-based tuning of these PID controllers or compensators, as presented in this paper, can greatly minimize the requirement of in-flight ‘tuning’ and substantially reduce the risks and cost involved in flight-testing.
Abstract: This paper considers the benefits gained by using an
efficient quality of service management such as DiffServ technique to
improve the performance of military communications. Low delay and
no blockage must be achieved especially for real time tactical data.
All traffic flows generated by different applications do not need same
bandwidth, same latency, same error ratio and this scalable technique
of packet management based on priority levels is analysed. End to
end architectures supporting various traffic flows and including lowbandwidth
and high-delay HF or SHF military links as well as
unprotected Internet sub domains are studied. A tuning of Diffserv
parameters is proposed in accordance with different loads of various
traffic and different operational situations.
Abstract: Nowadays the devices of night vision are widely used both for military and civil applications. The variety of night vision applications require a variety of the night vision devices designs. A web-based architecture of a software system for design assessment before producing of night vision devices is developed. The proposed architecture of the web-based system is based on the application of a mathematical model for designing of night vision devices. An algorithm with two components – for iterative design and for intelligent design is developed and integrated into system architecture. The iterative component suggests compatible modules combinations to choose from. The intelligent component provides compatible combinations of modules satisfying given user requirements to device parameters. The proposed web-based architecture of a system for design assessment of night vision devices is tested via a prototype of the system. The testing showed the applicability of both iterative and intelligent components of algorithm.
Abstract: The international society focuses on the environment
protection and natural energy sources control for the global
cooperation against weather change and sustainable growth. The study
presents the overview of the water shortage status and the necessity of wastewater reuse facility in military facilities and for the possibility of
the introduction, compares the economics by means of cost-benefit
analysis. The military features such as the number of users of military barracks and the water use were surveyed by the design principles by
facility types, the application method of wastewater reuse facility was selected, the feed water, its application and the volume of reuse volume were defined and the expectation was estimated, confirming
the possibility of introducing a wastewater reuse possibility by means of cost-benefit analysis.
Abstract: Wireless sensor network can be applied to both abominable
and military environments. A primary goal in the design of
wireless sensor networks is lifetime maximization, constrained by
the energy capacity of batteries. One well-known method to reduce
energy consumption in such networks is data aggregation. Providing
efcient data aggregation while preserving data privacy is a challenging
problem in wireless sensor networks research. In this paper,
we present privacy-preserving data aggregation scheme for additive
aggregation functions. The Cluster-based Private Data Aggregation
(CPDA)leverages clustering protocol and algebraic properties of
polynomials. It has the advantage of incurring less communication
overhead. The goal of our work is to bridge the gap between
collaborative data collection by wireless sensor networks and data
privacy. We present simulation results of our schemes and compare
their performance to a typical data aggregation scheme TAG, where
no data privacy protection is provided. Results show the efficacy and
efficiency of our schemes.
Abstract: The construction of original functional sample of the portable device for fast analysis of energetic materials has been described in the paper. The portable device consisting of two parts – an original miniaturized microcolumn liquid chromatograph and a unique chemiluminescence detector – has been proposed and realized. In a very short time, this portable device is capable of identifying selectively most of military nitramine- and nitroesterbased explosives as well as inorganic nitrates occurring in trace concentrations in water or in soil. The total time required for the identification of extracts is shorter than 8 minutes.
Abstract: Unmanned aerial vehicles (UAVs) performing their
operations for a long time have been attracting much attention in
military and civil aviation industries for the past decade. The
applicable field of UAV is changing from the military purpose only to
the civil one. Because of their low operation cost, high reliability and
the necessity of various application areas, numerous development
programs have been initiated around the world. To obtain the optimal
solutions of the design variable (i.e., sectional airfoil profile, wing
taper ratio and sweep) for high performance of UAVs, both the lift and
lift-to-drag ratio are maximized whereas the pitching moment should
be minimized, simultaneously. It is found that the lift force and
lift-to-drag ratio are linearly dependent and a unique and dominant
solution are existed. However, a trade-off phenomenon is observed
between the lift-to-drag ratio and pitching moment. As the result of
optimization, sixty-five (65) non-dominated Pareto individuals at the
cutting edge of design spaces that are decided by airfoil shapes can be
obtained.
Abstract: This research proposes the state of art on how to control or find the trajectory paths of the RRP robot when the prismatic joint is malfunction. According to this situation, the minimum energy of the dynamic optimization is applied. The RRP robot or similar systems have been used in many areas such as fire fighter truck, laboratory equipment and military truck for example a rocket launcher. In order to keep on task that assigned, the trajectory paths must be computed. Here, the open loop control is applied and the result of an example show the reasonable solution which can be applied to the controllable system.
Abstract: As the information age matures, major social
infrastructures such as communication, finance, military and energy,
have become ever more dependent on information communication
systems. And since these infrastructures are connected to the Internet,
electronic intrusions such as hacking and viruses have become a new
security threat. Especially, disturbance or neutralization of a major
social infrastructure can result in extensive material damage and social
disorder. To address this issue, many nations around the world are
researching and developing various techniques and information
security policies as a government-wide effort to protect their
infrastructures from newly emerging threats. This paper proposes an
evaluation method for information security levels of CIIP (Critical
Information Infrastructure Protection), which can enhance the security
level of critical information infrastructure by checking the current
security status and establish security measures accordingly to protect
infrastructures effectively.
Abstract: Kazakhstan attaches the great importance to
cooperation with European countries within the framework of
multilateral security organizations such as NATO. Cooperation of
Kazakhstan with the NATO is a prominent aspect of strengthening of
regional security of republic. It covers a wide spectrum of areas, such
as reform of sector of defense and security, military operative
compatibility of armed forces of NATO member-countries and
Kazakhstan, civil emergency planning and scientific cooperation. The
cooperation between Kazakhstan and NATO is based on the mutual
interests of neighboring republics in the region so that the existing
forms of cooperation between Kazakhstan and NATO will not be
negatively perceived both in Asia as well as among CIS countries.
Kazakhstan tailors its participation in the PfP programme through an
annual Individual Partnership Programme, selecting those activities
that will help achieve the goals it has set in the IPAP. Level of
cooperation within the limits of PfP essentially differs on each
republic. Cooperation with Kazakhstan progressed most of all since
has been signed IPAP from the NATO
Abstract: Wireless sensor networks (WSN) consists of many
sensor nodes that are placed on unattended environments such as
military sites in order to collect important information.
Implementing a secure protocol that can prevent forwarding forged
data and modifying content of aggregated data and has low delay
and overhead of communication, computing and storage is very
important. This paper presents a new protocol for concealed data
aggregation (CDA). In this protocol, the network is divided to
virtual cells, nodes within each cell produce a shared key to send
and receive of concealed data with each other. Considering to data
aggregation in each cell is locally and implementing a secure
authentication mechanism, data aggregation delay is very low and
producing false data in the network by malicious nodes is not
possible. To evaluate the performance of our proposed protocol, we
have presented computational models that show the performance
and low overhead in our protocol.
Abstract: Reliable secure multicast communication in mobile
adhoc networks is challenging due to its inherent characteristics of
infrastructure-less architecture with lack of central authority, high
packet loss rates and limited resources such as bandwidth, time and
power. Many emerging commercial and military applications require
secure multicast communication in adhoc environments. Hence key
management is the fundamental challenge in achieving reliable
secure communication using multicast key distribution for mobile
adhoc networks. Thus in designing a reliable multicast key
distribution scheme, reliability and congestion control over
throughput are essential components. This paper proposes and
evaluates the performance of an enhanced optimized multicast cluster
tree algorithm with destination sequenced distance vector routing
protocol to provide reliable multicast key distribution. Simulation
results in NS2 accurately predict the performance of proposed
scheme in terms of key delivery ratio and packet loss rate under
varying network conditions. This proposed scheme achieves
reliability, while exhibiting low packet loss rate with high key
delivery ratio compared with the existing scheme.
Abstract: In the article there have been revealed the properties
of designing the research teaching the military masters and in the context it has been offered the program of mastering by the masters
military men the methodology of research work, in the course of practical teaching activity there has been considered the developed
and approbated model of organization of the process of mastering by the masters the methodology of research work. As a whole, the research direction of master preparation leaves its
sign to the content of education, forms of organization of educational
process, scientific work of masters. In this connection the offered in
the article properties of organization of research teaching and a model
of organization of mastering by the masters military men the methodology of research work can be taken into account when
designing the content of master preparation.
Abstract: The Norwegian Military Academy (Army) has been
using a tactical simulator for the last two years. During this time
there has been some discussion concerning how to use the simulator
most efficiently and what type of learning one achieves by using the
simulator. The problem that is addressed in this paper is how
simulators can be used as a learning resource for students concerned
with developing their military profession. The aim of this article is to
create a wider consciousness regarding the use of a simulator while
educating officers in a military profession. The article discusses the
use of simulators from two different perspectives. The first
perspective deals with using the simulator as a computer game, and
the second perspective looks at the simulator as a socio-cultural
artefact. Furthermore the article discusses four different ways the
simulator can be looked upon as a useful learning resource when
educating students of a military profession.
Abstract: Embedding and extraction of a secret information as
well as the restoration of the original un-watermarked image is
highly desirable in sensitive applications like military, medical, and
law enforcement imaging. This paper presents a novel reversible
data-hiding method for digital images using integer to integer
wavelet transform and companding technique which can embed and
recover the secret information as well as can restore the image to its
pristine state. The novel method takes advantage of block based
watermarking and iterative optimization of threshold for companding
which avoids histogram pre and post-processing. Consequently, it
reduces the associated overhead usually required in most of the
reversible watermarking techniques. As a result, it keeps the
distortion small between the marked and the original images.
Experimental results show that the proposed method outperforms the
existing reversible data hiding schemes reported in the literature.
Abstract: The development of biomimetic micro-aerial-vehicles
(MAVs) with flapping wings is the future trend in military/domestic
field. The successful flight of MAVs is strongly related to the
understanding of unsteady aerodynamic performance of low Reynolds
number airfoils under dynamic flapping motion. This study explored
the effects of flapping frequency, stroke amplitude, and the inclined
angle of stroke plane on lift force and thrust force of a bio-inspiration
corrugated airfoil with 33 full factorial design of experiment and
ANOVA analysis. Unsteady vorticity flows over a corrugated thin
airfoil executing flapping motion are computed with time-dependent
two-dimensional laminar incompressible Reynolds-averaged
Navier-Stokes equations with the conformal hybrid mesh. The tested
freestream Reynolds number based on the chord length of airfoil as
characteristic length is fixed of 103. The dynamic mesh technique is
applied to model the flapping motion of a corrugated airfoil. Instant
vorticity contours over a complete flapping cycle clearly reveals the
flow mechanisms for lift force generation are dynamic stall, rotational
circulation, and wake capture. The thrust force is produced as the
leading edge vortex shedding from the trailing edge of airfoil to form a
reverse von Karman vortex. Results also indicated that the inclined
angle is the most significant factor on both the lift force and thrust
force. There are strong interactions between tested factors which mean
an optimization study on parameters should be conducted in further
runs.
Abstract: It-s known that incorporating prior knowledge into support
vector regression (SVR) can help to improve the approximation
performance. Most of researches are concerned with the incorporation
of knowledge in form of numerical relationships. Little work,
however, has been done to incorporate the prior knowledge on the
structural relationships among the variables (referred as to Structural
Prior Knowledge, SPK). This paper explores the incorporation of SPK
in SVR by constructing appropriate admissible support vector kernel
(SV kernel) based on the properties of reproducing kernel (R.K).
Three-levels specifications of SPK are studies with the corresponding
sub-levels of prior knowledge that can be considered for the method.
These include Hierarchical SPK (HSPK), Interactional SPK (ISPK)
consisting of independence, global and local interaction, Functional
SPK (FSPK) composed of exterior-FSPK and interior-FSPK. A
convenient tool for describing the SPK, namely Description Matrix
of SPK is introduced. Subsequently, a new SVR, namely Motivated
Support Vector Regression (MSVR) whose structure is motivated
in part by SPK, is proposed. Synthetic examples show that it is
possible to incorporate a wide variety of SPK and helpful to improve
the approximation performance in complex cases. The benefits of
MSVR are finally shown on a real-life military application, Air-toground
battle simulation, which shows great potential for MSVR to
the complex military applications.