<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Functional Requirements for Decision Support System of Ground Forces Recognition on Battlefield According to NATO Standards</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Volodymyr Korolov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olha Korolova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan-Pavlo Milkovych</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yaroslav Zaiets</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viacheslav</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Zhyvchuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Halyna Batyshcheva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Lytvyn</string-name>
          <email>vasyl.v.lytvyn@lpnu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Myroslava Bublyk</string-name>
          <email>my.bublyk@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Hetman Petro Sahaidachnyi National Army Academy</institution>
          ,
          <addr-line>32 Heroes of Maidan street, Lviv, 79026</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Information system, battlefield, NATO-standard, Decision Support System</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Bandera street, Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>The problem of recognizing combat units of the ground forces is interdisciplinary. Today, this combines both the need to take into account the physical properties of the devices used for combat identification, and the rapidly growing amount of information generated for its implementation. The urgency of the research is due to the long-term aggravation of the military-political situation on the territory of Ukraine. One of the solutions to this problem is the formation of a military coalition, which is relevant to the development of a system to support effective decision-making for the rapid identification of coalition troops on the battlefield according to NATO standards. In addition to increasing combat effectiveness in the management of coalition forces, the key task was to minimize the occurrence of combat units under "friendly fire" on the battlefield according to NATO standards. The proposed functional requirements for the decision support system (DSS) provide prompt access to information and include in accordance with NATO standards: 1) the appointment of DSS; 2) regulatory documents of DSS; 3) terminology, symbols and abbreviations used in DSS; 4) methods and requirements for identification; 5) forms of security surveys; 6) standard methods, devices and identification procedures; 7) information database on samples of equipment, weapons, uniforms of coalition troops. The proposed open structure of the system allows you to exclude old tasks and introduce new ones, update and expand its information arrays. Functional requirements for DSS hardware and software are also proposed.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In modern conditions of limited time and lack of situational awareness during hostilities, the
possibility of falling under the fire of their firearms, called "Friendly Fire", increases, according to the
authors [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7">1-7</xref>
        ] due to the unpredictability of the situation, rapid raids, opening fire from long distances
on "closed targets". According to military experts [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref5 ref6 ref7">1-3, 5-7</xref>
        ], one of the main reasons for this is the
"error of identification", when the fire is deliberate and aimed at their people, who were mistaken for
the enemy. During the war, such mistakes were caused by a lack of reliable information or erroneous
orders from headquarters. It is most typical of mobile combat operations conducted by coalition forces.
Here, commanders simply do not have enough time to make a decision due to the rapid change in the
combat situation, a large number of fire contacts, and so on.
      </p>
      <p>Ukraine
(M. Bublyk)</p>
      <p>2021 Copyright for this paper by its authors.</p>
      <p>Mutual identification of ground forces on the battlefield is achieved through the use of many devices
and control systems and the use of some organizational measures, namely:
 Devices and control systems for the configuration of troops and weapons, the dynamics of their
actions, time parameters, electromagnetic radiation, etc.
 sequence of organizational measures for the management of combat units on the battlefield, the
use of automatic and manual systems "question-answer", training of military personnel.</p>
      <p>
        According to military experts [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref5 ref6 ref7">1-3, 5-7</xref>
        ], reducing the level of losses from "Fiendly fire" can be
achieved by comprehensive actions aimed at developing automated decision support systems to identify
units of the tactical unit of both coalition forces and enemy forces during fighting. This will be a
powerful help to unit commanders and will save the lives of the military.
      </p>
      <p>The relevance of research is due to the rapid growth of information collected, analyzed and
processed by devices for combat identification, and technical differences in the physical characteristics
of these devices in the armed forces of different countries that are members of the military coalition.
This highlights the development of an effective decision support system for the rapid identification of
coalition forces on the battlefield according to NATO standards. In addition to increasing combat
effectiveness in the management of coalition forces, the key task was to minimize the occurrence of
combat units under "friendly fire" on the battlefield according to NATO standards.</p>
      <p>Recent military conflicts in eastern Ukraine, especially during Operation Allied Forces (OAF), have
exacerbated unresolved issues in modern combat. Characteristic features of modern combat are the
opening of fire from long distances on "closed targets", rapid raids, time constraints on decision-making
by commanders, the uncertainty of the battle situation, lack of situational awareness of where the enemy
finds and where the ally. Due to objective and subjective factors, there is a high probability of falling
under the fire of their firearms.</p>
      <p>
        There are two key reasons why armed units fall under the "Friendly Fire" [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref5 ref6 ref7">1-3, 5-7</xref>
        ]: "identification
error" and "position error". Identification error, according to [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref5 ref6 ref7">1-3, 5-7</xref>
        ], is defined as fire that is
purposefully conducted for their own purposes, which were credited to enemy targets by mistake. There
are many reasons for this error, among which the most common are command errors in the headquarters,
false and late information, and so on. This is due to the high speed of modern combat, high mobility of
firing points, lack of sufficient time for the commander to make a decision. Position error, according to
[
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref5 ref6 ref7">1-3, 5-7</xref>
        ], is due to reduced quality of weapons, ammunition and errors during aiming.
      </p>
      <p>
        In accordance with the fundamental provisions of the doctrine of avoidance "Friendly fire", which
are set out in [
        <xref ref-type="bibr" rid="ref1 ref16 ref17 ref18 ref19 ref2 ref20 ref26 ref27 ref28 ref29 ref3 ref30 ref31 ref32 ref33 ref34 ref5 ref6 ref7">1-3, 5-7, 16-20, 26-34</xref>
        ], it is advisable in high-intensity fire to invariably control the
movement of their forces through the work of monitoring points for their forces, to position the enemy
in real time, to divide into one's own and another's by means of surveillance and aiming complexes or
other additional special means, invariably to hit enemy targets immediately after confirmation of their
identification. Despite such a simple list of actions in the face of rapid combat, they are difficult to
follow due to the constant movement of troops at high speeds, often in unknown terrain and in low
visibility. The short duration of battles, considerable distances to targets and their high mobility also
have a significant impact. This is further complicated by technical restrictions on the range of weapons
in combat, the skill of commanders to navigate in combat for a limited time. All these shortcomings
cannot be eliminated only by the presence of high-precision, innovative equipment or innovative
labeling technologies and a set of applicators. Adequate accuracy in recognizing military forces on the
battlefield or in the area of operations is achieved only by a clear interaction and correlation between
combat intelligence, the use of technical means, coordinated actions in the process of controlling the
combat situation, and, most importantly, high training of commanders to navigate low visibility, high
terrain complexity, increasing distances to targets, etc. Invariably important is the skill of commanders
to navigate the terrain unmistakably, to manage the fighting of their military units and to effectively
identify enemy units.
      </p>
      <p>Thus, this necessitates the development of a conceptual framework for a decision support system for
the recognition of ground forces on the battlefield in accordance with NATO standards and the
definition of their functional requirements. It should be borne in mind that the existing "self-alien"
recognition complex is now known as the "hardware and software complex of automated distinction of
their troops from enemy troops." This highlights the purpose of this study in the direction of building
the structure of DSS and determining the sequence of its work in accordance with NATO's international
standards for the identification of ground forces in modern combat.</p>
    </sec>
    <sec id="sec-2">
      <title>2. NATO-standard battlefield decision support system tasks</title>
      <p>
        Classical DSS in well-known scientific sources [
        <xref ref-type="bibr" rid="ref8 ref9">8-9, 40, 41</xref>
        ] is defined as a computerized system
that through the collection and analysis of large amounts of information has an impact on the
management decision-making process. Automated decision support systems (ADSS) are automated
information systems designed to collect, store, search and issue reference information to consumers in
the required form. It was an electronic file for computer search of the necessary information. For storage
and processing of reference information, specialized databases are used computer reference systems.
      </p>
      <p>It is reference systems that solve all the tasks of providing consumers with regulatory information.
Help systems have several unique advantages and capabilities. First of all, it is providing an opportunity:
 Compactly store large amounts of information;
 Structure and display stored information;
 Quick search of the necessary documents or even their fragments in huge data sets.</p>
      <p>Decision support system, which implements the principle of open technology, allows you to actively
system develop, fill it with new documents, and store and view photos and various computer files. This
approach allows to save the texts of documents and add new records and images.</p>
      <p>It is known that currently, special attention is paid to the issues of reliable and efficient management.
The best option is one in which this process is implemented in real-time, which can be provided only
with integrated automation of management of special purpose information systems (SPIS), i.e., the
necessary elements of such management at all levels combined into a single system.</p>
      <p>The relevance of this material is due to the need to reduce the complexity of the processes of using
information resources and increase the efficiency of users to perform standard actions to identify troops
on the battlefield using computer technology, in particular, decision support system (DSS). One of the
most important ways to achieve reliable and efficient management of complex systems is their partial
automation, which must be used in storage, retrieval and processing of information and when working
with relevant organizational resources (human, technical, financial, etc.). Disseminate information.
Automation of some components of such systems through computer technology can reduce the
complexity of using information resources and increase users' efficiency to perform standard actions
with them. The paper considers one of the components of unique purpose information systems - the
decision support system for recognizing ground forces on the battlefield according to NATO standards.</p>
      <p>This DSS should provide prompt access to the necessary information, namely:
1. Purpose of DSS;
2. Normative documents on DSS;
3. Terms and definitions used in the DSS;
4. Symbols and abbreviations used in the DSS;
5. Requirements for identification and its methods;
6. Forms of security surveys;
7. Standard methods, devices and identification procedures;
8. Information database on samples of equipment, weapons, uniforms, etc., for different countries.</p>
    </sec>
    <sec id="sec-3">
      <title>3. The work of the commander to ensure timely and reliable identification</title>
      <p>
        According to international standards and the experience of military specialists [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref21 ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref30 ref31 ref32 ref33 ref34 ref35">10-36</xref>
        ], the key factor
in combat is the strict identification of ground forces. It is achieved by building a reliable relationship
between the participants in the battle with the help of standardized means and methods of control over
the location of their own and coalition armed forces. For completeness, we present the information
declared in the guidelines and scientific publications on this issue [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20 ref26 ref27 ref28 ref29 ref30 ref31 ref32 ref33 ref34 ref35">16 - 20, 26-35, 37</xref>
        ]. Having
conducted a thorough analysis of known scientific research and publications [
        <xref ref-type="bibr" rid="ref1 ref27 ref3 ref5 ref7 ref8 ref9">1, 3, 5, 7-9, 27</xref>
        ], we
structure the stages of the DSS development process as follows:
1. Automated and manual query and response systems. [
        <xref ref-type="bibr" rid="ref28 ref30 ref33 ref34">28, 30, 33, 34</xref>
        ]
2. Staff training [
        <xref ref-type="bibr" rid="ref1 ref13 ref24 ref27 ref3 ref35 ref5 ref7 ref8 ref9">1, 3, 5, 7-9, 13, 24, 27, 35, 36</xref>
        ].
3. Combat space management system [38-41].
4. Electronic systems [
        <xref ref-type="bibr" rid="ref2 ref23 ref4 ref6 ref7 ref8 ref9">2, 4, 6, 7-9, 23, 38-41</xref>
        ].
5. Sign and signal identification system [
        <xref ref-type="bibr" rid="ref1 ref2 ref25 ref3 ref35 ref5 ref6 ref7 ref8 ref9">1-3, 5-9, 25, 35-41</xref>
        ].
6. A set of prohibitions and restrictions on the use of appropriate signals [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20 ref26 ref27 ref28 ref29 ref30 ref31 ref32 ref33 ref34 ref35">16 - 20, 26-35,
3839</xref>
        ].
7. A set of norms and procedures for the recognition of identification [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20 ref26 ref27 ref28 ref29 ref30 ref31 ref32 ref33 ref34 ref35 ref7">7, 16 - 20, 26-35</xref>
        ].
8. Standardized requirements for the actions of the commander, aimed at timely and reliable
identification [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20 ref26 ref27 ref28 ref29 ref30 ref31 ref32 ref33 ref34 ref35 ref7">7, 16 - 20, 26-35, 38-41</xref>
        ]
      </p>
      <p>Methodology of the department commander is the following. To ensure that identification issues are
taken into account during the order formation, such a sub-item should be included in a separate section,
for example, entitled "Instructions for the Coordination of Combat Identification Measures".</p>
      <p>It is the responsibility of unit commanders to establish the form of inquiries and responses and the set
of identification tools and devices that will be used for both operations and training. Commanders are
responsible for implementing the directives of the high command during joint operations. Decisions on
the configuration of identification means, verbal and non-verbal requests are made at the highest
operation-command level and are communicated in advance to lower formations and units. Neighbours
and senior subordinates should also be informed of established inquiries and protocol responses.</p>
    </sec>
    <sec id="sec-4">
      <title>4. The structure of the decision support system</title>
      <p>To determine the DSS structure, and taking into account the tasks it must perform, it is necessary to
specify the following:</p>
      <p>1. DSS is a hardware-software product that contains communication equipment, conjugation,
computer complex with appropriate databases (command, headquarters, subordinates, attached units,
neighbours, etc.), equipment for visualization of tactical information on a background topographic map,
reference information, etc.), governing bodies.</p>
      <p>2. Equipment, particularly built-in computers, must be operated in harsh (low or high temperatures,
shaking, shock, humidity, dust, etc.) operation.</p>
      <p>It is desirable to consider the possibility of developing DSS options for carrying and transportation.
In fig. 1 presents a block diagram of the hardware component of the DSS, which contains the following
blocks: computer complex means of displaying information, coupling device, equipment for receiving
and transmitting data, control panel. The block diagram of the functional software of the DSS is
presented in Fig. 2 (a) and 2 (b). The first column presents the tasks to ensure prompt access to the
relevant information clusters.</p>
      <p>In each chain, when selecting a specific information cluster, access to the relevant blocks of
information is provided, which is regulated by the requirements of paragraph 3. The procedure is
described in more detail in the next paragraph.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Experiments, results and discussion</title>
      <p>This work is based on the principle of "nested menus". Let's consider the order of its work on the
example of searching for information on the information cluster "Ground/air panels of combat
identification" - one of the typical tasks.</p>
      <p>The system starts working when the Main Menu appears in the dialogue box.</p>
      <p>The user selects the desired information block by "clicking" the left mouse button on the appropriate
line. In our examples, this will be the 5th line. The "Requirements and identification methods" menu
appears in the dialogue box.</p>
      <p>When you select an option from the 2nd line in the dialogue box, the menu "Recognition of friendly
forces" appears.</p>
      <p>When you select an option from line 2, the "Sign and Signal Identification" menu appears in the
dialogue box.</p>
      <p>When selecting an option from line 9, information about "Ground/Air Combat Identification Panels"
appears in the dialogue box.</p>
      <p>
        Ground/air combat identification panels (CIP) is a medium and long-range IR radiation device.
According to [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref5 ref6 ref7">1-3, 5-7</xref>
        ] CIP is a solid surface, which acts as a thermal mirror, reflecting the contrasting
cold temperature of the atmosphere. Installation and fastening of CIP depends from color, visibility,
reflection angle, strength, uniformity of characteristics and ways of fastening. The most effective
fastening system is a metal frame that allows you to turn the CIP upside down or mask. The masked or
inverted panel goes into idle mode. Metal frames are attached with brackets, hooks and hinges.
Identification of CIP has a range limit, training in the use of CIP. Upon arrival at the theatre of
operations and before the operation, training (training) should be conducted to confirm the effectiveness
of the CIP.
      </p>
      <p>Training should also include identifying possible CIP placement options on platforms that help the
shooter query the target. Recognition training in "white-hot" and "black hot" modes should be
conducted before the action starts. Thermal hazard profile libraries can also be developed and used
during training.</p>
      <p>Recommendations for the use of the combat identification panel (CIP) have a general instructions,
cases of reduced efficiency СIP, safety measures and misleading. The adversary can use CIPs to
mislead, as they can be imitated, purposefully or involuntarily. In any case, the identification is carried
out on the basis of thermal or visual recognition of the object using all recognition procedures and
means.</p>
      <p>Purposeful imitation. In intentional fabrication, the enemy deliberately copies the panels to disrupt
the effectiveness of their use. Countermeasures are to put the panels of their troops out of order.</p>
      <p>Unintentional imitation. In involuntary imitation, the characteristics of the object form a picture of
a "cold area" similar to the CIP image. This effect can be observed on some vehicles in the presence of
windshields, toolboxes, luggage racks, tracks, etc. The means of counteraction is the necessary training
to detect the thermal signature of the target. Particular attention is paid to the use of image signals of
the whole object, not just CIP.</p>
      <p>1. Pre-battle review. Verification of the established CIP should be carried out during the
prebattle inspection and preventive maintenance. Checking the status of the CIP includes the
following basic steps:
 checking the correct location (installation) of all CIP;
 check for damage or unreliable fastening;
 replacement or repair of all loose, damaged or lost CIP;
 cleaning from dust, dirt, sand, snow and other elements that may interfere with the CIP. For
cleaning, use a soft cloth that is not contaminated with oil, grease, fuel, etc.;
 check of reliability of fixing of a thermal tape, in case of its application;
 check the visualization of each CIP in the thermal imager.</p>
      <p>The information displayed on the monitor is scrolled in Page Up / Down mode. The search for other
necessary information clusters is similar. The structure of IDS allows entering new tasks at all levels of
hierarchy to supplement and modify its information bases.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>The urgency of the research is due to the long-term aggravation of the military-political situation on
the territory of Ukraine. One of the solutions to this problem is the formation of a military coalition,
which is relevant to the development of a system to support effective decision-making for the rapid
identification of coalition troops on the battlefield according to NATO standards. In addition to
increasing combat effectiveness in the management of coalition forces, the key task was to minimize
the occurrence of combat units under "friendly fire" on the battlefield according to NATO standards.
The proposed functional requirements for the decision support system (DSS) provide prompt access to
information and include in accordance with NATO standards: 1) the appointment of DSS; 2) regulatory
documents of DSS; 3) terminology, symbols and abbreviations used in DSS; 4) methods and
requirements for identification; 5) forms of security surveys; 6) standard methods, devices and
identification procedures; 7) information database on samples of equipment, weapons, uniforms of
coalition troops. The proposed open structure of the system allows you to exclude old tasks and
introduce new ones, update and expand its information arrays. Functional requirements for DSS
hardware and software are also proposed.
7. References
[36] V.M. Smelkov, Express calculated the range of observation of the thermal imaging system, Special
equipment 4 (26) (2015) 56–58.
[37] Boletin de Observation Tecnologica en Defensa. Trimestre 33 (4) 2011. http://www.
tecnologiaeinnovacion.defensa.gob. Es /Lists/ Publicaciones/ Attachments/4/ boletinn 33.pdf.
URL: http://www.tecnologiaeinnovacion.defensa.gob.es/Lists/Publicaciones/Attachments/4/
boletinn33.pdf.
[38] Y. Zdorenko, O. Lavrut, T. Lavrut, Y. Nastishin, Method of Power Adaptation for Signals Emitted
in a Wireless Network in Terms of Neuro-Fuzzy System, Wireless Personal Communications,
115(1) (2020) 597-609. DOI: 10.1007/s11277-020-07588-5.
[39] V. Lytvyn, O. Pashchetnyk, O. Klymovych, L. Polishchuk, I. Kolb, Y. Burov, V. Vysotska,
Assessment of the hydro-meteorological conditions impact on the combat troops operations
preparation and conduct in the geo-information subsystem of the automated battlefield
management system, , in: N. Sharonova, V. Lytvyn, O. Cherednichenko, Y. Kupriianov, O.
Kanishcheva, T. Hamon, N. Grabar, V. Vysotska, A. Kowalska-Styczen, I. Jonek-Kowalska
(Eds.), Proceedings of the 5th International Conference on Computational Linguistics and
Intelligent Systems, COLINS 2021, Volume I: Workshop, Sun SITE Central Europe, RWTH
Aachen University, Germany, CEUR-WS.org, online, volume Vol-2870 of CEUR Workshop
Proceedings, 2021, pp. 1063-1076.
[40] O. Pashchetnyk, V. Lytvyn, V. Zhyvchuk, L. Polishchuk, V. Vysotska, Z. Rybchak, Y. Pukach,
The ontological decision support system composition and structure determination for commanders
of Land Forces formations and units in Ukrainian Armed Force, , in: N. Sharonova, V. Lytvyn, O.
Cherednichenko, Y. Kupriianov, O. Kanishcheva, T. Hamon, N. Grabar, V. Vysotska, A.
Kowalska-Styczen, I. Jonek-Kowalska (Eds.), Proceedings of the 5th International Conference on
Computational Linguistics and Intelligent Systems, COLINS 2021, Volume I: Workshop, Sun
SITE Central Europe, RWTH Aachen University, Germany, CEUR-WS.org, online, volume
Vol2870 of CEUR Workshop Proceedings, 2021, pp. 1077-1086.
[41] O. Klymovych, V. Hrabchak, O. Lavrut, T. Lavrut, V. Lytvyn, V. Vysotska, The Diagnostics
Methods for Modern Communication Tools in the Armed Forces of Ukraine Based on Neural
Network Approach, , in: M. Emmerich, V. Lytvyn, V. Vysotska, V. Basto-Fernandes, V.
Lytvynenko (Eds.), Proceedings of the 2nd International Workshop on Modern Machine Learning
Technologies and Data Science (MoMLeT+DS 2020). Volume I: Main Conference, Sun SITE
Central Europe, RWTH Aachen University, Germany, CEUR-WS.org, online, volume Vol-2631
of CEUR Workshop Proceedings, 2020, pp. 198-208.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.G.</given-names>
            <surname>Kamaltynov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Kukobko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.S.</given-names>
            <surname>Maliarenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.I. Kisel</surname>
          </string-name>
          ,
          <article-title>Identification of objects on the battlefield: International experience analysis</article-title>
          ,
          <source>Weapons and Military Equipment</source>
          <volume>12</volume>
          (
          <issue>4</issue>
          ) (
          <year>2016</year>
          )
          <fpage>22</fpage>
          -
          <lpage>26</lpage>
          . doi:
          <volume>10</volume>
          .34169/
          <fpage>2414</fpage>
          -
          <lpage>0651</lpage>
          .
          <year>2016</year>
          .
          <volume>4</volume>
          (
          <issue>12</issue>
          ).
          <fpage>22</fpage>
          -
          <lpage>26</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>G.G.</given-names>
            <surname>Antonevich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.G.</given-names>
            <surname>Kulikov</surname>
          </string-name>
          ,
          <article-title>How to eradicate "friendly fire"</article-title>
          ,
          <source>Air and space defence 4</source>
          (
          <year>2011</year>
          )
          <fpage>22</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Ye</surname>
          </string-name>
          . Kruglov, We know who is ours,
          <source>December</source>
          <volume>17</volume>
          ,
          <year>2014</year>
          , Business Guide Kommersant.
          <volume>75</volume>
          (
          <year>2014</year>
          )
          <fpage>10</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>B.</given-names>
            <surname>Kalinichev</surname>
          </string-name>
          ,
          <article-title>Improvement of military equipment in the leading countries of the world</article-title>
          ,
          <source>Foreign military review 5</source>
          (
          <year>2007</year>
          )
          <fpage>30</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.</given-names>
            <surname>Titkov</surname>
          </string-name>
          ,
          <article-title>How to protect themselves from "friendly fire"</article-title>
          ,
          <year>2020</year>
          . URL: http://www.popmech.ru/weapon/15054-zashchita-ot-druzey/#full.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>O.</given-names>
            <surname>Rudkovsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chernenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Vankevych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Smychok</surname>
          </string-name>
          ,
          <article-title>Areas of development of the system of combat identification of units in combat</article-title>
          ,
          <source>Collection of scientific works of Odesa Military Academy</source>
          <volume>1</volume>
          (
          <issue>11</issue>
          ) (
          <year>2019</year>
          )
          <fpage>113</fpage>
          -
          <lpage>123</lpage>
          . Doi:
          <volume>10</volume>
          .37129/
          <fpage>2313</fpage>
          -
          <lpage>7509</lpage>
          .
          <year>2019</year>
          .
          <volume>11</volume>
          .
          <fpage>113</fpage>
          -
          <lpage>123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Korolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Korolova</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Milkovich</surname>
          </string-name>
          , Ya. Zaiets,
          <string-name>
            <given-names>V.</given-names>
            <surname>Zhyvchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Lytvyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bublyk</surname>
          </string-name>
          ,
          <article-title>Information-Reference System Creation Prerequisites for the Ground Forces Identification on the Battlefield According to NATO Standards</article-title>
          , in: N.
          <string-name>
            <surname>Sharonova</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Cherednichenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Kupriianov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Kanishcheva</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Hamon</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Grabar</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Kowalska-Styczen</surname>
          </string-name>
          , I. Jonek-Kowalska (Eds.),
          <source>Proceedings of the 5th International Conference on Computational Linguistics and Intelligent Systems, COLINS 2021</source>
          ,
          <string-name>
            <surname>Volume</surname>
            <given-names>I</given-names>
          </string-name>
          : Workshop, Sun SITE Central Europe, RWTH Aachen University, Germany, CEUR-WS.org, online, volume Vol-
          <volume>2870</volume>
          <source>of CEUR Workshop Proceedings</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>1152</fpage>
          -
          <lpage>1172</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2870</volume>
          /paper84.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
            <surname>Şuşnea</surname>
          </string-name>
          ,
          <article-title>Decision support systems in military actions: necessity, possibilities and constraints</article-title>
          ,
          <source>JoDRM</source>
          <volume>3</volume>
          -
          <issue>2</issue>
          (
          <issue>5</issue>
          ) (
          <year>2012</year>
          )
          <fpage>131</fpage>
          -
          <lpage>140</lpage>
          . URL: https://www.ceeol.com/search/article-detail?id=
          <fpage>252278</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bublyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Lytvyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vysotska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Sokulska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Chyrun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Matseliukh</surname>
          </string-name>
          ,
          <article-title>The decision tree usage for the results analysis of the psychophysiological testing</article-title>
          , in: Shakhovska N.,
          <string-name>
            <surname>Campos</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melnykova</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Izonin</surname>
            <given-names>I</given-names>
          </string-name>
          . (Eds.),
          <source>Proceedings of the 3rd International conference on Informatics</source>
          &amp;
          <string-name>
            <surname>Data-Driven</surname>
            <given-names>Medicine</given-names>
          </string-name>
          ,
          <string-name>
            <surname>IDDM</surname>
          </string-name>
          <year>2020</year>
          ,
          <article-title>Sun SITE Central Europe</article-title>
          , RWTH Aachen University, Germany, CEUR-WS.org, online, volume Vol-
          <volume>2753</volume>
          <source>of CEUR Workshop Proceedings</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>458</fpage>
          -
          <lpage>472</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2753</volume>
          /paper31.pdf
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>E.</given-names>
            <surname>Blasch</surname>
          </string-name>
          , Ch. Jan,
          <string-name>
            <surname>I. Kadar</surname>
          </string-name>
          ,
          <article-title>Brief description of tracking and identification methods</article-title>
          ,
          <source>in: Proceedings of SPIE - International Society for Optical Engineering</source>
          , volume
          <volume>1</volume>
          (
          <issue>11</issue>
          ),
          <year>2014</year>
          . DOI:
          <volume>10</volume>
          .1117/12.2050260
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Alekseev</surname>
          </string-name>
          ,
          <article-title>The best military innovations in the United States in 2017, Foreign military review 3 (</article-title>
          <year>2011</year>
          )
          <fpage>91</fpage>
          -
          <lpage>92</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <article-title>Identification of objects on the battlefield</article-title>
          ,
          <year>2020</year>
          URL: http://www.dogswar.ru/armiimira/vooryjenie/592-opoznavanie-obektov-napolebo.html.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sergeev</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Tyurin</surname>
          </string-name>
          ,
          <article-title>American radar identification system MK12, Foreign military review 8 (</article-title>
          <year>1983</year>
          )
          <fpage>55</fpage>
          -
          <lpage>58</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Yu</surname>
            .
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Stasev</surname>
            ,
            <given-names>V.I.</given-names>
          </string-name>
          <string-name>
            <surname>Karpenko</surname>
            ,
            <given-names>I.I. Rim</given-names>
          </string-name>
          ,
          <article-title>Comparative analysis of noise immunity of existing radar recognition systems</article-title>
          ,
          <source>Weapons and troops systems, equipment 3-4</source>
          (
          <year>2005</year>
          )
          <fpage>3</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shirokov</surname>
          </string-name>
          ,
          <article-title>Direction of operational and combat training of the NATO Joint Armed Forces in 2020, Foreign military review 5 (</article-title>
          <year>2020</year>
          )
          <fpage>39</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>[16] AAP-06</source>
          , NATO Glossary of Terms and Definitions, Ed.
          <year>2020</year>
          . URL: https://www.mil.gov.ua/content/mil_standard/perelik_stand_ta_ docum_
          <year>2021</year>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <source>[17] STANAG 2190</source>
          , Allied Joint Doctrine for Intelligence, Counter-Intelligence and Security, Ed. 3,
          <string-name>
            <surname>Std</surname>
            <given-names>AJP</given-names>
          </string-name>
          -2, Ed. B,
          <string-name>
            <surname>Ver</surname>
          </string-name>
          . 1. URL: https://www.mil.gov.ua/content/mil_standard/ kat_ch_stand_15012021.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>[18] STANAG 2199, Сommand and Control of Allied Land Forces, Ed. 3, ATP-3.2</source>
          .2, Ed. B,
          <string-name>
            <surname>Ver</surname>
          </string-name>
          . 1,
          <year>2016</year>
          . URL: https://www.mil.gov.ua/content/mil_standard/ kat_ch_stand_15012021.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>[19] ATP-3.3.2</source>
          .1,
          <string-name>
            <surname>Tactics</surname>
          </string-name>
          ,
          <article-title>Techniques and Procedures for Close Air Support</article-title>
          and Air Interdiction, Ed. D, Ver. 1,
          <year>2019</year>
          . URL: https://www.mil.gov.ua/content/mil_standard/perelik_stand_ta_ docum_
          <year>2021</year>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Battlefield</given-names>
            <surname>Combat Identification System (BCIS)</surname>
          </string-name>
          ,
          <year>2021</year>
          . URL: http://www.globalsecurity.org/military/systems/ground/bcis.htm.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>E.</given-names>
            <surname>Blasch</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. B. Laskey</surname>
          </string-name>
          ,
          <string-name>
            <surname>A-L. Joussselme</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Dragos</surname>
            ,
            <given-names>P. C. G.</given-names>
          </string-name>
          <string-name>
            <surname>Costa</surname>
          </string-name>
          , J. Dezert,
          <source>URREF Reliability versus Credibility in Information Fusion (STANAG 2511)</source>
          , Info Fusion,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Nutt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sagic</surname>
          </string-name>
          ,
          <article-title>Deciding equivalances among conjunctive aggregate queries</article-title>
          ,
          <source>J. ACM</source>
          <volume>54</volume>
          (
          <year>2007</year>
          ). doi:
          <volume>10</volume>
          .1145/1219092.1219093.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>MSSR 2000 I Monopulse</surname>
          </string-name>
          <article-title>Secondary Surveillance Radar</article-title>
          . URL: https://www.hensoldt.net/products/radar
          <article-title>-iff-and-datalink/mssr-2000-i-secondary-radar.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>I. Politov</surname>
          </string-name>
          ,
          <article-title>Identification systems "friend or foe" MBT Abrams and Bradley IFV, Foreign military review 7 (</article-title>
          <year>2001</year>
          )
          <fpage>43</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <source>[25] Search and Rescue Transponder AIS-SART Musson - 502, standards IEC 60945, IEC 61097-1, IEC 61993-2, IEC 61097-14 Ed. 1.0</source>
          ,
          <string-name>
            <given-names>IMO</given-names>
            <surname>MSC</surname>
          </string-name>
          .
          <volume>246</volume>
          (
          <issue>83</issue>
          ) resolution,
          <year>2021</year>
          . URL: https://mussonmarine.com/p/r19gwv635m-ais
          <article-title>-sart-musson-502a</article-title>
          .html
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <source>[26] STANAG</source>
          <year>2020</year>
          , Land Operational Reports, Ed. 4, ATP-105, Ed. A,
          <year>2021</year>
          . URL: https://www.mil.gov.ua/content/mil_standard/kat_ch_stand_15012021.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <source>[27] STANAG 2199</source>
          ,
          <article-title>Identification of Land Forces on the Battlefield and in an Area of Operation</article-title>
          , Ed. 9,
          <string-name>
            <surname>Std</surname>
            <given-names>ATP</given-names>
          </string-name>
          -91, Ed. A, Ver. 1,
          <year>2015</year>
          . URL: https://www.mil.gov.ua/content/mil_standard/ kat_ch_stand_15012021.pdf
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <source>[28] STANAG 2285</source>
          ,
          <article-title>Allied Tactical Doctrine for Land Targeting</article-title>
          , Ed. 2,
          <string-name>
            <surname>Std.</surname>
          </string-name>
          <source>ATP-3.9</source>
          .2, Ed. A, Ver. 1,
          <year>2018</year>
          . URL: https://www.mil.gov.ua/content/mil_standard/ kat_ch_stand_15012021.pdf
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <source>[29] STANAG 3374</source>
          ,
          <string-name>
            <surname>Standards</surname>
            <given-names>Central</given-names>
          </string-name>
          ,
          <article-title>The Merit of Individual System Performance Characteristics for IFF-Interoperability of IFF System (MISPEC (IFF))</article-title>
          .
          <source>AEtP-05</source>
          Vol.
          <volume>3</volume>
          ,
          <string-name>
            <surname>Edition</surname>
            <given-names>E</given-names>
          </string-name>
          ,
          <year>2015</year>
          . Computation Procedures,
          <year>2015</year>
          . Washington DC, United States: United States Department of Defense. URL: https://publishers.standardstech.com/content/military-dod
          <source>-aetp-5.</source>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <source>[30] STANAG 4162</source>
          ,
          <article-title>Identification data combining process</article-title>
          ,
          <source>Ed. 3</source>
          ,
          <year>2013</year>
          . URL: https://www.mil.gov.ua/content/mil_standard/ kat_ch_stand_15012021.pdf
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <source>[31] STANAG 4193</source>
          ,
          <article-title>Technical Characteristics of the IFF MK-XA and MK-XII System. Part I: System Description</article-title>
          and General Characteristics, Ed. 3,
          <year>2016</year>
          . https://standards.globalspec.com/std/9885769/stanag 4193 pt iv
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <source>[32] STANAG 4193</source>
          ,
          <article-title>Technical Characteristics of the IFF MK XA and MK XII System. Part III: Installed System Characteristics</article-title>
          , Ed. 3,
          <year>2016</year>
          https://standards.globalspec.com/std/10014106/STANAG 4193 PTIII. URL: https://www.mil.gov.ua/content/mil_standard/kat_ch_stand_15012021.pdf
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <source>[33] STANAG 4579 (Edition</source>
          <volume>1</volume>
          ,
          <year>2010</year>
          .
          <article-title>"Battlefield target identification devices (BIDS)"</article-title>
          ).
          <source>(NATO UNCLASSIFIED OTAN SANS CLASSIFICATION)</source>
          .
          <volume>12</volume>
          -
          <fpage>13</fpage>
          .STANAG 4579,
          <article-title>Battlefield target identification devices (BTIDS) (Ed. 1) STANAG 4579, Battlefield Target Identification Device (BTIDs</article-title>
          ),
          <source>Ed. 1</source>
          ,
          <year>2004</year>
          . URL: https://www.mil.gov.ua/content/mil_standard/kat_ch_stand_ 15012021.pdf
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <source>[34] STANAG 7149</source>
          , NATO Message Catalogue, Ed. 6,
          <string-name>
            <surname>Std</surname>
            <given-names>APP</given-names>
          </string-name>
          -11, Ed. D, Ver. 1,
          <year>2015</year>
          . URL: https://www.mil.gov.ua/content/mil_standard/kat_ch_stand_15012021.pdf
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <article-title>NATO standards for military uniform and equipment of servicemen of the Armed Forces of Ukraine, Ukrainian Military Pages: Information and analytical resource, military policy, armaments</article-title>
          and military equipment,
          <year>2015</year>
          . URL: http://www.ukrmilitary.com/
          <year>2015</year>
          /04/blogpost_6.html.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>