- European and Russian Geopolitical Military Strategies
- Economic and Business Development Strategies
- Multi-Criteria Decision Making
- Global Security and Public Health
- Peacebuilding and International Security
- Regional Development and Management Studies
- Sustainable Agricultural Systems Analysis
- Robotic Path Planning Algorithms
- Advanced Manufacturing and Logistics Optimization
- Military Defense Systems Analysis
- Educational Challenges and Innovations
- European Politics and Security
- Wildlife Conservation and Criminology Analyses
- Nuclear Issues and Defense
- Economic and Technological Systems Analysis
- EU Law and Policy Analysis
- Education and Military Integration
- Aerospace Engineering and Control Systems
- Military History and Strategy
- Cybersecurity and Information Systems
- International Law and Human Rights
- Security, Politics, and Digital Transformation
- Military Strategy and Technology
- Emotional Intelligence and Performance
- Economic Sanctions and International Relations
University of Defence
2015-2024
Univerzitet Union Nikola Tesla
2019
Center for Strategic Research
2019
This paper presents the modification of AHP method, which takes into account degree suspense decision maker, that is it allows with a certain conviction (which usually less than 100%), defines linguistic expression corresponds to optimality criteria comparison. To determine weights and alternative values, fuzzy numbers are used since they very suitable for vagueness uncertainty. In this way, after applying we obtained values criterion functions each examined alternatives, value determined by...
The military decision-making process is a proven analytical for designing operations, troops’ movements, logistics or air defense planning. hybrid FAHP-MABAC model tested obtaining/selecting the results an optimal firing position of guided anti-tank missile battery (GAMB).This study provides multi-criteria (MCDM) so that confidence interval fuzzy numbers describes comparison in pairs whose degree not determined before comparison. By using mathematical expressions brought into direct...
Introduction/purpose: Destabilization of critical resources (CRs) or infrastructure (CI) important for the stability state can be dangerous society, economy, and especially national security. Disruption one CI object its parts often affects causes disruption other dependent CI, because modern society has become a "networked society". The paper proposes model quantifying defining interdependence between different CIs their priorities, based on statements experts. Methods 9 : proposed methods...
The development of an officer's career is a very complex process and determined by numerous factors. main goal the paper to examine influence three groups determinants on officers Serbian Armed Forces (SAF). survey was conducted sample 219 respondents in 2016 using descriptive factor analysis (Principal Component Analysis). Descriptive performed determinants, namely: 1) normative-legal assumptions; 2) various subjects human resources management 3) planning, selection, training, training...
At a time when traditionally neutral countries in international relations, such as Finland and Sweden, decide to abandon this concept, it is necessary reconsider the policy of neutrality European countries, well costs investment defence system. Analysing case Switzerland, Austria Republic Serbia, authors start from concept monitor their Switzerland first country whose permanent internationally recognized considered model legal status neutrality. Austrian much younger result specific...
Basically, every type of government organization defines the defence system with functions that provide deterrence from threats, as well countering various types and forms threats to main social values. The subject this paper is national security strategy, i.e. challenges, risks are essential for fulfilment highest state interests. author has analysed categories theory: "danger", "challenge", "risk" "threat". On basis definition comparative analysis these categories, presented in different...
1. Barton B., Redgwell K., Rinne K. & Zilman N. D. (2004) Energy Security: Managing Risk in a Dynamic Legal and Regulatory Environment. Oxford University Press. doi: 10.1093/acprof:oso/9780199271610.001.0001 Google Scholar
Purpose. The aim of this study was to examine the usefulness and accuracy Data Mining techniques on example testing presence impact evaluation quality land level income agricultural holdings basis test samples. Methodology. analysis conducted a random sample for identifying key factors in research holdings, data set 179 examples, where input consists various variables: factor erosivity, power land, reducing pH value, organic matter, then target discrete variables with two descriptive values:...
Razvoj karijere oficira je veoma složen proces i determinisan brojnim činiocima. Osnovni problem ovog istraživanja bio kakav uticaj imaju pojedine determinante na razvoja oficira, kao što su: normativno-pravne pretpostavke; različiti subjekti upravljanja ljudskim resursima planiranje, selekcija, školovanje, usavršavanje raspoređivanje oficira. Takođe istraženo kakvi su efekti pravilnog da li postoje razlike u proceni uticaja pojedinih determinanti razvoj Shodno tome, osnovni cilj se ispita...
It is necessary for the design of organizational structure cybersecurity systems or information security to meet basic corporate goals and objectives.Thus, although cyber only an element security, it its most important part.For that reason, essential be constantly perfected.The analysis strengths, weaknesses, opportunities threats (SWOT) a method formulate strategy.The SWOT successfully provides key factors problem.In recent years, multiple criteria decision making (MCDM) has removed some...
U ovom radu se analizira razvoj u domenu zajedničke spoljne i bezbednosne politike Evropske unije, odnosno od Evropskog saveta održanog decembra 2013. godine, kada je formalno započet proces revizije spoljnopolitičkog bezbednosnog okvira EU, pa sve do kraja 2018. godine.
It is necessary for the design of organisational structure cybersecurity systems or information security to meet basic goals organization.Thus, although only an element security, it its most important part.For that reason, essential be constantly perfected.The analysis strengths, weaknesses, opportunities, and threats (SWOT) one methods which can use create strategy securing cyberspace.The idea SWOT enable development behavior organization by finding key factors problem.The multiple criteria...
The altered setting of current conflicts, its hybridity and nonlinearity affect the justification assumption that operations in several domains will become a new method conducting Russian Armed Forces. Forces battle groups are practice known as battalion tactical (BTG). They have arisen response to problems regarding deployment units local small wars, within general transformation Forces, based on geopolitical strategic circumstances. basis BTG consists from active brigades which established...