Defense and Security Studies

Journal Information
EISSN : 2744-1741
Published by: Research and Development Academy (10.37868)
Total articles ≅ 14
Filter:

Latest articles in this journal

Majidul Bhuiyan
Published: 13 September 2022
Defense and Security Studies, Volume 3, pp 58-66; https://doi.org/10.37868/dss.v3.id184

Abstract:
Airpower played a vital role in shaping the result of the Second World War. As a British colony, the Indian Sub-continent was targeted by Imperial Japan. The Japanese Forces came up to Myanmar (the then Burma) and their next target was the Indian sub-continent. Due to the geographical location Bangladesh (the then Bengal) was on the front line of British defense; as it was strategically important for Japan to occupy Bangladesh. As such, Bangladesh air space was highly contended by the belligerents. To support air operations, a good number of airfields were prepared by the British-led forces in the then Bengal. However, after the war, most of those airfields were abandoned. British left the region in 1947 and Bengal became part of Pakistan. Economic, strategic, and political factors did not permit the maintenance of those airfields and most were left as it was. Only Tejgaon airfield was used by Pakistanis for both civil and military aviation purposes. After the independence of Bangladesh in 1971, an effort was made to revive some of those airfields.
Elmedina Avdibasic, Amanzholova Saule Toksanovna,
Published: 23 August 2022
Defense and Security Studies, Volume 3, pp 32-49; https://doi.org/10.37868/dss.v3.id188

Abstract:
Cybersecurity is an important topic for Industry 4.0, which will face a lot of non-traditional challenges before it can be fully implemented to help society. The objective of the study is to recognize recent cybersecurity trends, newly occurring threats and challenges as well as their potential solutions. The articles reviewed in the paper are found through science direct, Scopus, Semantic scholar and google scholar. After reviewing them, ideas from articles were grouped together to show how different articles had similar thoughts. Through the analysis of 70 articles, it was found that cybersecurity still needs a lot of improvement in order to efficiently implement Industrial Internet of Things (IIoT), especially since many articles underline the need for security-by-design approach, followed by regular updating. Key challenges are lack of awareness and security experts, increased cybercriminal and the fact that the chain is as only as strong as its weakest point. Some of the most important solutions include incorporating security into design, stronger encryption, regular updates to patch vulnerabilities and good prevention and detection mechanisms. Once cybersecurity challenges are overcome, Industry 4.0 will be able to bloom to its full extent.
Hamza Bećirspahić, Haris Basarić, Tarik Namas,
Defense and Security Studies, Volume 3, pp 22-31; https://doi.org/10.37868/dss.v3.id187

Abstract:
This paper presents the design and the development of an EOD robot, with MVP characteristics. The design is based on a solid base structure with an arm manipulator attached to the base. The overall dimensions of the robot are 590x860x340 mm and it weighs 55kg. The robot is capable of towing heavy objects as well as lifting sensitive objects. The robot has a maximum horizontal reach of 1400 mm and a vertical reach of 1200 mm. The robot is tested according to guidelines developed in the U.S.A., as much as the conditions allowed. Briefly, the results can be summarized as follows: the setup time for the robot is 10 minutes, it can reach speeds up to 8 km/h, it has a towing capacity of 40kg and the maximum communication reach is 20 meters. Among successful tests, the weaknesses were also found which act as a guide for future designs and developments. These weaknesses are what MVP concepts are actually developed for.
Erol Terovic, Sehabeddin Taha Imeci
Defense and Security Studies, Volume 3, pp 15-21; https://doi.org/10.37868/dss.v3.id185

Abstract:
This research paper highlights the process of designing and simulating a novel antenna. Our antenna is meant to be used in 5G applications (sub-6 Ghz). Simulating and designing was done using the Sonnet Suites software. The substrate used in our antenna is 1.55mm thick FR-4 substrate, that has a εr of 4.4. The antenna center frequency is 4.06 GHz. At the center frequency, S11 is -39.46 dB. Furthermore, the antenna has an E- of 5.75 dB, and E- of -9.99 dB. This antenna can be used in devices that use 5G technologies. This antenna has the benefit of being cheap to produce, while boasting good performance during operationThis research paper highlights the process of designing and simulating a novel antenna. Our antenna is meant to be used in 5G applications (sub-6 Ghz). Simulating and designing was done using the Sonnet Suites software. The substrate used in our antenna is 1.55mm thick FR-4 substrate, that has a εr of 4.4. The antenna center frequency is 4.06 GHz. At the center frequency, S11 is -39.46 dB. Furthermore, the antenna has an E- of 5.75 dB, and E- of -9.99 dB. This antenna can be used in devices that use 5G technologies. This antenna has the benefit of being cheap to produce, while boasting good performance during operation.
Minel Salkičević
Published: 19 January 2022
Defense and Security Studies, Volume 3, pp 1-14; https://doi.org/10.37868/dss.v3.id183

Abstract:
Explosively formed projectile (EFP) is a self-forging shape charged structure having very high penetration ability compared to conventional kinetic energy projectile. The penetration capability of an EFP is strongly dependent on various design parameters. The main parameters can be roughly divided into geometric and material parameters used in the warhead configuration. The present research is an effort to study the effect of metal casing thickness, type of metal used for casing, explosive type, liner thickness, type and configuration on the formation of EFP. Effectivness of an EFP is studied in terms of final velocity and shape of formed penetrator. The study is carried out by performing a number of simulations by using explicit finite element (FE) hydrocode ANSYS/Autodyn.
Ajdin Jašarević, Marko Hočevar, Gašper Rak
Published: 17 October 2021
Defense and Security Studies, Volume 2, pp 96-111; https://doi.org/10.37868/dss.v2.id175

Abstract:
This paper describes the process of 3D analysis of two water currents with method of photogrammetry. Photogrammetry is used in fields such as architecture, engineering, police investigation, preserving cultural heritage, military and geology. This method can be used in military to reconstruct a site with traces of shrapnel or various projectiles. In our case we tried to measure height of turbulent flow, where two currents collided at the angle of 90°. In first section we introduce our problem and method. Second section describes method of photogrammetry and basics of torrential flows. In third section we describe our experiment. Fourth section describes the course of getting 3D model. In fifth section we analyze results and in sixth section, a conclusion is given.
Kerim Krnjic
Published: 12 October 2021
Defense and Security Studies, Volume 2, pp 86-95; https://doi.org/10.37868/dss.v2.id173

Abstract:
In the last twenty years, high energetic materials have changed significantly. Several factors have influenced the development of these materials, which include new operational requirements such as insensitive ammunition (IM), as well as factors in the availability of new materials and new production techniques, safety assessment, and modeling. All this enables more efficient use of materials and a more detailed understanding of the processes involved in the application of new technologies. This work presents new insensitive secondary high explosives such as TATB, FOX-7, GUDN, NTO, and others that are in different stages of development. A review of these explosives is given and their stability, reliability, and specific application are described. Energy materials are known to be chemical compounds or mixtures that contain significant amounts of energy and it has been shown that successful design of new energetic materials with customized performance properties and increased stability is possible. The properties of new insensitive energetic materials must be further researched and improved before they can be used in new or existing systems. Insensitive ammunition testing is a vital component of many national IM programs. The international community has established requirements for testing the insensitivity of materials and developed six unique tests based on testing the response of the material to the effects of heat, impact, or shock.
Tarik Sabanovic
Published: 15 September 2021
Defense and Security Studies, Volume 2, pp 79-85; https://doi.org/10.37868/dss.v2.id172

Abstract:
This paper describes the computer dynamics of fluids, which was used to determine the influence of certain geometrical characteristics of the projectile on the coefficient of drag force. The first section is an introduction and describes the projectile, the aerodynamic forces acting on the projectile with special reference to drag. The second section was reserved for a review of projectile parameters that affect drag, primarily the slenderness of the ogive and the frustum, and the shape of the ogive, and the angle of the frustum. This section also defines drag in more detail. The third section describes the mathematical model of fluid in supersonic flow and gives the equations for the mathematical model, used in simulations and software package Ansys fluent. This section was also reserved for describing the emergence of a physical model and the verification of the numerical simulation model. The fourth section presents and describes the model of CFD analysis of 5.56 mm projectiles: SS109, M855, L110, and M856, and the comparison of projectiles by geometry. The fifth section comprises the analysis of the results. In the sixth section, a conclusion is given.
Nedim Tabaković,
Published: 23 August 2021
Defense and Security Studies, Volume 2, pp 63-78; https://doi.org/10.37868/dss.v2.id170

Abstract:
The aim of this article is to address key features and the wave of new technologies that Industry 4.0 brings to Aerospace and Defense Systems. This research paper enthusiastically depicts what the future of the Aerospace and Defense industry could be while also providing information about those braves enough to already step into the world of all around digitalization. With this approach, the aim is to interconnect every step of the operation towards creating a mostly perfect environment which cuts off any human mistake and guarantees increase in revenue stream and customer satisfaction. The main method of implementation of Industry 4.0 to many industries is digitalization. Digitalization is the digital upgrade to any company or industry which, when applied correctly, guarantees nothing but success in revenue streams and customer service. This process is a complex blend of many modern technologies and implementing such a hefty upgrade might be problematic to those who have been surviving on very old business models for tens of years. Industry 4.0 is a fast-changing environment and those who are quickly adapting to this wave of change are setting themselves for success. The primary goal of this research paper is to provide an insight into the world of technology Industry 4.0 offers and how that technology could help Aerospace and Defense create a portal to the future.
Roman Kmeť
Defense and Security Studies, Volume 2, pp 53-62; https://doi.org/10.37868/dss.v2.id168

Abstract:
Crime mapping information systems are currently a commonly used tool by public authorities, primarily for the police, security forces and services, local and regional government, as well as for the inhabitants of a certain territory. The main idea of ​​creating these systems is to monitor and evaluate the current security situation, which is significantly affected by the active or passive activities of the police or other entities dealing with security issues. An important part is also the knowledge of the security situation on the part of the population, in which a certain state of security can evoke a feeling of security and vice versa.
Back to Top Top