Call for papers for issue 1-2017
Journal Title: Vojnotehnički glasnik - Year 2017, Vol 65, Issue 1
Abstract
The instructions to authors about the article preparation for publication in the Military Technical Courier are based on the Act on scientific journal editing of the Ministry of Science and Technological Development of the Republic of Serbia, No 110-00-17/2009-01 of 9th July 2009. This Act aims at improving the quality of national journals and raising the level of their compliance with the international system of scientific information exchange. It is based on international standards ISO 4, ISO 8, ISO 18, ISO 215, ISO 214, ISO 18, ISO 690, ISO 690-2, ISO 999 and ISO 5122 and their national equivalent.
Authors and Affiliations
Nebojša Gaćeša
Transfer of heat and speed of plasma particles to powder particles in the plasma spray process at atmospheric pressure
For successful powder deposition and a good quality of deposited layers, the following factors are of great importance: uniform powder injection into the plasma jet, transfer of heat and velocity of plasma particles (ion...
Modern weapons and military equipment for issue 1-2019
Russia's MiG-31: A powerful interceptor Mach 3. Current state of the German navy. New plane: an unconscious hunter bombarder of the former SFRY.
Twenty-four position tilt test for accelerometer cross-axial sensitivity compensation
Cross-axial or transverse sensitivity of an accelerometer can be compensated by digital processing of the output signal. To perform this, it is necessary to determine coefficients that describe a sensor's response to exc...
Types of information warfare and examples of malicious programs of information warfare
The possibilities of the information management system are unimaginable. 'Information warfare' (IW), defined as a targeted effort to undermine and neutralize hostile command and control systems for the purpose of protect...
Vulnerability assessment and penetration testing in the military and IHL context
Vulnerability assessment and penetration testing are the key activities of information security risk management and cyber defense and intelligence done by military organizations. These activities are significant not only...