We kindly inform you that, as long as the subject affiliation of our 300.000+ articles is in progress, you might get unsufficient or no results on your third level or second level search. In this case, please broaden your search criteria.
The second part of the paper presents those excerpts from the second volume of N.J. Gerlach and Ch.G. Fischer Itinerarium, which describe people, places andevents related to the teaching of medicine and natural history in Amsterdam,Haarlem and Utrecht.
More...
For the Republic of Moldova, often ranked as the poorest country in Europe, the last two years were both the worst and best years. Against the backdrop of Russia’s brutal and inhumane war against Ukraine, the Republic of Moldova faces challenges at numerous levels, ranging from a fragile economy to having foreign military forces illegally stationed on its territory. Furthermore, having not one, but two separatist regions on its land, both controlled, de facto, by the Russian Federation, adds considerable pressure on the current pro-European government. The Russian Federation employs a wide range of hybrid instruments to intervene in the Republic of Moldova’s internal affairs. Having witnessed Russia’s aggressive actions in Ukraine, but not only, the international community is now paying considerably more attention to the Republic of Moldova. One self-explanatory reason would be that the Republic of Moldova hosted the European Political Community Summit, the largest and most important international event in its history. Consequently, the goal of this article is to highlight that the Republic of Moldova can only secure prospects for development, stability, and democracy through broader integration into the European community.
More...
Capability-Based Planning (CBP) and Program Budgeting (PB) are powerful tools that contribute to the sustainability and utility of defense forces. CBP prioritizes and allocates resources based on desired capabilities to achieve strategic objectives, ensuring adaptability and responsiveness to potential threats. PB allocates resources based on specific programs, focusing on results and aligning funding with outputs and outcomes. This article explores how the simultaneous application of CBP and PB can enhance the efficiency and effectiveness of defense resource management. CBP enables the development of a comprehensive force structure plan, while PB facilitates informed resource allocation and optimization over a medium-term period. The alignment between required capabilities produced outputs, and desired outcomes outlined by national defense objectives is crucial. By adopting these approaches, defense organizations can strategically allocate resources, prioritize high-priority programs, and produce desired military capabilities. This results in improved transparency, accountability, and performance measurement, ultimately enhancing the sustainability and utility of defense forces. The adoption of CBP and PB fosters a more effective and efficient defense resource management process, enabling defense forces to effectively respond to evolving security challenges.
More...
In order to be able to identify technological trends in the field of defense and security, different scenarios are carried out, analyses over certain time horizons, in-depth analyses of ongoing research, but also estimates that are based on the opinions of experts in the field. In this endeavor, I had as the objective of the scientific research is to obtain an overview of the trends of emerging and disruptive technologies relevant in the fields of defense and security, considering the current regional context. The effort was focused on the assessment of emerging and disruptive technologies, based on research and analysis of recent available literature in the field. I have come up with clarifications on defining the emerging, disruptive technologies and their convergence, the trends in the context of hybrid warfare, as well as the most promising and relevant technologies that can be applied on a large scale and are going to influence the fields of defense and security.
More...
Learning curves are a core analytical method employed by cost analysts to estimate weapon system production costs. This study examines United States Air Force aircraft programs and compares the traditional (e.g., Unit Theory) learning curve model to a production rate learning curve model. While there are some previous studies examining production rate models, one novelty of this research is the size of the dataset, which comprises the largest military examination to date. The results suggest the production rate model outperforms the traditional learning curve model. Additionally, the analysis identifies the post-Initial Operational Capability (IOC) time period as the preferred milestone in the life cycle to employ the production rate model.
More...
The research is dedicated to “Strategic Communication” and its elements. Either core element of strategic communication is enlightened through the study of literature. As a showcase, the Second Karabakh War between Azerbaijan and Armenia is reviewed and studied. The outcomes achieved in the conclusion of the research prove the essence and importance of strategic communication in victory.
More...
Words are one of the simplest and most readily available instruments for influencing and educating the masses. Good communication always maximizes the likelihood of effectively attaining organizational objectives by creating understanding and support of the relevant audiences. However, communication effectiveness cannot be achieved unless clear objectives and appropriate KPIs are established. In this paper, we shall try to discuss similarities and differences between propaganda and StratCom, as well as the importance of using the appropriate key performance indicators (KPIs) for a successful communication process.
More...
The aim of this paper is to explore the intricate relationship between sustainable economic development and economic resilience. It highlights how measures to stimulate economic growth, such as investments in physical and human capital, innovation, entrepreneurship, and sound fiscal policies, can also bolster resilience, while recognizing the potential conflicts between short-term growth and long-term resilience goals, especially in the context of increasing debt. The paper also proposes several mitigation strategies offering a roadmap for governments to strike a balance between fostering economic expansion and ensuring readiness to face unforeseen challenges, with the flexibility to adapt to unique economic contexts.
More...
In today’s dynamic and complex military landscape, the effectiveness of military engineering training plays a crucial role in preparing personnel for various operational scenarios. However, the lack of a structured and validated model for designing and justifying the didactic aspects of such training hinders its efficiency and outcomes. This article seeks to bridge this gap by providing a systematic approach to designing military engineering training programs. The aim of the article is to identify the main components required to develop a comprehensive Model of Didactic Justification for the Design of Military Engineering Training, addressing the challenge of optimizing the instructional framework in military engineering education. The model of didactic justification of the design of military engineering training is a conceptual framework that aims to provide a structured approach to designing and implementing effective training programs for military engineers. The model takes into account various factors that influence the design of military engineering training, including the specific needs of the military organization, the objectives of the training, and the characteristics of the learners.
More...
The importance of ensuring the security of Internet of Things (IoT) devices is just as crucial as accelerating the implementation process of IoT. Like other devices, IoT devices can be vulnerable to various types of attacks over the internet. To identify these attacks, attention should be paid to the system itself and the activity sequence of certain resources. This article discusses various types of security solutions for IoT devices. Additionally, a new solution is proposed to identify the potential impact of IoT devices. The experiments conducted using a Mikrotik router as a gateway have shown that it is possible to detect cyber attacks by monitoring the device's internal resources for various activities. Login attempts using different usernames were recorded in the router's logs and the processor's jump activity was monitored to identify metrics indicating potential attacks based on increased sequential jumps. An algorithm was developed using these metrics, and a program was written in Python to detect cyber attack threats against the device.
More...
The paper deals with the problem of securing a guaranteed victory for our side in the course of military operations when the dynamic power of the enemy is known. The problem of the set of weapons for a guaranteed victory is solved. A method is given for calculating the set of weapons and equipment that guarantees victory without regard to information on the set of weapons and equipment of the opposing side for any set. The method of composing and solving matrix games in game theory is used. The problem is modeled as a matrix game with mixed strategies, and the existence of its solution (saddle point) is shown in this setting. To obtain a numerical solution to the problem, the matrix game is reduced to the linear programming problem.
More...
This article discusses the evolving nature of modern warfare, emphasizing the shift towards, autonomous weapons and artificial intelligence-driven military operations. İt underscores the importance of high-tech combat vehicles, the need for constant improvements in military capabilities, and the role of well-trained units in achieving victory such as the Second Karabakh War and the Russian-Ukraine War. The article particularly focuses on the secure transportation of military personnel in war zones and the challenges associated with it. It highlights the use of unmanned aerial vehicles (UAVs) for constant observation, reconnaissance, and directing artillery missiles to enhance the safety of personnel during transport. The main research objective is to solve mathematically the problem of directing unguided rockets to destroy enemy vehicles in motion. The article presents a mathematical model for this purpose, taking into account various factors such as coordinates, speed, and trajectory of enemy vehicles. It also discusses the practical applications of this model in military scenarios. İn conclusion, the article emphasizes the significance of technological advancements, especially in the use of UAVs and guided artillery projectiles, in modern warfare. İt offers a mathematical approach to targeting moving enemy vehicles, contributing to the development of military tactics and strategies.
More...
In the article, a mathematical modeling method is applied to solving the combat activities of cumulative, thermobaric, and fragmentation missiles used by a group of unmanned aerial vehicles against tanks (armored combat vehicles), air defense equipment, infantry group, and long-term firing point targets under favorable and unfavorable conditions. The results show the possible to determine the minimum and maximum number of destroyed targets. These results can be used in the optimal management of the combat activities of a group of unmanned aerial vehicles of the same type.
More...
Societal security has become nowadays an important pair of lenses for discussing identity in a multilayered fashion within the context of an enlarged security concept. The complexity deriving from that engenders the necessity to identify and use new tools for reliably defining communities and their specific identities in order to better understand how state-wise strategies and policies can raise security risks when disregarding those communities’ needs and interests. In this respect, the goal of this article is to demonstrate the benefits of employing a gender-based perspective in defining societal security. Hence, it focuses on the possible correlations that can be conceptually identified between societal security and gender perspective. Then, the article exemplifies how a gender-based analysis can contribute to better societal security approaches by discussing Romania’s strategic approach to the Covid-19 pandemic and the possible observations deriving from that.
More...
The research paper outlines one of the major problems facing scholarly communications these days – counting citations of authors' research results (trough articles, monographs, papers, dissertations, projects) and the impact of their publications on national and international level. The author focuses at the leading goal of publishers, researchers and academic institutions – to obtain and increase the journals’ Impact Factor as “a sign of quality” of their intellectual products and analyses the difficulties faced by Bulgarian scientist to publish in Bulgarian Journals with Impact Factor (IF) based on a detailed information survey. The results of the study show that only 64% of Bulgarian journals with IF, identified in citation-based research analytics tool InCites Journal Citation Reports Journal at Web of Science platform can be clearly identified as “Bulgarian journals”. And this provoked the following research question: “Which journals could be classified as “Bulgarian” and why the other 36% of Bulgarian journals with Impact Factor have problems with their national affiliation recognition? The article is a result of the project “Design and Development of a Prototype of the Information System “Citation Index of Publications by Bulgarian Authors (Social Sciences), which reflects the current status of the issue of citation tracking of Bulgarian authors in Bulgarian scientific literature as well the lack of such tool on national level for evaluation and analysis of publications based on scientometrics indicators.
More...