microsoft word 130-133_212.docx issn 2744-1741 defense and security studies original research vol. 3, january 2022, pp.130-133 https://doi.org/10.37868/dss.v3.id212 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 130 analysis of importance priority to be studied on igniter system of 450 caliber x rocket a. zaldiansyah1*, n. widianto2, y. h. yogaswara3, y. ruyat4 1,2,3,4 faculty of defense technology, indonesia defense university, indonesia *corresponding author e-mail: zaldi.msn@gmail.com received nov. 28, 2022 revised dec. 29 , 2022 accepted dec. 30 , 2022 abstract a rocket is a flying platform that gets energy from the combustion process that performs a thrust that is large enough to reach hypersonic speed. it becomes quite vital considering the speed of the combustion process in double configuration propellant type, which is r=7 mm/s. the ignition of the propellant is supported by a squib as a conductor of electricity to the igniter which will then conduct heat to the propellant in the rocket motor. the main focus of this research is to analyze the development potential of the x rocket igniter system. this research uses a quantitative method approach, with the research analysis using a quality function deployment (qfd) approach. based on the benchmark values obtained from each supporting instrument used in the 450 caliber x rocket igniter system, the results were obtained on a priority scale for the development of a rocket igniter system as an effort to overcome the igniter from malfunctions when the operating system is running. the results show that the instruments that need to be developed are the squib, pyrotechnics, emergency button, ground system, and wiring system. © the author 2022. published by arda. keywords: rocket, igniter system, qfd, malfunction, instrument. 1. introduction today, the development of military technology is increasingly being intensified. in indonesia, it has a road map of seven national priority programs related to weapons technology. [1] the road map contains seven priority programs for the national defense industry, including rockets and propellants which are one of the main focuses in research and development. there is ongoing research, namely the r han 450 mm rocket which is deemed necessary and requires a lot of research in its development. procurement of missile and rocket is an important stage, in order to fulfil a minimum basic strength or known as minimum essential force (mef) in indonesia. [2] rocket is a flying platform that gets energy from the combustion process that perform a thrust. [3] the resulting force is also large enough to reach hypersonic speed, so that the reactive impulse will be proportional to the reaction, this is in accordance with newton's third law of motion. [4] based on research by ganda samosir in 2011 on the propulsion of rx.320 rocket, [5] although it has a high flash point, this is quite vital considering the speed of the combustion process in double configuration propellant type, which is r=7 mm/s. the ignition of the propellant is supported by a squib as a conductor of electricity to the igniter which conduct heat to the propellant in the rocket motor. [6] squib is part of the igniter of a rocket motor to ignite by electric a primary composition of the squib and some pyrotechnics. squib is an electric ignition wick. [7] depend on the speed of electricity flow on the squib, efforts are needed in conditioning the flow of electricity contained in the squib, so that an igniter can avoid dss vol. 3, january 2022, pp.130-133 131 static electricity and unwanted disturbances. therefore, there is a need to analyze importance priority to be studied on of the rocket igniter system to avoid malfunctions of the system. 2. research method this research was conducted using a quantitative method approach using a quality function deployment (qfd) method. qfd is a method to transform qualitative user demands into quantitative parameters, the user requirements data that has been obtained is interpreted to find relationships and interrelationships between existing data descriptions. [8] thus, the data obtained in the form of scores on the design characteristics of each instrument, and a priority scale is obtained. 3. results and discussions 3.1. user requirements user requirements explain the needs desired by users who in this study are the firing igniter team from the rocket technology center (pustekroket) brin in indonesia. in this operation there are several main points of user requirements that are desired for the purposes of the igniter system, which refers to the x rocket as outlined in the list of requirements (lor), as follows: table 1. list of requirements (lor) instruments user requirements urgency power supply electric current requirement of 1 ampere and voltage requirement of 20 volt 4 switch connector an emergency system is needed in the electrical panel box to be able to immediately cut off the current when something unexpected happens 5 cable proper cable are needed for 1 ampere and 20 volts, and have low resistance so that the time delay in igniter operation can be cut 4 grounding the grounding system required when operating the igniter is integrated with the firing system, and is expected to have a minimal resistance value, so that the static electricity contained in the wiring can be wasted towards ground 3 casing the main casing needs are the melting point of 600°c, the distribution of combustion is even, and the casing melts instantly 5 squib it takes a squib that has a long shelf life, and is not easily oxidized at room temperature 3 squib explosives requires high calorific value, low flameability 4 propellant material it requires a high calorific value, with the same flameability as that produced by an igniter flame 4 igniter explosives requires high calorific value, low flameability 4 description for table 1: • score 1: not important. • score 2: less important. • score 3: quite important. • score 4: high importance. • score 5: very high importance. based on the table above, data on user requirements related to the igniter system are obtained according to user interviews. the points of need are discussed for each component, in order to make it easier for the author to classify needs and their level of importance. dss vol. 3, january 2022, pp.130-133 132 3.2. benchmark instruments based on table 1 list of requirements (lor), then the relation matrix stage is carried out. where the relation matrix is the match between the lor points and the processing of the design characteristics made. there are 2 processes at this stage, namely providing benchmark values, and a priority scale of design characteristics, to determine the development potential of each instrument supporting the igniter system on the x rocket. in making the relation matrix, there is a level of conformity which is divided into 3 with descriptions of weak linkage (1), moderate correlation (3), and high correlation (9). the relationship matrix was created to determine the relationship between the level of conformity between user needs and the characteristics of the design made. this criterion is based on the lor compiled and analyzed using quality function deployment (qfd). then the relationship between user requirements (list of requirements) and design characteristics is arranged in a relation matrix. the following relationship data are shown in table 2. table 2. relation matrix descriptionod table 2: a. score 1: weak relationship. b. score 3: medium relationship. c. score 9: high relationship. based on table 2. relation matrix and performance benchmarks, the values that have priority scale numbers 1 and 2 are squib with 70.11%, and pyrotechnics with 69.35%. there are also emergency buttons, cables and ground that have a priority scale value of 3, 4, and 5, each of which has a value of 60.9%, 60.15%, and 60.02%, respectively. based on the benchmark values obtained from each of the supporting instruments used in the 450 caliber x rocket igniter system, the results of the priority scale are obtained for developing the rocket igniter system to list of requirement l ev el o f in te re st design characteristics p o w er s u p p ly c a b le g ro u n d c a si n g s q u ib p y ro te ch n ic e m er g en cy b u tt o n 2 volt and 1 ampere 4 9 9 9 1 9 1 9 circuit breaker 5 9 9 9 1 3 3 9 low resistance 3 3 9 9 1 3 3 9 melting points and even distribution of burning 5 1 1 1 9 3 9 3 long storage time 4 3 1 1 3 9 9 3 high heating value 4 1 1 1 1 9 9 3 high sensitivity value 4 1 9 9 1 9 9 3 final score (level of importance x design characteristic) 115 157 157 77 183 181 159 benchmark performance (%) 44.06 60.15 60.02 29.05 70.11 69.35 60.9 priority scale 6 4 5 7 1 2 3 dss vol. 3, january 2022, pp.130-133 133 avoid from malfunctions. the results show that the instruments that need to be studied more are the squib, pyrotechnics, emergency button, ground system and wiring system. 4. conclusions analysis of importance priority to be studied on the igniter system of 450 caliber x rocket has been conducted, the results of the identification of the need for an igniter system for the x rocket were carried out with a list of requirements, to ensure that no required requirements were missed. the results obtained in the form of user requirements data which includes squib with a final score of 183 with a benchmark performance value (bp) of 70.11%, pyrotechnics with a final score of 181 and a bp value of 69.35%, emergency button with a final score of 159 and a bp value of 60.9%, cables with a final score of 157 with a bp value of 60.15%, ground with a final score of 157 with a bp value of 60.02%, a power supply with a final score of 115 with a bp value of 44.06%, and casing with a final score of 77 with a bp value of 29.05%. the value obtained becomes a reference as an effort in conducting research and development, to avoid the igniter from malfunctions when the system is running. declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. references [1] bppi. k. " indonesian defense white paper", ministry of defense of the republic of indonesia, 2015. [2] ministry of defense of the republic of indonesia, " regulation of the minister of defense, alignment of minimum essential force main components ", 19 (650), 4-35, 2017. [3] a. irfansyah, "conceptual design of the rx-1220 rocket-based air defense missile aerodynamics system", 2020. [4] r. h. triharjanto, a. riyadl, l. marian, i. e. putro, "initial design and development strategy for lapan cruise missiles", lapan journal, 2008. [5] g. samosir, "calculation and design of igniter based on rocket propulsion calculation (case study of rx-320 rocket)", journal of aerospace technology, vol. 9 no. 2, december, 2011. [6] b. r. briody, "electrical current requirements of model rocket igniters", 2000. [7] e. lestariana, "squib as electric ignition wick", journal of aerospace, 9(2), 46-50. 2008. [8] l. cohen, "quality function deployment: how to make qfd work for you", addison-wesley publishing company, boston, 1995. microsoft word azhar.docx issn 2744-1741 defense and security studies original research vol. 3, january 2022, pp.101-105 https://doi.org/10.37868/dss.v3.id208 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 101 concept of military asset management system (mams) in indonesian national armed forces zairullah azhar1*, wahyu sri setiani2, khevinadya ramadhani runtu3, y. h. yogaswara4 1,2,3,4weaponry technology department, faculty of defense technology, republic of indonesia defense university, indonesia *corresponding author e-mail: zairullah.azhar@tp.idu.ac.id1 received nov. 11, 2022 revised dec. 1, 2022 accepted dec. 1, 2022 abstract the internet of things (iot) is a very fast-growing technology and has a huge impact on our daily life, including military performance. in the military, iot known as the internet of military things (iomt) or internet of battlefield things (iobt) has the function create network communication to increase readiness in the military and can apply to all aspects of military asset management and uses the interconnection, real-time, and intelligent innovation of the iot technology to build a military asset management system. the research purpose is to analyze the military asset management system (mams) in indonesian national armed forces. the research applies a qualitative research methodology. the literature review method and the interviews were used to obtain data and analyze to describe or explain the phenomenon of problems with the maintenance, repair, and overhaul (mro) and military asset management system (mams) in supporting the operation of the alutsista indonesian national armed forces. the research result shows that the integration of asset management in the indonesian national armed forces is still not centralized, which it means needs more time to collect material asset data and of course, will impact the readiness of the military. in this case, complex aerial mission simulation (cams) can be a reference for indonesian national armed forces to develop a military asset management system (mams). © the author 2022. published by arda. keywords: military asset management systems (mams), internet of things (iot), complex aerial mission simulation (cams) 1. introduction indonesia as a country with a strategic location is an attraction for other countries with various interests. the influence of the strategic environment, both nationally, regionally, and globally, makes indonesia must always alert to threats that may occur. this situation of course must be a concern, especially in the defense sector. uncertainty of threats that may occur, makes the defense sector must always be ready to deal with them. the readiness and effectiveness of the armed forces are highly dependent on the state of its equipment in terms of availability and reliability [1] one thing that particularly challenging in the defense environment is readiness management because it’s related to the complexity of the weapons systems and large mixed military fleets. efficient fleet maintenance management requires the ability to manage the flow of information between forces to reach readiness. in case to prepare the readiness of the military force, we can take advantage of the use of the internet of things (iot). iot is a concept where an object can the ability in terms of communicating via a network, such as a process of transferring data without any communication process carried out between humans (humans to humans) or between humans to system devices such as computers or a controller. although this concept was dss vol. 3, january 2022, pp.101-105 102 less popular until 1999, iot has been in development for decades. the internet of things or often called iot is an idea where all objects in the real world can communicate with each other as part of an integrated system using the internet network. iot devices consist of sensors as data collection media, internet connections as communication media, and servers as information collectors received by sensors and for analysis. internet of things technology builds the work process of a system that can be wider, the range of reach is also wider, and the data processing and data analysis of a system is also getting better. this iot technology supports the work of the system as a whole including components or elements in terms of facilitating the process of data information flow. in the military, iot is known as the internet of military things (iomt) or the internet of battlefield things (iobt). the purpose of iomt and iobt is to create network communication. internet of military things (iomt) dan internet of battlefield things (iobt) technology is applied to all aspects of military asset management and uses the interconnection, real-time, and intelligent innovation of the iot technology to build a military asset management system. according to the pas-551 [2] standard on asset management from the british standards institute, asset management is defined as: “systematic and coordinated activities and practices through which an organization optimally and sustainably manages its assets and asset systems, their associated performance, risks and expenditures over their life cycles to achieve its organizational strategic plan”. based on this definition, of course in the military, asset management has an important role to develop a list of all the organization’s assets and verify this list with what is in the field. various countries have utilized the internet of military things (iomt) and the internet of battlefield things (iobt) in asset management systems. one of them is the french military through the dassault system developed complex aerial mission simulation (cams)[3]. cams is a dassault-made tool developed for industrial purposes to technical optimization for industrial roadmap choices, operational requirement analysis for export contracts, and product robust and intuitive feedback on studies. cams is a technical and operational simulation tool, that focuses on the mission level and deals with the main mission phases. it's designed to study the global efficiency of an aerial combat system, within credible operational context survivability, lethality, and effectiveness. cams will influence the decision-making related to logistics and deployment, also cams is used to find out what the best weapons will choose for shooting enemy fighter aircraft. the benefit of cams definitely would increase the readiness of the defense force[4]. cams can calculate both the readiness of the material used in war and the strategy and use of weapons that have been calculated and simulated in detail. cams can also serve as military asset management for the french army. cams can also serve as military asset management for the french army. based on current conditions in indonesia. the use of iot technology in the military field is still not felt enough. especially on the asset management system. with the use of technology that has been used in various countries. indonesia can take advantage of iot technology in an asset management system for defense equipment. in this research, references in developing a military asset management system (mams) only focus on cams that have been developed by dassault systems. this research was conducted to describe the conceptual design related to the asset management scheme within the indonesian national armed forces and provide an overview of how the military asset management system is implemented in the indonesian national armed forces. 2. research method the research was conducted by applying a qualitative research methodology. qualitative research refers to analysis that produces findings obtained through data collected by various means, including interviews, observations, documents or archives, and tests [5] the literature review method and the interviews were used to obtain data and analyze to describe or explain the phenomenon of problems with the maintenance, repair, and overhaul (mro) and military asset management system (mams) in supporting the operation of the alutsista indonesian national armed forces. interviews were applied to obtain information directly. in this study, the informants interviewed by the researchers are the director of dgt of dassault aviation. the informant will be asked for their opinion regarding the complex aerial mission simulation (cams). furthermore, other informants will be asked for their opinion regarding the maintenance, repair, and overhaul (mro) and military asset management system (mams) in the indonesian national armed forces, representative of the indonesian army, the indonesian navy, and the indonesian air force. dss vol. 3, january 2022, pp.101-105 103 meanwhile, literature studies were applied referring to the maintenance, repair, and overhaul (mro) system in the indonesian national armed forces. literature studies are carried out by reviewing previous research journals and then reviewing and discussing them. the results and discussion were obtained by collecting various data from references to the results of interviews and relevant journal reviews. furthermore, the concept implementation of the military asset management system (mams) was made, and then the mams can help the indonesian national armed force in carrying out its operational duties. 3. results and discussion military asset management system (mams) is needed to calculate and analyses what military strength is if one day there is a war. the command operation can find out how many materials are ready to use and not suitable for use in real time. military asset management systems (mams) are directly related to inventory management, mro management, and predictive maintenance analysis. the diagram of military asset management can be seen below in figure 1. figure 1. diagram military asset management in the current condition of the indonesian national armed forces, asset management is still not centralized, so it takes time to collect material asset data. this can hinder the analysis of military strength. military asset management systems (mams) are needed that are integrated between units and can be monitored in real time. not only material assets that are ready to be used, but can monitor assets that are under maintenance. the maintenance system is carried out in each force. the material maintenance system in the indonesian army is arranged in stages and tiers based on the level of material maintenance and the level of the implementing unit for the material maintenance task. material maintenance as maintenance and prevention or organic maintenance is carried out by the unit using the material. furthermore, maintenance at the field level is carried out by the maintenance unit at the military regiment command (korem) level, namely the field workshop (benglap). maintenance at the regional level is the responsibility of the regional workshop (bengrah) which is the maintenance unit at the kodam level. the highest level of maintenance, namely maintenance at the central level, is carried out by the central workshop and equipment (bengpuspal) [6]. in the navy, maintenance is carried out in stages. where is the organic level maintenance (harnik) which is supported by the ability of the crew, materials, and equipment on board. maintenance of the medium level (harmen) of this stage of difficulty requires the ability of experts, materials, and equipment on board so that it must be supported by the warship maintenance and repair facility (fasharkan). maintenance at the depot level (hardepo) with difficulty levels increasingly requires the assistance of foreign workers, spare parts, and materials that are not supported by the warship maintenance and repair facility (fasharkan) so it needs to be dss vol. 3, january 2022, pp.101-105 104 carried out by the shipyard and in increasing operational capabilities in the context of extending the service life based on the results of the study. enhanced capabilities include modernization (when the ship is in the program's life cycle period) and life of use (when the ship has exceeded its life cycle). this maintenance phase is carried out by the warship maintenance and repair facility (fasharkan), national shipyard (galkapnas), and maritime service industry (injasmar) [7]. the material maintenance system in the indonesian air force is carried out by the air force material maintenance command (koharmatau). the koharmatau has the task of preparing and carrying out the maintenance of the indonesian air force alutsista to support operations and training activities. in carrying out its duties and functions, the koharmatau has maintenance depots as implementing units, namely the maintenance depot (depohar) 10, depohar 20, depohar 30, depohar 40, depohar 50, depohar 60, and depohar 70. depohar functions as the implementing unit for the koharmatau or is directly domiciled under the commander of the koharmatau. each of these depohars is tasked with carrying out corrective and restorative maintenance, material production, and supplying the level of supplies for weapons, guided missiles, ammunition/explosives as well as carrying out the demolition of weapons and ammunition/explosives. in carrying out its duties, maintenance depot (depohar) is assisted by several maintenance units including the maintenance unit [8]. current conditions, material data that is in a condition of maintenance and care is still in written form. not yet in the form of an integrated system with each other. to improve this, the implementation of the military asset management system (mams) is very important. data related to material maintenance and care is input by the maintenance and maintenance implementing unit, both at the organic, middle, and upper levels. the module diagram concept of the military asset management system can be seen below in figure 2. figure 2. concept military asset management system data retrieval is carried out in each force where maintenance data are taken from organic, intermediate, and depot units. it is centralized in the maintenance command database. as for asset management data, it is taken from the operation unit and centralized in the main command database. data that has been centralized on the maintenance and operation command is centralized back to the headquarters database of each force. furthermore, it is centralized in the server of the military asset management system. in the centralized database and management system, there is some information such as mro management, asset database, inventory management, and predictive maintenance analysis. the input data is in the form of field reports and data logging so that the data can be monitored. the military asset management server is dss vol. 3, january 2022, pp.101-105 105 located at the tni headquarters and the data is protected because the data contains strategic data, so we need a good data security system so as not to get hacked. data that has been centralized in the military asset management system can be directly monitored in realtime so that if a strength analysis is needed at any time, it can be done quickly and accurately because the data used is real-time data. so, the military asset management system (mams), can help the indonesian national armed forces in carrying out its operational duties. 4. conclusions the integration of asset management in the indonesian national armed forces is still not centralized, which means needs more time to collect material asset data and of course, will impact the readiness of the military. military asset management system (mams) is an integrated system both in the indonesian navy, indonesian army, and indonesian air force which contains data on assets in the form of weapons, tanks, planes, ships, and other platforms. also, military asset management system contains the conditions for the platform and this is only used internally to prepare strength readiness. the equipment asset management system under the iot technology has the advantages of a large amount of information, comprehensive interoperability, and high data processing efficiency. the real-time query of data, real-time reports, and performance evaluation automatically generate a comprehensive and dynamic monitoring system for the military. in this case, complex aerial mission simulation (cams) can be a reference for indonesian national armed forces to develop a military asset management system (mams). acknowledgments the author would like to thank the committee of the overseas study program 2022 from the defense technology faculty of the republic of indonesia defense for their facilitation in team formation, data search, and encouragement to publish this paper. declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. references [1] p. perera, s. nanayakkara, and a. perera, “application of proper asset management methodology and technology in defence sector of sri lanka”, international conference on advances in computer science, electronics and communication technologies, pp. 33–41, 2014. [2] british standards institute, british standards institution’s publicly available specification for the optimised management of physical assets, the institution of asset management, united kingdom, 2011. [3] joel rode, “tactical preparation mission system,” dassault system, france, 2022. [4] faculty of defense technology, “results of overseas study program,” republic of indonesian defense university, jakarta, 2022. [5] anselm strauss, juliet corbin, dasar dasar penelitian kualitatif, pustaka pelajar, yogyakarta, 2003. [6] u. santoso, r. widodo putro, and s. munthe, “the system strategy of material maintenance directorate equipment army (ditpalad) in the modernization defense equipment of indonesian national army (tni ad),”,” jurnal strategi pertahanan darat, vol. 6, no. 1, pp. 91–110, 2020. [7] g. ketut, h. desember, i. nengah putra a, and d. dar, “the strategy of maintenance, repair and overhaul (mro) for the indonesian navy ships to support the readiness of sea operations in fasharkan lantamal v surabaya,” jurnal teknologi daya gerak, vol. 3, no. 2, pp. 96–114, 2020. [8] m. kemalsyah, d. a. dadang, and p. strategi pertahanan udara fakultas strategi pertahanan, “the influence of soldiers professionalism and maintenance facilities on operational readiness of fighter missile in the 65 maintenance unit 60 maintenance depot madiun”, jurnal strategi pertahanan udara, vol. 6, no. 1, pp. 1–20, 2020. microsoft word popravljeno.docx issn 2744-1741 defense and security studies original research vol. 4, january 2023, pp.8-14 https://doi.org/10.37868/dss.v4.id222 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 8 potential of natural fiber composite materials for bulletproof vest applications ilham rizqi aminudin1*, sovian aritonang2 1,2 the republic of indonesia defense university, faculty of defense technology, motion power technology, indonesia. *corresponding author e-mail: ilham.aminudin@tp.idu.ac.id received jan. 7, 2023 revised jan. 12, 2023 accepted feb. 21, 2023 abstract the bulletproof vest material that is often used is a composite material. composites are a mixture of two or more material elements, with different mechanical properties, which aim to obtain new materials that have better mechanical properties than the constituent materials. one alternative mixture of materials in composite materials is to use natural fibers as a substitute for kevlar fibers. in indonesia, which has a tropical climate, natural fibers are very easy to obtain from various kinds of plants found in indonesia. along with the many plants obtained, a lot of waste is also produced because of this. so research was conducted on the utilization of the potential of natural fibers for alternative composites. with the experimental method, from the results of the experiment, the results obtained from the five natural fibers that have been discussed, namely pineapple leaf fiber, water hyacinth fiber, bark fiber, hemp fiber, and bamboo fiber, only pineapple leaf fiber has not met the national institute of justice (nij) standard, while the other four natural fibers have met the nij standard for bulletproof vests. © the author 2023. published by arda. keywords: natural fiber; composite for bulletproof vest; mechanical properties; ballistic test; composite alternatives 1. introduction one of the needs of indonesian national armed forces (tni) personnel in the battlefield in addition to weapons to fight, tni personnel also need personal protective equipment, one of the personal protective equipment that is often used on the battlefield is a bulletproof vest. inside the bulletproof vest, there is a material coating the body that aims to reduce the amount of kinetic energy generated due to projectile penetration [1]. the bulletproof vest material that is often used is a composite material. composites are a mixture of two or more material elements, with different mechanical properties, which aim to obtain new materials that have better mechanical properties than the constituent materials. mechanical properties that can be improved are strength, flexibility, and low density [2]. composites also have their advantages when compared to other alternative materials, such as being stronger, lighter, economical, and environmentally friendly [3]. one of the alternative mixture materials in composite materials is to use natural fibers as a substitute for kevlar fibers. in indonesia, which has a tropical climate, natural fibers are very easy to obtain from various kinds of plants found in indonesia. along with the many plants obtained, a lot of waste is also produced because of this. nisa's research [4] explained the potential to recycle natural materials for composite mixtures in body armor applications. from this research, it is known that various kinds of natural materials can be utilized as waste to be used as an alternative composite for bulletproof vest applications. dss vol. 4, january 2023, pp.8-14 9 2. research method this research focuses on descriptive qualitative research collecting existing experimental results and concluding what is the best result to be applied to bulletproof vests, while the natural materials to be discussed include bamboo fiber, hemp fiber, bark fiber, water hyacinth fiber, pineapple leaf fiber. for mechanical testing the standard used is astm and in ballistic tests using the national institute of justice (nij) 0108.01 ballistic resistant protective materials and nij 0101.06 armor protection levels standards. table 1. nij standard ballistic protection [1,13] level nij standard test bullets bullets mass (g) velocity (m/s) i 0108.01 22 lrhv lead 2.6 320 0108.01 38 special rn lead 10.2 259 iia 0101.06 9mm fmj rn 8.0 373 0101.06 0.40 s & w fmj rn 11.7 352 ii 0101.06 9mm fmj rn 8.0 398 0101.06 0.357 magnum jsp 10.0 436 iiia 0101.06 0.357 sig fmj fn 8.1 448 0101.06 0.44 magnum sjhp 15.6 436 iii 0101.06 7.62mm nato fmj 9.6 847 iv 0101.06 0.30 calibre m2 ap 10.8 878 3. results and discussion results and discussion of the research that has been carried out, using experimental methods with mechanical tests and ballistic tests. 3.1 pineapple leaf fiber (plf) one of the plants that thrive in indonesia is pineapple fruit, the selling value of pineapple fruit in indonesia is also very good, besides that, pineapple leaf waste has no selling value, so it can be called waste. the use of pineapple leaves itself has been much done, such as the use of pineapple leaf fibers for composite material mixtures. like the research conducted by rahmatullah, et al (2021) [5] in this study, particle composites composed of epoxy with reinforcement in the form of hollow glass microsphere (hgm) and pineapple leaf fibers were used. the same percentage of matrix volume ratio and fiber, namely pineapple fiber 10%, epoxy resin 74% and hgm 16%, using a size of 15x15x2cm3, with thickness variations of 10 mm, 15 mm, and 20 mm. with nij standard level iia testing standards for test ammunition of 9 mm fmj, nominal bullet mass of 8.0 g, minimum required bullet of velocity 365 m/s. table 2. mechanical properties of pineapple leaf fiber [6,15] properties tensile strength (mpa) elongation (%) young’s modulus(gpa) hardness (hb) pineapple leaf fiber 126.60 2.2 4.405 20.41 from the test results of the test specimens in figure 1 with thicknesses of 10 mm, 15 mm and 20 mm, the results show that the bullet can penetrate the specimen with penetration depth values of 58 mm, 10 mm and 4 mm, respectively. according to the nij 0101.06 standard, the bulletproof vest failure criteria seen from the penetration aspect should not exceed the thickness of the vest or should not penetrate the vest. it is concluded that pineapple leaf fiber still cannot meet the criteria to become an alternative material for bulletproof vests. dss vol. 4, january 2023, pp.8-14 10 figure 1. ballistic testing results (a) 10mm thickness (b) 15mm thickness (c) 20mm thickness [5] 3.2 water hyacinth fiber (whf) water hyacinth is a difficult-to-control aquatic weed that can live in rivers, swamps, and lakes. one alternative to utilizing it is as a composite material. in hanafi’s research (2020) [3] water hyacinth is utilized as an alternative material for bulletproof vest composites. this research uses a volume fraction of 30% fiber, 70% polyester, and a mold with a size of 15 x 15 cm thickness of 10 mm. the ballistic test used a 4.5 mm caliber angina rifle with a shooting distance of 5 m. there are 2 variations used, namely specimen 1 unidirectional and layered fiber arrangement, and specimen 2 vertical and horizontal layered fiber arrangement. tabel 3. mechanical properties of water hyacinth fiber [7,14] properties tensile strength (mpa) elongation (%) young’s modulus (gpa) hardness (hb) water hyacinth fiber 11.4 40.2 0.443 133 figure 2. (a) vertical directional arrangement (b) vertical and horizontal multi-layered arrangement [3] dss vol. 4, january 2023, pp.8-14 11 the results of ballistic testing on the test specimens, specimen 1 and specimen 2 have a panel condition that is not penetrated by bullets at a speed of 229.81 m/s at a distance of 5 m with a caliber of 4.5 mm. from these results, specimens 1 and 2 are included in the nij 0108.01 level i standard. 3.3 bark fiber similar to the previous salak is one of the fruits with high selling value in indonesia, along with the salak fronds that are produced from each harvest into waste that has no selling value. one way to overcome this is by utilizing it as an alternative composite material for bulletproof vests. as in kamal's research (2021) [8] this research uses volume fractions with specimen 1: 70% resin, 20% kevlar, 10% filler silicon carbide (sic), silicon carbide (sic) is a compound of silicon and carbon that when joined together forms an extremely hard ceramic that is widely used for applications that require high durability, such as car brakes, car clutches, and bulletproof vests, specimen 2: 70% resin, 10% filler (sic), 10% salak frond fiber, 10% kevlar, specimen 3: 70% resin, 10% filler (sic), 10% salak frond fiber, 10% kevlar and al 7075. for ballistic tests using nij standard 0101.06 level iia and ii with distances of 5 m, 10 m, 25 m, and 30 m, with a firing speed of 373 m/s at a distance of 25 m, and 398 m/s at a distance of 5 m. tabel 4. mechanical properties of bark fiber [8] properties tensile strength (mpa) elongation (%) young’s modulus (gpa) hardness (hb) bark fiber 21.46 0.12 0.198 19.64 figure 3. specimen ballistic testing [8] the results of ballistic testing of specimen 1 with a distance of 5 m and 10 m bullets penetrated the test specimen, while at a distance of 25 m and 30 m, the bullets fired did not penetrate the test specimen. it can be said that specimen 1 meets the nij level iia standard. for specimen 2 from all testing distances the bullet successfully penetrated the test specimen, it can be said that specimen 2 does not meet the nij level iia standard. as for specimen 3 at all distances the bullet did not penetrate the test specimen, so it can be said that specimen 3 meets the nij level iia and ii standards. it can be concluded that specimen 1: 70% resin, 10% filler silicon carbide (sic) and 20% kevlar, complies with standard nij level iia and specimen 3: 70% resin, 10% filler (sic), 10% salak frond fiber, 10% kevlar and al 7075, meets standard nij level iia and ii. 3.4 hemp fiber one of the basic ingredients of bulletproof vests is glass fiber. in indonesia glass fiber material is still obtained from abroad. to minimize imported materials to reduce costs and increase, one way to find materials to replace glass fiber with minimal costs but with the same function, one material that is alternative to glass fiber for bulletproof vests is hemp fiber. hemp fiber is the basic material for making paper and clothing. the advantage of jute fiber compared to glass fiber is that it is more environmentally friendly and affordable. like the research conducted by setyawan (2020) [10] which examined hemp fiber for bulletproof vests. the study used a mixture ratio of 70% epoxy and 30% jute fiber with 4 variations, namely specimen 1 woven, specimen 2 horizontal, specimen 3 random specimens 4 tilted 45o with a specimen size of 20 x 20 cm. for ballistic tests using the nij 0108.01 standard caliber 38, speed 259 m/s with a distance of 10 m. dss vol. 4, january 2023, pp.8-14 12 tabel 5. mechanical properties of hemp fiber [9] properties tensile strength (mpa) elongation (%) young’s modulus (gpa) hardness (hb) hemp fiber 310-750 2-4 20-41 84.6 figure 4. (a) webbing specimen 1 (b) horizontal specimen 2 (c) random specimen 3 (d) sloping specimen 4 [10] figure 5. specimen after ballistic testing [10] the results of ballistic testing using the nij 0108.01 standard includes bullet deformation and whether or not the specimen is penetrated when hit by a bullet. in ballistic testing of the 4 specimens, no bullets penetrated the specimen, with the best result being specimen 1 in the form of webbing. it can be concluded that hemp fiber meets the nij 0108.01 level i standard. 3.5 bamboo fiber the main material in making bulletproof vest material is steel with a high density, so the weight of the bulletproof material is high which causes users to be unable to move freely. composites are materials consisting of two or more elements that have good mechanical properties and low density, so they can be used as an alternative to steel for bulletproof materials. arman (2022) utilizes bamboo fiber as a bulletproof material with a mixed matrix of epoxy resin/hardener and the addition of 20ml ceramic granules, with a 200mm x 100mm x 10mm mold. for ballistic testing using nij standard 0101.06 level iia, with shooting distances of 2 m, 2.5 m, and 3 m. dss vol. 4, january 2023, pp.8-14 13 tabel 6. mechanical properties of hemp fiber bamboo fiber [12] properties tensile strength (mpa) elongation (%) young’s modulus (gpa) hardness (hb) bamboo fiber 206.2 29,2% 13.1 33 figure 5. bamboo fiber specimen after ballistic testing (a) 2 m (b) 2,5 m (c) 3 m [11] from the ballistic test results, it can be seen in figure 5 that none of the bullets penetrated the test specimens, so it can be concluded that the test results have met the nij 01.01.06 standard regarding the depth of ballistic penetration of composite materials. 3.6 discussion from the results of the data that has been obtained from the studies that have been carried out, the five natural fibers used for alternative composites for bulletproof vest applications can be categorized as follows: tabel 7. classification of natural materials based on nij standard properties velocity (m/s) nij level reference pineapple leaf fiber (plf) 365 rahmatullah, et al (2021) water hyacinth fiber (whf) 229.81 i hanafi, et al (2020) bark fiber 398 iia & ii kamal, et al (2021) hemp fiber 259 i setyawan, et al (2020) bamboo fiber 373 iia arman, et al (2022) 4. conclusions from the results of the research and discussion above, it can be concluded that the use of natural fibers for alternative composites has been widely carried out to minimize the waste produced, at the same time natural materials for alternative composites are cheaper and environmentally friendly. of the five natural fibers that have been discussed, namely pineapple leaf fiber, water hyacinth fiber, salak frond fiber, hemp fiber, and bamboo fiber, only pineapple leaf fiber has not met the nij standard, while the other four natural fibers have met the nij standard for bulletproof vest. so that it can be applied to composite materials for making bulletproof vests for indonesian national armed forces (tni) personnel. dss vol. 4, january 2023, pp.8-14 14 declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. references [1] standard nij-0101.04, "armor protection levels", u.s. department of justice, national institute of justice, 2000. [2] a. risky, r. efendi, "initial study of bamboo fiber-reinforced composite material with epoxy resin/hardener matrix as bulletproof material", jurnal teknik mesin indonesia, 17.2. 87-92. 2022. [3] b. hanifi, q. iqbal, h. purwanto, i. syafa’at, "effect of variation in water hyacinth (eichhornia crassipes) fiber arrangement with polyester resin as an alternative composite material for bulletproof vest", majalah ilmiah momentum, 2020. [4] l. l. a. nisa, m. te. manawan, "study of the potential development of composite materials reinforced with natural materials to be applied as body armor" jurnal teknologi daya gerak 5.1, pp. 71-82, 2022. [5] g. rahmatullah, b. mutiara, j. rollastin, "experimental study of pineapple leaf fiber reinforced composite materials in ballistic testing", seminar nasional inovasi teknologi terapan, no. 01, 2021. [6] r. m. n. arib, "mechanical properties of pineapple leaf fibre reinforced polypropylene composites", materials & design, pp. 391-396, 2006. [7] m. asrofi, "mechanical properties of a water hyacinth nanofiber cellulose reinforced thermoplastic starch bionanocomposite: effect of ultrasonic vibration during processing", fibers, 2018. [8] k. r. armando, m. a. ghofur, "ballistic test analysis of salak frond fiber composite with epoxy resin and silicon carbide (sic) using vacuum bag method" prosiding seminar nasional sains teknologi dan inovasi indonesia (senastindo), vol. 3, 2021. [9] a. shahzad, "hemp fiber and its composites a review," journal of composite materials, 46 (8), pp. 973-986, 2012. [10] s. r. teguh, s. riyadi, "analysis of hemp fiber structure variation of epoxy matrix composite on ballistic and bending test strength", majalah ilmiah momentum, 16(2), 2020. [11] a. risky, r. efendi, "initial study of bamboo fiber-reinforced composite material with epoxy resin/hardener matrix as bulletproof material," jurnal teknik mesin indonesia 17(2), pp. 87-92, 2022. [12] z. li, c. p. liu, t. yu, "laminate of reformed bamboo and extruded fiber-reinforced cementitious plate", journal of materials in civil engineering, 14(5), pp. 359-365, 2002. [13] standard nij 0108.01, ballistic resistant protective materials, u.s. department of justice, national institute of justice, 1985. [14] n. h. nawal et al, "charpy impact behavior of water hyacinth fiber based polymer composite," journal of material science & manufacturing technology, 2(2), pp. 1-13, 2017. [15] h. sosiati, "characterization of the mechanical features of nanas fiber/epoxic composite with addition of brass fibers and mgo as an alternative material for motorcycle brake shamps," undergraduate thesis, universitas muhammadiyah yogyakarta, 2018. [16] a. b. prabowo, "analysis of the effect of hemp and fiberglass fiber with brass (cu-zn) grain variations mesh 40, 50, 60 on the hardness, wear, and coefficient of friction of brake linings”, dissertation, universitas muhammadiyah surakarta, 2019. [17] a. gupta, "effect of different parameters on mechanical and erosion wear behavior of bamboo fiber reinforced epoxy composites" international journal of polymer science, 2011. microsoft word 1-7_216.docx issn 2744-1741 defense and security studies original research vol. 4, january 2023, pp.1-7 https://doi.org/10.37868/dss.v4.id216 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 1 analysis of spbe and swcsf measurement instruments using flesch reading ease for state security meylia susiana dewi putri1*, rudy ag gultom2, achmad farid wadjdi3 1,2,3 republic of indonesia defense university, faculty of defense technology, indonesia *corresponding author e-mail: meylia.putri@idu.ac.id received dec. 8, 2022 revised jan. 3, 2023 accepted jan. 7, 2023 abstract the world has transitioned into a digital era where both individuals and governments require technology and the internet. the number of cybercrimes perpetrated online is impacted by the rising usage of computers and the internet. a measurement instrument that can stop cybercrime is necessary. the six-ware cyber security framework (swcsf) and the electronic-based government system (spbe) are two measurement tools that are expected to be able to stop cybercrime from happening in an agency or organization. but are all people able to use these two instruments? this research was conducted to answer this question by analyzing readability on the spbe and swcsf instruments using the flesch reading ease method. the result show that the two instruments were extremely difficult for respondents of all grade levels to comprehend, with the exception of those at the university level or individuals who worked with computers, the internet, and other technologies. © the author 2023. published by arda. keywords: spbe; swcsf; measurement instrument; flesch reading ease; digitalization 1. introduction the industrial revolution 4.0 has affected all disciplines, including the sphere of information and technology, and indonesia, which is entering it, appears to have developed a strategy to prepare for it (science and technology). the indonesian people have adopted this transition as a trend and way of life. the industrial revolution era's legacy includes society's growing reliance on information and communication technology. the digital era is one example of how technology and information have advanced. the digital revolution has arrived in indonesia, where information can now be found online and through websites. this is seen in the rising and increasingly sophisticated demand for technological devices. the transformation of traditional government into electronic government (e-government) is a public policy regulated in article 28f of the 1945 constitution. the development of e-government has a vision, namely a review based on broadband networks, electronic document systems, information sharing, and government portal websites. the indonesian government is currently developing an electronic-based government system [1]. the use of e-government in indonesia aims to improve performance and productivity, improve budget efficiency, and increase transparency and accountability in the delivery of service activities to the community [2]. therefore, the implementation of e-government in government must be carefully prepared and integrated between bureaucratic systems and policies so that they can be well received by service users, namely the dss vol. 4, january 2023, pp.1-7 2 community and internal government. in the context of e-government, user trust in using public services is important because it can make people feel comfortable using e-government [3]. the development of e-government that utilizes information and communication technology (ict) must pay attention to the ict and cybersecurity policies applied. in the current era, the development of ict and digitalization is directly proportional to the increase in ict crimes and cybercrimes. based on a report from [4], indonesia accounts for 40% of the asean population with a gross domestic product proportion of around us$ 4,174.9. indonesia is estimated to spend 1.6% of gdp in digital infrastructure, compared to malaysia at 4.5% and singapore at 6.6%. this shows that there is room to accelerate cybersecurity in indonesia. a new challenge to the system is brought about by the growth of the government's computerized system. akhmad toha (2021), deputy for bssn protection, stated at the huawei techday event that in order to realize an accountable, transparent, and democratic government system, the governance of an electronic-based government system (spbe) must be supported by strong cyber security. cyber attacks can cause disruption and damage to network systems that connect, integrate, synchronize, and control computerized and integrated government equipment and infrastructure [5]. in 2019, indonesia was one of the countries with the highest recorded cases of malware attacks in the asia pacific region. the potential economic loss in indonesia due to cybersecurity incidents could reach us$ 34.2 billion [6]. these problems can be prevented by measuring the level of cyber security and information and communication technology using measurement instruments. two measurement tools that make use of information and communication technology (ict) resources that can be employed in the central and regional domains are the spbe and swcsf. the authority for ict development focuses on the balance of central and local authority, alignment of planning, and coordination of implementation. currently, indonesia is experiencing the covid-19 pandemic, which has changed the system from manual to digital [1]. changing systems requires building skills within the organization with the aim of helping them cope with and adapt to new circumstances. therefore, in measuring the progress of implementation and readiness of spbe and swcsf, it is assumed that there will be different results. from this statement, a measurement framework that contains complexity and diversity is needed for all instruments. the application of spbe aims to measure the implementation of national ict policies within an agency. research conducted by gultom et al [5] is the current implementation of swcsf is in defense institutions such as the cyber defense center of the ministry of defense (pushansiber kemhan) and the ministry of defense information data center (ind. pusdatin kemhan). the application of swcsf aims to measure an agency's readiness for cybersecurity. instrument portability is an important part of determining whether a model or measurement system is simple to implement, and it is also related to the effectiveness and efficiency of resource use. portability is the ease with which the instrument is moved from one place to another [7]. portability can be defined as the ease with which the instrument is used by all users. trishadiatmoko [8] used statistical analysis to perform a portability analysis on the spbe instrument. this study was conducted to analyze the portability of the spbe and swcsf measurement instruments. one of the methods to measure the portability of the instrument is by analyzing the readability of the questionnaire that will be distributed to the respondents. 2. research method this research was conducted using qualitative methods with a descriptive analysis approach. this study analyzed the readability of the spbe and swcsf instrument questionnaires using the flesch reading ease. generally, this method is used to analyze the readability of a book, magazine or essay. anita [9] used this method to analyze the readability of grade 12 english textbooks. research data are statements or questions displayed on the questionnaire that will be distributed to respondents. the questionnaire that was distributed was a measurement instrument that was carried out digitally because it was distributed online via a link. this indicates that the analysis using this method is very important to do to find out which categories of respondents are suitable for filling out the spbe and swcsf questionnaires. dss vol. 4, january 2023, pp.1-7 3 the calculation results obtained using flesch reading ease are then matched with the reference table in table 2 to see the categories of the data results. then, the results obtained using the flesch-kincaid grade level will be seen in the reference table (table 1) to see the categories of the data results. table 1. flesch-kincaid grade level categories [10] score notes 90 – 100 comprehensible to the average 11-year-old kid 60 – 70 13to 15-year-old children can understand it with ease 0 – 30 university grads are more likely to understand table 2. flesch reading ease categories [10] raw score difficulty level < 30 very difficult 30 – 50 difficult 50 – 60 fairly difficult 60 – 70 standard 70 – 80 fairly easy 80 – 90 easy 90 – 100 very easy the questionnaire that will be distributed to respondents contains statements and questions regarding indicators from the spbe and swcsf. these questions and statements constitute data that will be analyzed to calculate the readability score and grade level generated by the questionnaire. these questions or statements will be grouped according to the indicators contained in the spbe and swcsf. the flow chart of analysis data can be seen in figure 1. figure 1. data analysis flow 3. results and discussion the electronic based government system (spbe) and six-ware cyber security framework (swcsf) are two measurement instruments that utilize information and communication technology (ict) used in central and regional domains. spbe is used to measure the implementation of national ict policies in agencies. ict policy in an agency must be supported by the agency's readiness for cyber security because, in today's digital era, the use of technology must be supported by knowledge about cybercrime. the swcsf instrument can be make a list of statements for the spbe and swcsf questionnaires count the number of words and sentences in the sample perform reading level analysis using the flesch reading ease formula perform grade level analysis using the flesch-kincaid grade level formula the resulting data is described dss vol. 4, january 2023, pp.1-7 4 used to assess agency readiness for cyber security. the development of ict continues to increase, so the level of cybersecurity needs to be increased. so, it can be said that the two measurement instruments can support each other in preventing cybercrime in today's digital world. table 3. assessment indicators for electronic-based government systems [8] no. indicators 1. governance policy 2. service policy 3. institutional 4. strategy and planning 5. information and communication technology 6. administrative services 7. public service the measurement instruments used in the spbe and swcsf are in the form of a questionnaire consisting of several indicators. the spbe instrument has seven determining indicators in the assessment, which can be seen in table 3, and the swcsf instrument has six determining indicators, which can be seen in table 4. table 4. assessment indicators for six-ware cyber security framework [11] factors defenition indicators brainware human factor security awareness hardware physical computers and peripherals no compromises software operating system and applications no pirated appl. etc. infrastructureware physical and logical network infrastructure no network security breaches, etc firmware document and procedures good bussiness pro-cesses budgetware an estimate of income and expenciture for a set period licences always updated, etc the portability of these two instruments must be taken into account. the portability of an instrument refers to its ease of use by individuals or institutions. in other words, every individual or institution is capable of and understands using the instrument. one of the requirements for a measuring instrument to be considered portable is its readability. spbe and swcsf are instruments in the form of a questionnaire, so what is meant is the readability of the respondents to the statements or questions given. if the statement is easy to read, then the respondent understands the statement. the reading ease measurement uses the flesch reading ease and flesch-kincaid grade level methods. the formula used to calculate it is as follows [12]: 𝐹𝑅𝐸 = 206.835 − 1.015 𝑥 𝐴𝑆𝐿 − 84.6 𝑥 𝐴𝑆𝑊 (1) 𝐹𝐾𝐺𝐿 = 0.39 𝑥 𝐴𝑆𝐿 + 11.8 𝑥 𝐴𝑆𝑊 − 15.59 (2) where : fra: flesch reading ease, fkgl: flesch-kincaid grade level, asl: average sentence length, asw: average number of syllables per word. some examples of statements and questionnaire questions used are "apakah unit kerja anda memiliki kebijakan terkait perencanaan dan penganggaran (rengar) tik?" the sentence consists of 12 words and 33 dss vol. 4, january 2023, pp.1-7 5 syllables. the sentence " menurut saya, instansi perlu adanya peraturan, perjanjian kerjasama dalam menjaga keamanan data dan informasi". the sentence has 14 words and 40 syllables. the data is obtained by counting the number of sentences, words and syllables for each measurement indicator. the results obtained from these data can be seen in table 5 for the spbe instrument and table 6 for the swcsf instrument. table 5. result of spbe instrument indicator number of sentences number of words number of syllables asl (x1) asw (x2) fra (y) fkgl 1 7 78 214 11,14 2,75 -37,12 21,20 2 10 116 340 11,60 2,93 -53,23 23,57 3 2 19 45 9,50 2,37 -3,18 16,06 4 2 22 55 11,00 2,50 -15,83 18,20 5 3 28 74 9,33 2,64 -26,22 19,24 6 7 58 166 8,29 2,86 -43,71 21,41 7 4 43 105 10,75 2,44 -10,66 17,42 average -27,13 19,59 the readability values for the spbe and swcsf instruments are -27,13 and -39,28, respectively. this score falls under the "extremely difficult" category according to table 2. some responders may find it quite challenging to understand the level of understanding required by the distributed questionnaire. table 6. result of swcsf instrument indicator number of words number of syllables number of sentences asl (x1) asw (x2) fra (y) fkgl 1 95 268 8 11,88 2,82 -43,88 22,33 2 58 148 5 11,60 2,55 -20,81 19,04 3 36 95 4 9,00 2,64 -25,55 19,06 4 73 196 5 14,60 2,68 -35,13 21,79 5 71 184 3 23,67 2,59 -36,43 24,22 6 60 173 4 15,00 2,88 -52,32 24,28 7 79 225 3 26,33 2,85 -60,84 28,29 average -39,28 22,72 the results of the flesch-kincaid grade level computation, which used the results of the two instruments, show that this is true. the spbe instrument's score was 19,59, and the swcsf instrument's score was 22,72 as you can see at figure 2. the two scores fall under the "best understood by university graduates" category, according to table 1. the two surveys will be provided to respondents that have a high level of knowledge, and it can be said that they are best suited for those who have completed college. the fkgl value obtained by swcsf is greater than that obtained by spbe. even though the two instruments are in the same category, this indicates that the swcsf instrument is more portable than the spbe. dss vol. 4, january 2023, pp.1-7 6 figure 2. grade level of spbe and swcsf 4. conclusions spbe and swcsf measurement instruments are two important instruments to be used in today's digital era. measuring policies on the use of ict and cybersecurity in an agency or organization is necessary for the prevention of cybercrime. the instruments displayed from spbe and swcsf are in the form of questionnaires, which will be distributed to respondents. thus, the respondent's understanding of the questions or statements in the questionnaire is important. the respondent's understanding begins with the ease with which the respondent reads the questionnaire. according to the results, the respondent's grade level is university level, and both the spbe and swcsf instruments are highly challenging to understand. the spbe and swcsf instruments can be completed by respondents who work with computers, the internet, and other technologies in settings other than higher education. declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. references [1] m. h. muttaqin, t. d. susanto, "the effect of website components on user trust in increasing the interest to use public administration service on e-government website," 2019 international conference on computer science, information technology, and electrical engineering (icomitee), pp. 30-36, 2019. [2] f. novianto, “electronic government development strategies using frameworks cobit 5”, proceeding international conference on science and engineering, vol 3, pp. 263-271, 2020. [3] h. m. al-saghier, m. ford, a.l. nguyen, r. hexel, “conceptualising citizen's trust in e-government: application of q methodology”, electronic journal of e-government, vol. 1, pp. 204-230, 2009. [4] australian cyber security growth network (austcyber), “cyber security opportunities in the asean region,” australian cyber security growth network, canberra, 2019. [5] r. a. gultom, f. a. lestari, c. lahallo, r. n. akbar, “pengembangan teknologi pertahanan berbasis cyber dari sixware cyber framework untuk meningkatkan penyelenggaraan sistem pertahanan negara di kota batam”, int. j. adv. sci. teknologi., vol. 29, pp. 3431-3436, 2020. 19.59 22.72 18 19 20 21 22 23 spbe swcsf g ra de l ev el measurement instrument dss vol. 4, january 2023, pp.1-7 7 [6] l. n. amali, m. r. katili, s. suhada, l. hadjaratie, “the measurement of maturity level of information technology service based on cobit 5 framework”, telkomnika (telecommunication computing electronics and control), 18(1), pp. 133–139, 2020. [7] j. a. mccall, p. k. richards., g. f. walters, “factors in software quality volumes i, ii, and iii”, us rome air development center reports, us department of commerce, usa, 1977. [8] p. trishadiatmoko, a. f. wadjdi, “public policy implementation during pandemic covid: modifying the measurement framework of the electronic-based governance system for various organization levels of indonesia public service broadcasting (tvri)”, ranepa: aapa, 2021. [9] a. firdaus, “the readability level of reading texts in english textbook entitled bahasa inggris for senior high school students grade xii”, unusa, 2020. [10] w. dubay, “smart language: readers, readability, and the grading of text”, costa mesa: impact information, 2006. [11] r. gultom, cyber warfare : sudah siapkah kita menghadapinya?, unhan press: bogor, 2019. [12] n. hikmah, t. o. sanerita, j. t. ignatius, “the readability level of reading texts in the english textbook entitled when english rings a bell for the seventh grade junior high school”, kompetensi: jurnal ilmiah bahasa dan seni, pp. 368-376, 2021. microsoft word 15-21_185.docx issn 2744-1741 defense and security studies original research vol. 3, june 2022, pp.15-21 https://doi.org/10.37868/dss.v3.id185 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 15 perturbed t-shaped patch antenna with slits and a floating metal for 5g. erol terović1*, şehabeddin taha i̇meci2 1, 2 electrical and electronics engineering, faculty of engineering and natural sciences, international university of sarajevo, hrasnicka cesta 15, 71210 ilidza, bosnia and herzegovina *corresponding author e-mail: erolprivate@gmail.com, simeci@ius.edu.ba received mar. 6, 2022 revised jun. 3, 2022 accepted jun. 20, 2022 abstract this research paper highlights the process of designing and simulating a novel antenna. our antenna is meant to be used in 5g applications (sub-6 ghz). simulating and designing was done using the sonnet suites software. the substrate used in our antenna is 1.55mm thick fr-4 substrate, that has a εr of 4.4. the antenna center frequency is 4.06 ghz. at the center frequency, s11 is -39.46 db. furthermore, the antenna has an e-𝜃 of 5.75 db, and e-φ of -9.99 db. this antenna can be used in devices that use 5g technologies. this antenna has the benefit of being cheap to produce, while boasting good performance during operation. © the author 2022. published by arda. keywords: antenna, 5g, fr-4, microstrip, sonnet suites 1. introduction in the past few years, more and more research has been conducted in the field of mm-wave technology, to be employed in 5g systems. due to the elevated interest in 5g, there has been a demand for multi-band minituarized antennas that will serve systems that operate in lower ghz bands (sub 6 ghz). 5g will satisfy the requirements for lower time delays, iot, small size and high data rates [1]. 5g will support faster communications in the mobile department, while at the same time providing a high speed data rate. antennas are needed that can be used for stable and disturbance free communications, while having an improved bandwidth, power, gain and insensitivity to noise. due to this, unique solutions are needed for designing antennas [2]. most modern systems for mobile communication have become widely used after the 2000s. they have progressed at a most rapid pace alongside other technologies over the past three decades. initially it began with the 1g which was analog-based. and then progressed to the fourth generation. the fourth generation is an ip based technology (4g). lte-a (long term evolution advanced) is becoming redundant due to an extreme increase in demand for data, which is caused by a surge in smart devices (iot) [3]. designing a transciever for 5g applications can pose numerous challenges. considering that the antenna is one of the most critical element of a 5g system, therefore it has a crucial role in the determination of the whole performance of the system. there are several requirements for antennas for 5g systems: first and foremost, it has to maintain a small size in order to provide a simple and effortless integration with the frontend. furthermore, keeping the design compact is essential in orfer to make the antenna compatible for array based configurations when dealing with dss vol. 3, june 2022, pp.15-21 16 a mimo architecture [4]. most commonly used of all microstrip patch antennas, are rectangular patch antennas, although circular patch antennas are also commonly used [5]. advantages of microstrip patch antennas include low cost, low profile, low cost, suitable for array implementation etc. however some significant disadvantages include the low gain, narrow bandwidth and relatively large size for low frequencies [6]. microstrip patch antennas are a great option for sub-6 ghz uses, owning to their superb rf and mw characteristics. a patch antenna is essentially a substrate that has one side occupied with a metal conductor and the flip side is consisted of a ground plane made of conductive materials [7]. microstrip patch antennas can be fed using different ways. these ways include a microstrip line feed, coaxial feed, aperture coupled feed and proximity coupling [8]. although, the most commonly used feeding way is microstrip line feeding, due to it’s simple nature. thus, the antenna in this paper will also use a simple microstrip line feed. the antenna was designed in and simulated in sonnet® suites™ program by sonnet software, which is implemented using a method-of-moments (mom) em analysis, which in turn is based on maxwell’s equations [9]. numerous other designs have been proposed by other works, for antennas exist that allow the implementation of dual band capabilities [10], in our case the antenna is a mono band antenna. another paper demonstrates how to implementat a metamaterial inspired antenna [11]. our antenna is a single antenna, but could potentially be implemented in an array configuration, which is demonstrated in a paper which describes a circular array antenna for wlan and 5g applications [12] alongside a paper which explains the process of implementing a miniaturized antenna array for 5g [13]. numerous wideband examples have also been proposed, such as a paper that demonstrates a low-band wideband microstrip antenna for 5g [14]. unlike some designs, such as the uwb patch antenna for sub-6 ghz communications [15] or the wideband small fractal antenna for 5g sub-6-ghz communications [16] which have a defected or partial ground plane, but instead has a full ground plane. we chose fr-4 as the substrate due to its wide availability and low cost, but other authors have used for instance rt/duroid 5880 substrate which has a lower dielectric loss for better bandwidth and higher efficiency [17]. rt/duroid 5880 has a εr of 2.2 which is better compared with the value for fr-4, which is 4.4 [18]. due to the smaller dielectric constant, the bandwidth of the antenna increases because they are inversely proportional [19]. due to inevitable manufacturing errors and tolerances, along with feed line soldering and an inaccurate value of relative dielectric permittivity, if we were to manufacture the antenna, our simulated results would not precisely match up with the experimental ones [20]. the antenna was simulated and iteratively improved by observing the filter parameters in each iteration. 2. research method the final proposed antenna design can be seen in figure 1. in section 3 of this paper, we can read about the iterative process and steps that led us to this final iteration of the design. a stub was added to improve the antenna’s gain. the overall size is 36.5 x 39.75 mm, so it can be said that the antenna is a relatively compact design, with a center frequency of 4.06 ghz, for the simulation the parameters were chosen so the sweep is from 2 to 6 ghz. the cell size for the simulation was 0.25 in both x and y directions. the dielectric thickness is 1.55 mm, with a relative dielectric permittivity of 4.4. the topology of the filter can be seen in figure 1, while the 3d layout of the design is visible below, in figure 2. the design is single sided, with no defected ground plane. the design has been labeled with the letters a to e, along with dimensions. the letters are markers that indicate points of interest for our parametric study, in the section 3, we can see the results of our parametric study, and through them we can see the way the iterative improvement process has worked. dss vol. 3, june 2022, pp.15-21 17 in figure 3 we can see the current density visualization of the antenna. the current is crowded in the center square and l-shaped metals. figure 1. antenna topology figure 2. 3d antenna topology figure 3. current density plot 3. results and discussion figure 4 shows the reflection coefficient graph. the goal was to get the s11 magnitude to be lower or equal to -10 db. can be seen in figure 4. 4.06 ghz is the antenna’s center frequency, with a s11 reflection coefficient of -39.46 db. in figure 5, we can see the polar graph of e-𝜃 (db) and e-φ (db), in red and blue respectively. the requirement was set to be that e-𝜃 should be larger or equal to 5 db, while e-φ lower than or equal to -5 db. dss vol. 3, june 2022, pp.15-21 18 figure 4. graph of s11 reflection parameter figure 5. polar plot for antenna as mentioned previously, the antenna was designed in stages, with each state’s results being used in the next stage, to finally achieve a workable design which has a good balance of size, optimal parameters and complexity. the first parametric study’s results are visible in table 1, the “a” rectangle (for legend, see figure 1.) was incrementally increased in size by 0.5 mm. for each increase (s11) that was in the range of (-10db, infinity) in the antenna center frequency, and near 0 in all other areas. once we have selected the best version, which in this case was the one with length 4 mm. we move on to the next phase, and begin doing the parametric study for rectangle b. dss vol. 3, june 2022, pp.15-21 19 table 1. results of first parametric study for the second parametric study, rectangle b was changed by 0.5 mm. in the end with all parameters considered, the case where the length is 5 mm was chosen, and the process moved on to the next stage. the results are outlined below in table 2. as we can see based on these results, the case that has a rectangle length of 5mm was chosen as the one that will be used in following iterations of the design process. it was chosen because it is the best one, according to the parameters. table 2. results of second parametric study length of rectangle b s11 (db) e-𝜽 (db) e-𝚽 (db) frequency (ghz) 2 -10.28 5.61 -9.53 4.06 2.5 -11.75 5.63 -9.52 4.06 3 -13.39 5.64 -9.5 4.06 3.5 -15.48 5.65 -9.48 4.06 4 -18.55 5.56 -9.48 4.06 4.5 -20.84 5.67 -9.47 4.06 5 -24.24 5.57 -9.47 4.06 5.5 -18.66 5.69 -9.51 4.06 in the third parametric study, we have modified the size of the two side rectangles simultaneously, and the results were measured, this is the first time where some invalid results were obtained, we have a few different cases. for example, for the case where we had the length 12.5 mm, the result is invalid because we had a multiband antenna, with two transmission frequencies, which was not our goal for this paper. the chosen case was 15 mm. table 3 contains the results of this parametric study. table 3. results of third parametric study length of rectangle c s11 (db) e-𝜽 (db) e-𝚽 (db) frequency (ghz) 0 -23.41 5.61 -7.41 4.06 2.5 -24.04 5.63 -7.34 4.06 5 -23.66 5.63 -7.4 4.06 7.5 -23.57 5.63 -7.4 4.06 10 -22.1 -5.57 -6.72 4.06 12.5 not valid two frequencies 15 -39.46 5.75 -9.99 4.06 17.5 -31.31 5.69 -9.12 4.06 20 -22.52 5.62 -8.08 4.06 22.5 -27.38 5.68 -9.58 4.06 25 -37.03 5.69 -9.14 4.06 length of rectangle a s11 (db) e-𝜽 (db) e-𝚽 (db) frequency (ghz) 1 -15.5 5.62 -9.55 4.06 1.5 -13.91 5.62 -9.5 4.06 2 -12 5.61 -9.24 4.06 2.5 -10.15 5.68 -9.98 4.06 3 -12.07 5.67 -9.85 4.06 3.5 -14.71 5.66 -9.69 4.06 4 -16.84 5.66 -9.48 4.06 4.5 -14.38 5.66 -9.21 4.06 5 -10 5.66 -7.26 4.06 dss vol. 3, june 2022, pp.15-21 20 in the fourth parametric study, we have observed the parameter's differences when changing the position of the gap where the d marker is placed. however, this case produced a lot of invalid results, mostly due to s11 being over -10 db. due to the results not being very useful, the previous iteration was left unchanged. the results are visible below in table 4. table 4. results of fourth parametric study length of rectangle d s11 (db) e-𝜽 (db) e-𝚽 (db) frequency (ghz) 4 -10.87 5.39 -8.69 4.22 6 -19.99 5.78 -10.14 4.04 8 invalid 10 -12.38 5.69 -12.18 3.98 12 invalid 14 invalid 16 invalid for the fifth and final parametric study, the gap marked by the letter e was adjusted and the results are visible below in table 5. in this case, the best results overlap with the best result from parametric study 3, therefore nothing changes, and we have our final design. which is the one shown in the figures above. table 5. results of fifth parametric study length of rectangle e s11 (db) e-𝜽 (db) e-𝚽 (db) frequency (ghz) 4.25 -39.46 5.75 -9.99 4.06 5.25 -13.07 5.68 -9.04 4.12 6.25 -10.02 5.56 -7.93 4.16 7.25 -14.97 5.45 7.6 4.22 8.25 -25.62 5.29 -7.15 4.28 9.25 -17.31 5.1 -6.76 4.34 4. conclusions in this paper, we have presented a microstrip patch antenna design, along with designing and simulating it. the antenna shows good performance according to the simulations. alongside this, it is simple, compact, and cheap to manufacture, owning to the relatively low-cost fr-4 substrate. our antenna was simulated within a range of 0 to 6 ghz. several parametric studies have been done regarding the overall antenna shape with the goal of improving the antenna behavior. by changing the geometry incrementally and observing changes, an optimal design was found, and it had the following parameters: the antenna center frequency is 4.06 ghz. at the center frequency, s11 is -39.46 db. furthermore, the antenna has an e-𝜃 of 5.75 db, and e-φ of -9.99 db. 5g technologies are exploding around us, and antennas are a key element in making them work. this paper has demonstrated the procedure behind designing and simulating such an antenna. declaration of competing interest the authors declare that they have no known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. dss vol. 3, june 2022, pp.15-21 21 references [1] s. islam, m. zada, and h. yoo, “low-pass filter based integrated 5g smartphone antenna for sub-6ghz and mm-wave bands,” ieee transactions on antennas and propagation, vol. 69, no. 9, pp. 1–1, 2021, doi: 10.1109/tap.2021.3061012. [2] k. jain and v. s. kushwah, “design and development of dual band antenna for sub-6 frequency band application,” materials today: proceedings, 2021, doi: 10.1016/j.matpr.2021.05.133. [3] m. yerlikaya, s. s. gültekin, and d. uzer, “a novel design of a compact wideband patch antenna for sub6 ghz fifth-generation mobile systems,” international advanced researches and engineering journal, pp. 129–133, aug. 2020, doi: 10.35860/iarej.688973. [4] q. amjad, a. kamran, f. tariq, and r. karim, “design and characterization of a slot based patch antenna for sub-6 ghz 5g applications,” 2019 second international conference on latest trends in electrical engineering and computing technologies (intellect), nov. 2019, doi: 10.1109/intellect47034.2019.8955475. [5] e. balti and b. johnson, “sub-6 ghz microstrip antenna: design and radiation modeling,” ieee transactions on antennas and propagation, jan. 2019. [6] t. olawoye and p. kumar, “a high gain antenna with dgs for sub-6 ghz 5g communications,” mar. 2022. [7] s. s. chakravarthy, n. sarveshwaran, s. sriharini, and m. shanmugapriya, “comparative study on different feeding techniques of rectangular patch antenna,” ieee xplore, pp. 1–6, jul. 2016, doi: 10.1109/wocn.2016.7759032. [8] m. s. iqbal and s. a. w. shah, “design of a compact uwb patch antenna having rectangular parasitic elements for uwb and bluetooth applications,” ieee xplore, pp. 1–6, nov. 2017, doi: 10.1109/in℡lect.2017.8277636. [9] “sonnet suites, high frequency electromagnetic software, user’s guide, release 16, sonnet software, inc., 2018.” [10] a. abhishek and p. suraj, “design of patch antenna for 5g communication at 6 ghz (wrc-23) with wlan application,” 2021 6th international conference for convergence in technology (i2ct), apr. 2021, doi: 10.1109/i2ct51068.2021.9418211. [11] a. a. althuwayb, “enhanced radiation gain and efficiency of a metamaterial‐inspired wideband microstrip antenna using substrate integrated waveguide technology for sub‐6 ghz wireless communication systems,” microwave and optical technology letters, vol. 63, no. 7, pp. 1892–1898, feb. 2021, doi: 10.1002/mop.32825. [12] w.-h. hsu, w.-y. chen, and c.-l. tang, “dual feed vertical polarization circular array antenna for wlan and 5g (sub-6 ghz) small-cell base station applications,” 2019. [13] x. shen, y. liu, l. zhao, g.-l. huang, x. shi, and q. huang, “a miniaturized microstrip antenna array at 5g millimeter-wave band,” ieee antennas and wireless propagation letters, vol. 18, no. 8, pp. 1671– 1675, aug. 2019, doi: 10.1109/lawp.2019.2927460. [14] w. an, y. li, h. fu, j. ma, w. chen, and b. feng, “low-profile and wideband microstrip antenna with stable gain for 5g wireless applications,” ieee antennas and wireless propagation letters, vol. 17, no. 4, pp. 621–624, apr. 2018, doi: 10.1109/lawp.2018.2806369. [15] x. tang et al., “ultra-wideband patch antenna for sub-6 ghz 5g communications,” 2019 international workshop on electromagnetics: applications and student innovation competition (iwem), sep. 2019, doi: 10.1109/iwem.2019.8887933. [16] s. n. r. rizvi et al., “wideband small fractal antenna with simple design strategy for 5g sub-6-ghz wireless communications,” ieee xplore, pp. 1–4, aug. 2021, doi: 10.23919/ursigass51995.2021.9560122. [17] j. colaco and r. lohani, “design and implementation of microstrip patch antenna for 5g applications,” ieee xplore, pp. 682–685, jun. 2020, doi: 10.1109/icces48766.2020.9137921. [18] “rt/duroid® 5880 laminates rogers corporation,” rogerscorp.com. https://rogerscorp.com/advancedelectronics-solutions//rt-duroid-laminates/rt-duroid-5880-laminates (accessed may 29, 2022). [19] d. alvarez outerelo, a. v. alejos, m. garcia sanchez, and m. vera isasa, “microstrip antenna for 5g broadband communications: overview of design issues,” ieee xplore, pp. 2443–2444, jul. 2015, doi: 10.1109/aps.2015.7305610. [20] a. khan and r. nema, “analysis of five different dielectric substrates on microstrip patch antenna,” international journal of computer applications, vol. 55, no. 14, oct. 2012, doi: 10.1.1.244.7807. microsoft word 52-58_186 issn 2744-1741 defense and security studies original research vol. 4, january 2023, pp.52-58 https://doi.org/10.37868/dss.v4.id186 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 52 a 41% bandwidth microstrip patch antenna mehmet yusuf imeci1, s. taha imeci2, ramazan daşbaşı3 1 international university of sarajevo, department of electrical engineering, bosnia and herzegovina 2 fatih sultan mehmet vakıf university, department of electrical and electronics engineering, fatih-i̇stanbul, türkiye 3 yildiz technical university, electronics and communication engineering, türkiye *corresponding author e-mail: mehmedyusufimeci@gmail.com received jul. 14, 2022 revised feb. 20, 2023 accepted feb. 27, 2023 abstract this work contains a wideband ds (defected-ground-structure) microstrip patch antenna. initially, the intention of this work was based on realizing a sub6 ghz 5g microstrip patch antenna, but through many experimentations, we inadvertently stumbled upon a different kind of microstrip patch antenna, namely, an antenna with a substantially wide band. the numeric values of the variables/parameters of this compact, wide-band, microstrip patch antenna, that has a proudly high fabrication tolerance, are as follows: 𝑆 = −10.09 𝑑𝐵, 𝑓𝑟𝑒𝑞𝑢𝑒𝑛𝑐𝑦 = 8.7 𝐺𝐻𝑧, 𝜀 = 2.67 𝑑𝐵, 𝜀 = −2.3 𝑑𝐵. the bandwidth reaches approximately from 6.6 ghz to 10.2 ghz, hence giving this particular design’s bandwidth a proud 41% value. the inspiration for this work came from [11], which posed two symmetrical antennas opposite from one another, whereas this work has produced a singular antenna, with a more circular center, and with other many modified traits. © the author 2023. published by arda. keywords: dgs, microstrip, patch, antenna, wideband, sub-6 ghz, 5g 1. introduction printed patch radiators didn’t really shine in the world of technology until the 1970's, when the wireless data transfer methods in communication systems practically skyrocketed. even though these types of antennas are small and fairly cheaply produced, they still hold the capability of being integratable with rf circuits [1]. for the past about 10 years or so, the dielectric resonators (dr) have quite increasing popularity owing to their practicality [2]. as you, the typical reader of this type of work would probably know, 5g stands for fifth generation mobile network. in a broad sense, explaining it could simply boil down to how its main purpose, is to connect everything together, as far as in the realm of communication systems. [3]. millimeter-wave (mmwave) bands coupled with 5g technology, allows data to be transferred in substantially greater amounts [4]. technologies such as say, today’s cell phones, especially ones which operate below 3 ghz, are used quite a lot in the sub-6 ghz range [5]. dual-band antennas are a lot of times constructed by choosing diferent parts in different band values, and adding them to construct a new part [6]. sub-6 ghz technology with respect to mm-waves not only surpasses physical range, thus covering greater distances, it also poses as a cheaper alternative with the wider bandwidth, which brings a high amount of data transferring capability [7]. high speed and low latency data transfer has become increasingly important as wireless systems got increasingly sophisticated in a relatively short span of time [8]. studies indicate the details on how the antenna’s properties conform to various stub parameters [9]. all in all, microstrip patch antennas are a great companion to be coupled with 5g applications [10]. lots of smartphones in these past years that are to be integrated with 5g, have been posed with wideband antennas that are not only as high as 6 ghz, but they are also as less efficient as 50% [11]. the absolute explosion of the internet of things (iot) and various other wireless technologies in our current era of technological developments, has made it somewhat crucial for newer and better dss vol. 4, january 2023, pp.52-58 53 breakthroughs and technologies to emerge for better inner-adaptability, and 5g is one such example. [12]. there isn’t even a need to state the obvious of the absolutely crucial role of the internet in data transmission in high quantities [13]. sub-6 ghz technology surely helps in this high quantity and high-speed data transfer [14]. omni-directional antennas aren’t particularly the highest range antennas [15]. while a patch antenna is basically a radio antenna which you can easily just mount to a surface. [16]. the microstrip patch antenna finds itself a role in all ranges of mobile communication systems [17]. (5g) technology is definitely on the rise where communication systems are concerned, and this explosive widening of its use happens to be occuring in many nations worldwide. [18]. to fully realize and reap the benefits of 5g technology, small and highly efficient antennas are a must [19]. 5g has substantially reduced latency and many many other benefits with respect to 4g. therefore, 5g is expected to rule the domain it’s present in, for the foreseeable future in our current era where technological developments are at an all-time rise [20]. 2. research method all research for this publication has been made possible with use of sonnet software, which is a simulation tool that is widely popular in microwave circuit analyses. as you can see from the following three figures, (figures 1-3), our microstrip patch antenna design consists mainly of rectangular shapes, with the only exception of the center, which is basically a circle. the metal parts of the design are obviously much smaller than the whole design, as the dimensions are about 1.5 to 4.5 centimeters, while the whole box size is about 24 to 8.5 centimeters. the thickness of the whole design, as it may appear from the 3d view below, looks quite massive, but we remind you that that’s just a close-up zoomed in view of the design, and in reality, with all the layers combined, the whole design is only as thick as about 3 centimeters. as it appears from the simulation results from sonnet software regarding our design (figure 4), our band range starts from about 6.5 ghz, and goes all the way up to a little over 10.2 ghz, and thus, corresponds to a bandwidth value of 41%. it may also be apparent that the lowest point of 𝑆 appears to be just a little below -25 db. 3. results and discussion the dimensions and shape of this antenna design is shown in figure 1, figure 2, and figure 3. figure 1. the top view with dimensions in mm (box not included) figure 2. the 3d view (main part) figure 3. 3d view (complete) dss vol. 4, january 2023, pp.52-58 54 patch antenna main design results of the s-parameters are shown graphically in figure 4. figure 4. the s-parameters graph for the main design one can observe below in (table 1) that when we changed the dielectric constant values starting from 4.3, and going all the way up to 4.5, our frequency and gain results practically didn’t change. the closest result to the original design came when the dielectric constant value was 4.5 (4.4 was the original value). table 1. changing the dielectric constants (main design values in bold) dielectric constant (εr) magnitude (db) frequency (ghz) s11 εθ εφ 4.3 -13.01 2.38 -2.55 8.62 4.35 -13.45 2.35 -2.52 8.58 4.4 -9.79 2.67 -2.3 8.7 4.45 -13.59 2.38 -2.51 8.54 4.5 -12.06 2.51 -2.52 8.64 as it can be seen in the following (table 2) that when we changed the dielectric thicknesses starting from 1.5 mm, and going all the way up to 1.6mm, our frequency and gain results practically didn’t change. the closest result to the original design came when the dielectric thickness value was 1.57 mm (1.55 mm was the original value). table 2. changing the dielectric thicknesses (main design values in bold) dielectric thickness magnitude (db) frequency (ghz) s11 εθ εφ 1.5 -13.56 2.45 -2.41 8.62 1.53 -12.96 2.47 -2.5 8.62 1.55 -9.79 2.67 -2.3 8.7 1.57 -11.64 2.47 -2.56 8.68 1.6 -11.37 2.44 -2.63 8.66 bw = 41% db[s11] patch antenna main design dss vol. 4, january 2023, pp.52-58 55 when we consider the following results (table 3), when we changed the length of the center in the y-axis starting from 14.5 mm, and going all the way up to 15.5 mm, our frequency and gain results again practically didn’t change. the closest result to the original design came when the length of the center in the y-axis was 14.75 mm (15.07 mm was the original value). table 3. changing the length of the center in the y-axis (main design values in bold) the length of the center in the y-axis magnitude (db) frequency (ghz) s11 εθ εφ 14.5 -11.57 2.66 -2.3 8.54 14.75 -10.38 2.72 -2.34 8.64 15.07 -9.79 2.67 -2.3 8.7 15.25 -11.43 2.63 -2.19 8.54 15.5 -11.9 2.57 -2.04 8.5 as it’s apparent from the table below (table 4), when we changed the length of the center in the x-axis starting from 15 mm, and going all the way up to 17 mm, our frequency and gain results once again practically didn’t change. the closest result to the original design came when the length of the center in the x-axis was 15 mm (16 mm was the original value). table 4. changing the length of the center in the x-axis (main design values in bold) the length of the center in the x-axis magnitude (db) frequency (ghz) s11 εθ εφ 15 -12.1 2.5 -2.53 8.66 15.5 -12.11 2.57 -2.42 8.58 16 -9.79 2.67 -2.3 8.7 16.5 -10.91 2.65 -1.9 8.48 17 -10.29 2.58 -1.4 8.38 please refer to the below results (table 5), to see that when we changed the length of the ground in the x-axis starting from 29 mm, and going all the way up to 31 mm, our frequency and gain results once again practically didn’t change, but at 29.5 mm, we had a weird spike in frequency (from 8.68 to 8.74), but the closest result to the original design came when the length of the ground in the x-axis was 30.5 mm and at 31 mm. at 30.5 and 31 mm, the frequencies were the same and 8.68 ghz, which is the same exact frequency with the original design (30 mm was the original value). table 5. changing the length of the ground in the x-axis (main design values in bold) the length of the ground in the x-axis magnitude (db) frequency (ghz) s11 εθ εφ 29 -11.63 2.47 -2.4 8.62 29.5 -11.22 2.45 -2.41 8.74 30 -10.09 2.67 -2.28 8.68 30.5 -12.41 2.48 -2.61 8.68 31 -14.89 2.45 -2.7 8.68 we can refer to the below figure (figure 5) to view the current distribution. the darkest blue, illustrating zero current being distributed, while the darkest red oppositely illustrating the highest amount of current being distributed, note that the colors cause the current distribution to be clearly and vividly represented. this current distribution is specifically illustrating the distribution at 8.7 ghz, which is the original frequency of the design. dss vol. 4, january 2023, pp.52-58 56 figure 5. the current distribution note that in the following two figures (figures 6-7), the gain results of the 8.7 ghz main design are presented. and the main results are 𝜀 = 2.67 𝑑𝐵 (figure 6), and 𝜀 = −2.3 𝑑𝐵 (figure 7). figure 6. the phase angles graph (e-theta) figure 7. the phase angles graph (e-phi) dss vol. 4, january 2023, pp.52-58 57 4. conclusions as it may be obvious from previous reading of this current work, our antenna design with the given characteristics (𝑆 = −10.09 𝑑𝐵, 𝑓𝑟𝑒𝑞𝑢𝑒𝑛𝑐𝑦 = 8.7 𝐺𝐻𝑧, 𝜀 = 2.67 𝑑𝐵, 𝜀 = −2.3 𝑑𝐵), poses a unique and valuable presence in communication systems, at the current era the world resides in. even though the initial intentions of this work were to realize a completely different type of antenna with a fairly dissimilar category (a sub-6 ghz 5g microstrip patch antenna), the beauty of experimentation and the surprises it may offer (like in this case), sometimes delivers a completely different but no less important type of separate technology. parametric studies, where the fabrication tolerances are obviously present, also supports the tangible value and practicality of this 41% bandwidth design of a miniature beast, that despite its puny size, has a pretty far reach (high frequency range). declaration of competing interest the authors declare that they haven’t any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. references [1] a. kapoor, r. mishra, and p. kumar, “wideband miniaturized patch radiator for sub-6 ghz 5g devices,” heliyon, vol. 7, no. 9, p. e07931, 2021. [2] j. iqbal, u. illahi, m. n. m. yasin, m. a. albreem, and m. f. akbar, “bandwidth enhancement by using parasitic patch on dielectric resonator antenna for sub-6 ghz 5g nr bands application,” alex. eng. j., vol. 61, no. 6, pp. 5021–5032, 2022. [3] a. al-gburi, “wideband microstrip patch antenna for sub 6 ghz and 5g applications,” prz. elektrotech., vol. 1, no. 11, pp. 28–31, 2021. [4] d. n. gençoğlan and ş. çolak, “investigation of origami inspired sub-6 ghz accordion monopole antenna for 5g applications,” sak. univ. j. sci., vol. 25, no. 4, pp. 974–983, 2021. [5] m. yerlı̇kaya, s. s. gültekı̇n, and d. uzer, “a novel des gn of a compact wideband patch antenna for sub-6 ghz fifth-generation mobile systems,” international advanced researches and engineering journal, vol. 4, no. 2, pp. 129–133, 2020. [6] w. sun, y. li, l. chang, h. li, x. qin, and h. wang, “dual-band dual-polarized microstrip antenna array using double-layer gridded patches for 5g millimeter-wave applications,” ieee trans. antennas propag., vol. 69, no. 10, pp. 6489–6499, 2021. [7] i. ahmad et al., “design and experimental analysis of multiband compound reconfigurable 5g antenna for sub-6 ghz wireless applications,” wirel. commun. mob. comput., vol. 2021, pp. 1–14, 2021. [8] b. huang, m. li, w. lin, j. zhang, g. zhang, and f. wu, “a compact slotted patch hybridmode antenna for sub-6 ghz communication,” int. j. antennas propag., vol. 2020, pp. 1–8, 2020. [9] b. g. hakanoglu, b. koc, o. sen, h. yalduz, and m. turkmen, “stub loaded patch antenna and a novel method for miniaturization at sub 6 ghz 5g and wi-fi frequencies,” adv. electr. comput. eng., vol. 21, no. 2, pp. 23–32, 2021. [10] t. o. olawoye and p. kumar, “a high gain antenna with dgs for sub-6 ghz 5g communications,” adv. electromagn., vol. 11, no. 1, pp. 41–50, 2022. [11] s. s. al-bawri et al., “broadband sub-6ghz slot-based mimo antenna for 5g nr bands mobile applications,” j. phys. conf. ser., vol. 1962, no. 1, p. 012038, 2021. [12] m. alibakhshikenari et al., “dual-polarized highly folded bowtie antenna with slotted selfgrounded structure for sub-6 ghz 5g applications,” ieee trans. antennas propag., vol. 70, no. 4, pp. 3028–3033, 2022. dss vol. 4, january 2023, pp.52-58 58 [13] r. mishra, r. dandotia, r. mishra, p. kuchhal, and r. pachauri, “srr slotted multiband antenna in sub 6-ghz for futuristic communication,” eai endorsed trans. energy web, p. 165997, 2018. [14] p. jha, s. singh, and r. l. yadava, “wideband sub-6 ghz micro-strip antenna: design and fabrication,” in advances in smart communication and imaging systems, singapore: springer singapore, 2021, pp. 109–115. [15] m. farasat, d. n. thalakotuna, z. hu, and y. yang, “a review on 5g sub-6 ghz base station antenna design challenges,” electronics (basel), vol. 10, no. 16, p. 2000, 2021. [16] t. aathmanesan, “novel slotted hexagonal patch antenna for sub-6 ghz 5g wireless applications.”. [17] a. kapoor, r. mishra, and p. kumar, “compact wideband-printed antenna for sub-6 ghz fifth-generation applications,” int. j. smart sens. intell. syst., vol. 13, no. 1, pp. 1–10, 2020. [18] p. dwivedi and d. sen, “micro-strip antenna design for 5g sub 6 ghz and wi-fi applications,” int. j. sci. res. (raipur). [19] b. tütüncü and m. kösem, “substrate analysis on the design of wide-band antenna for sub-6 ghz 5g communication,” wirel. pers. commun., pp. 1–13, 2022. [20] darwin and sampath, “sub-6 ghz band massive mimo antenna system for variable deployment scenarios in 5g base stations,” research square, 2021. microsoft word 113-120_217.docx issn 2744-1741 defense and security studies original research vol. 3, january 2022, pp.113-120 https://doi.org/10.37868/dss.v3.id217 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 113 biodefense against abrin and ricin as bioterrorism agents (a virtual screening of indonesian plant medicinal properties) leni tria melati1*, timbul siahaan2, i nengah putra apriyanto3 1,2.3 faculty of defense technology, indonesian defense university , indonesia *corresponding author e-mail: leni.melati@tp.idu.ac.id1 received dec. 8., 2022 revised dec. 14., 2022 accepted dec. 21, 2022 abstract because of their high lethality and easy way to produce, abrin and ricin are often used as bioweapons. sources of raw materials for the abrin and ricin manufacture can be found in various regions, especially in tropical countries. those make abrin and ricin have a greater chance to be used as bioterrorism agents. furthermore, abrin and ricin have been classified as class b types of bioweapons used in bioterrorism. in this study, a virtual screening (a bioinformatics method) will be carried out on 100 compounds derived from indonesian plants. thus it can be known, the compounds that have the potential to be used as biodefense agents against abrin and ricin. finally, it is found that there are five compounds that have the best possibility as abrin inhibitors: procyanidin b4, ursolic acid, corilagin, vulgarin, and gliberelic acid. whereas lanuginosine, xylonine, isovitexin, liriodenine, and procyanidin were found to have more potential as biodefense agents against ricin. © the author 2022. published by arda. keywords: abrin; biodefense; bioinformatic; bioweapon; ricin 1. introduction biological weapons are considered to be very detrimental and difficult to control so all forms of manufacture, development, and the usage of bioweapons in war have been prohibited since 1925 in geneva law [1]. even so, there are still several cases of violation of these regulations by certain groups such as terrorists [2]. even today, the use of technology such as genetic engineering provides opportunities for the development of biological weapons to a further level [3]. bioweapons have actually been used for a long time in various forms of biological warfare. it is noted that the use of bioweapons has been started since medieval times. where in 1340, the corpses of horses or other animals affected by the plague were being thrown using a launcher to the enemy groups, so it would cause a widespread of said disease within the enemy troops [1]. this shows how easy it is to develop and use bioweapons, even with only such simple equipment and materials. the usage of biological weapons by terrorists is considered to result in high mortality rates as well as economic, social, and political losses [4]. this is because biological weapons are difficult to detect early on and their spread cannot be completely controlled (except for poisons), and these weapons may even attack the dss vol. 3, january 2022, pp.113-120 114 user himself [1]. according to one of indonesian military observer, bioweapons are widely used because they are cheaper and more effective [5]. one of the bioweapons that are widely used by terrorists is abrin and ricin. abrin and ricin are ribosome-inactivating proteins (rips), which come from the abrus precatorius plant that is easily found in tropical areas, especially in southeast asia [6]. in fact, due to the level of toxicity and ease of preparation, the two toxins are in category b as agents of bioterrorism [7]. in 2011, a militant group in jakarta, indonesia, was found to have attempted to attack the police using ricin. followed in 2019, the indonesian police succeeded in seizing a bomb containing abrin poison from a raid on the largest pro-islamic state terrorist group in indonesia [8]. in regards of these matters, it is necessary to have a strong defense against bioweapons (biodefense) within a country. as the united states (us) learned from the bitter experience, of the bioterrorism case that occurred in 2001, and increased research efforts in the field of biodefense in their country [9]. the drugs discovery process (in this case as biodefense agents) often takes a long time and requires a lot of money. the implementation of bioinformatics (in silico approach) provides a very significant influence in drug development. this approach provides more effective and cheaper process . through an algorithmic simulation, accurate and fast research results can be obtained and only requires a small fee [10]. furthermore, bioinformatic has also been widely applied and closely related to the biodefense [11], bioterrorism, and bioweapon research such as the bioweapon identification, detection (biosensors) development, as well as the development of vaccines and drugs from bioweapons [12]. this research aimed to identify plants derived compounds that commonly found in indonesia as ricin and abrin inhibitors. the identification process is carried out by virtual screening method (bioinformatics procedures) based on molecular docking virtual simulations [12]. 2. research method 2.1. receptor preparation target receptors, namely ricin [13] and abrin [14], were downloaded from http://www.rscb.org/pdb. the target receptor preparation process was carried out using the pymol 2.5 software by schrödinger. the geometry optimization process uses pymol software by . the initial step is the removal of water molecules (h2o) around the receptor, hetero atoms, and natural ligands. next is the addition of gasteiger and hydrogen charges. the receptor and its natural ligand are separated (extract object) and each is stored in pdbqt format. 2.2. inhibitor preparation a list of 100 compounds derived from plants in indonesia can be obtained on following link: http://herbaldb.farmasi.ui.ac.id/v3/. these compounds (inhibitors) can be downloaded from the https://pubchem.ncbi.nlm.nih.gov/ page. the inhibitor compounds were then optimized using openbable gui 3.1.1 software and saved in pdbqt format. so that the ligands can then be used in the virtual screening process. 2.3. virtual screening the virtual screening process is carried out through a simulation process of combining receptors and their inhibitors using the autodock vina software [15]. as a result, the value of binding affinity or the tendency for binding between the ligand and the receptor protein will be obtained. thus it can be determined which compound has the best binding affinity at root mean square deviation (rmsd) 0.0. of all the compounds, 5 compounds that give the best results will be taken to be further visualized and analyzed. 2.4. visualization the virtual screening results were visualized in 3d graphics using pymol 2.5 (by schrödinger) and 2d graphics using ligplot+ version 2.2 (by embl's european bioinformatics institute). furthermore, the results of the visualization can be used for the process of analyzing the inhibitory abilities of the selected compounds. dss vol. 3, january 2022, pp.113-120 115 to assist the analysis process, a binding site prediction of the receptor will be carried out on https://prankweb.cz/. thus, based on the results of 2d visualization, comparisons can be made to find out whether the selected compound binds to the target binding site so that it can be a good competitive inhibitor and thus can be used as abrin or ricin antitoxin. 3. results and discussion indonesia has an abundant amount of natural resources, particularly in the form of plants. some plants can produce secondary metabolomic compounds that have the opportunity to be developed as drugs. the screening process is carried out to filter metabolomic compounds from the database, which have the opportunity to become drug materials based on the virtual computing method [12]. the docking process is based on the binding activity of certain compounds (ligands/inhibitors) on the target protein. protein itself is the basic structure of all living things. knowledge of the proteins that make up an organism and understanding their functions is the basic foundation of molecular biology [16]. for this reason, protein is often used as the main target in drug or therapy development processes. based on the virtual screening results, out of 100 compounds, there are 5 compounds that gave the best binding affinity value at rmsd 0.0. the list of these compounds can be seen in table 1. the binding of each selected ligand to the target protein (ricin and abrin) was then visualized in 2d and 3d using ligplot and pymol software. previously, binding site predictions from ricin and abrin had been carried out, as shown in table 1. based on these predictions, it was possible to compare the 2d visualization results from virtual screening results for further analysis. table 1. binding site prediction results and five compounds that have the best potential as abrin and ricin inhibitors receptor binding site (residue) ligan / inhibitor pubchem id molecule abrin pocket 1 (a_111 a_112 a_113 a_159 a_163 a_164 a_167 a_195 a_196 a_198 a_199 a_244 a_71 a_72 a_74 a_75 a_87 a_89 a_90 a_91) pocket 2 (a_140 a_141 a_144 a_145 a_146 a_151 a_78 a_80 a_83 a_85) pocket 3 (a_170 a_190 a_194 a_219 a_220 a_221 a_236 a_239) 147299 [17] procyanidin b4 64945 [18] ursolic acid 73568 [19] corilagin 94253 [20] vulgarin 6466 [21] gibberellic acid ricin pocket 1 (a_100 a_104 a_120 a_121 a_122 a_123 a_172 a_177 a_180 a_208 a_209 a_211 a_212 a_256 a_258 a_48 a_75 a_78 a_80 a_81 a_82 a_93 a_94 a_95 a_96 a_97) pocket 2 (a_183 a_203 a_207 a_233 a_234 a_235 a_240 a_251) 97622 [22] lanuginosine 160503 [23] xylopine 162350 [24] isovitexin 10144 [25] liriodenine 122738 [26] procyanidine 3.1. virtual screening against abrin based on the results of abrin virtual screening, it is known that procyanidin b4, ursolic acid, corilagin, vulgarin, and gliberelic acid have the best potential as lnhibitor. figure 1 shows the results of the abrin virtual screening 3d visualization in pymol 2.5 (by schrödinger). this results then further processed ligplot + 2.2 (by embl's european bioinformatics institute) to obtain 2d visualization of the virtual screening process that are shown in figure 2. this way we can understand the bonds and interactions that formed between each compound against abrin. dss vol. 3, january 2022, pp.113-120 116 (a) (b) (c) (d) (e) figure 1. 3d visualization in pymol 2.5 (by schrödinger) to show the interaction between abrin and (a) procyanidin b4; (b) ursolic acid; (c) corilagin; (d) vulgarine; and (e) glibberellic acid as virtual screening result using autodock vina. (a) (b) (c) (d) (e) figure 2. 2d visualization in ligplot + 2.2 (by embl's european bioinformatics institute) to show the interaction between abrin and (a) procyanidin b4; (b) ursolic acid; (c) corilagin; (d) vulgarine; and (e) glibberellic acid as virtual screening result using autodock vina. dss vol. 3, january 2022, pp.113-120 117 from previous figures, the procyanidin b4 compound appears to be bound to pocket 3 of the abrin binding site. there are amino acid residues (a) numbered 170, 194, 219, 220, 221, 236, and 239 which are around the procyanidin b4 compound. visualization results also show the formation of hydrogen bonds (green dash) and hydrophobic interactions between the inhibitor and the target receptor (figure 2a). meanwhile, ursolic acid, vulgarin, and gibberellic acid compounds were seen to interact with several amino acids in pocket 1 of the abrin binding site, through hydrophobic interactions and hydrogen bonds (figures 2b, 2d, and 2e). meanwhile, the corilagin compound does not seem to bind to one of the pockets on the binding site of abrin, so there are two possibilities, whether the compound is a non-competitive inhibitor or does not even have the ability to inhibit abrin. 3.2. virtual screening against ricin based on the virtual screening results for ricin, five compounds that had the best potential to be used as ricin inhibitors were obtained. these compounds are lanuginosine, xylonine, isovitexin, liriodenine, and procyanidin. the 3d visualization results (visualized in pymol) of the five compounds with ricin can be seen in figure 3. then the visualization process is continued with ligplot to obtain 2d visualization. in 2d visualization, it was observed that there was a hydrophobic interaction between lanuginosine and ricin compounds. the interaction occurs in pocket 1 of the ricin binding site. it can be observed that several amino acid residues (a) are involved in this interaction, including numbers 80, 81, 82, 93, 94, 121, 122, and 172. likewise with the other four compounds which also interact with ricin in pocket 1 (fig. 4). even the compounds isovitexin and procyanidin, managed to form hydrogen bonds (green dash) with some of the amino acid residues that make up pocket 1 (figures 4c and 4e). the interactions that occur at the pocket binding site on the protein receptors (ricin and abrin) indicate that these compounds have the opportunity to become competitive inhibitors for abrin and ricin. thus these compounds have the opportunity to be used as raw materials and further researched for the development of antitoxins for ricin and abrin, as a form of biodefense effort. (a) (b) (c) (d) (e) figure 3. 3d visualization in pymol 2.5 (by schrödinger) to show the interaction between ricin and (a) lanuginosine; (b) xylopine; (c) isovitexin; (d) liriodenine; and (e) procyanidine, as virtual screening result using autodock vina. dss vol. 3, january 2022, pp.113-120 118 (a) (b) (c) (d) (e) figure 4. 2d visualization in ligplot + 2.2 (by embl's european bioinformatics institute) to show the interaction between ricin and (a) lanuginosine; (b) xylopine; (c) isovitexin; (d) liriodenine; and (e) procyanidine, as virtual screening result using autodock vina. 4. conclusions abrin and ricin are toxic compounds with high level of lethality that can be easily produced, therefore have a great chance to be used as bioweapons in some bioterrorism cases. this study conducted a virtual screening of 100 compounds derived from several plants in indonesia. from this virtual screening process five compound has been found to have the best potential for further research as raw materials for antitoxins against abrin and and another five for ricin. compounds that have the potential as biodefense agents against abrin are procyanidin b4, ursolic acid, corilagin, vulgarin, and gliberelic acid. while the potential compounds to become biodefense agents against ricin include lanuginosine, xylonine, isovitexin, liriodenine, and procyanidin. this research is based on the results of virtual simulations, so it is necessary to carry out further research using other tests to determine the effectiveness of these compounds as biodefense agents against abrin and ricin. declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. dss vol. 3, january 2022, pp.113-120 119 references and citations [1] v. s. georgiev, in national institute of allergy and infectious diseases, nih volume 2, humana press: springer nature switzerland ag, 2009. [2] r. f. lyon, “the covid-19 response has uncovered and increased our vulnerability to biological warfare”, military medicine, vol. 180, no. 7-8, pp. 193-196, 2021. [3] p. k. yadav, “evolving dimension of security: bioterrorism”, unity journal, vol. 3, no. 01, pp. 266-277, 2022. [4] t. chugh, “bioterrorism: clinical and public health aspects of anthrax”, current medicine research and practice, vol. 9, no. 3, pp. 110-111, 2019. [5] y. elyasa, “bioterrorism: the development and its regulations according to the international law”, lampung journal of international law, vol. 3, no. 1, pp. 253-256, 2021. [6] a. godal, s. olnes, a. pihi, “radioimmunoassays of abrin and ricin in blood”, journal of toxicology and environmental health, vol. 8, no. 3, 409-417, 2015. [7] x. bai, c. hu, l. chen et al, “a self-driven microfluidic chip for ricin and abrin detection”, sensors, vol.22, no. 3461, pp. 1-14, 2022. [8] global biodefense staff, “biological terrorism in indonesia”, global biodefense website : https://globalbiodefense.com/headlines/biological-terrorism-in-indonesia/, 2019. [9] g. a. petsko, “biodefense versus bioterrorism”, genome biol vol. 9 no. 108, https://doi.org/10.1186/gb2008-9-8-108, 2008. [10] s. brogi, t. c. ramalho, k. kuca, j. l. medina-franco, m valk, “in silico methods for drug design and discovery”, frontiers in chemistry, vol. 8, no. 612, 2020 [11] j. s. meisel, d. j. nasko, b. brubach, v. cepeda-espinoza, j. chopyk, h. corrada-bravo, et al., “current progress and future opportunities in applications of bioinformatics for biodefense and pathogen detection: report from the winter mid-atlantic microbiome meet-up, college park, md, on january 10 2018”. microbiome, vol. 6, no. 1, 1-10, 2018. [12] r. k. mondal, a. dey, “bioinformatics: past, present and future”, international research journal of modernization in engineering technologyy and science, vol. 04, no. 07, pp. 442-454, 2018. [13] j.h. carra. et al., "fragment-based identification of determinants of conformational and spectroscopic change at the ricin active site", bmc structural biology, vol. 7, no. 1, pp. 1-11, 2007. [14] h. bansia, s. bagaria, a. a. karande, s. ramakumar, "structural basis for neutralization of cytotoxic abrin by monoclonal antibody d6f10." the febs journal, vol. 286, no. 5, pp. 1003-1029, 2019. [15] o. trott, a. j. olson, “autodock vina: improving the speed and accuracy of docking with a new scoring function, efficient optimization and multithreading”, journal of computational chemistry, vol. 31, pp. 455-461, 2010. [16] c. m. v.benítez, h. s. lopes, “ molecular dynamics for simulating the protein folding process using the 3d ab off-lattice model” in brazilian symposium on bioinformatics, pp. 61-72, august 2012. [17] national center for biotechnology information. "pubchem compound summary for cid 147299, procyanidin b4", pubchem, https://pubchem.ncbi.nlm.nih.gov/compound/procyanidin-b4, accessed 10 november, 2022. [18] national center for biotechnology information. "pubchem compound summary for cid 64945, ursolic acid", pubchem, https://pubchem.ncbi.nlm.nih.gov/compound/ursolic-acid, accessed 10 november, 2022. [19] national center for biotechnology information. "pubchem compound summary for cid 73568, corilagin", pubchem, https://pubchem.ncbi.nlm.nih.gov/compound/corilagin, accessed 10 november, 2022. dss vol. 3, january 2022, pp.113-120 120 [20] national center for biotechnology information. "pubchem compound summary for cid 94253, vulgarin", pubchem, https://pubchem.ncbi.nlm.nih.gov/compound/vulgarin, accessed 10 november, 2022. [21] national center for biotechnology information. "pubchem compound summary for cid 6466, gibberellic acid", pubchem, https://pubchem.ncbi.nlm.nih.gov/compound/gibberellic-acid, accessed 10 november, 2022. [22] national center for biotechnology information. "pubchem compound summary for cid 97622, lanuginosine", pubchem, https://pubchem.ncbi.nlm.nih.gov/compound/lanuginosine, accessed 10 november, 2022. [23] national center for biotechnology information. "pubchem compound summary for cid 160503, xylopine", pubchem, https://pubchem.ncbi.nlm.nih.gov/compound/xylopine, accessed 10 november, 2022. [24] national center for biotechnology information. "pubchem compound summary for cid 162350, isovitexin", pubchem, https://pubchem.ncbi.nlm.nih.gov/compound/isovitexin, accessed 10 november, 2022. [25] national center for biotechnology information. "pubchem compound summary for cid 10144, liriodenine", pubchem, https://pubchem.ncbi.nlm.nih.gov/compound/liriodenine, accessed 10 november, 2022. [26] national center for biotechnology information. "pubchem compound summary for cid 122738, procyanidin b2", pubchem, https://pubchem.ncbi.nlm.nih.gov/compound/procyanidin-b2. 10 november, 2022, microsoft word 74-82_203.docx issn 2744-1741 defense and security studies original research vol. 3, january 2022, pp.74-82 https://doi.org/10.37868/dss.v3.id203 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 74 the concept of stealth unmanned combat aerial vehicle (ucav) to support air defense systems opa mustopa1*, romie oktovianus bura2 1,2 faculty of defense technology, indonesia defense university, indonesia *corresponding author e-mail: opa.mustopa@tp.idu.ac.id received oct. 27, 2022 revised nov. 13, 2022 accepted nov. 14, 2022 abstract one platform that is currently highly developed as an air defense technology is the unmanned combat aerial vehicle (ucav) which is a uav system equipped with a weapon system or has combat capabilities. in this study, the ucav concept was developed with the aim of having a stealth or low observability aspect by being shown to have a low radar cross section (rcs) value. and in this paper the ucav model developed is a generic ucav configuration developed by the nato sto/avt-161 task group, namely saccon ucav. the saccon ucav is also goal-oriented typical of low observability with a combination of high agility and high angle of attack (aoa) capabilities. the results of the saccon ucav design were then analyzed by the rcs value using the sbr method using the ansys hfss software. and the results of the rcs calculation show that the saccon ucav model has a low rcs value and the rcs value can be reduced again by shaping the ucav configuration. © the author 2022. published by arda. keywords: unmanned combat aerial vehicle (ucav), stealth technology, radar cross section (rcs), saccon ucav 1. introduction talking about a country's defense system, one of the most important aspects to study is the air defense system. due to the development of the times, defense technology, especially aircraft technology, is also developing. now every country in the world is competing to create a concept of fighter aircraft as a means of national defense in airspace. and one of the air defense technologies that is currently highly developed is the unmanned aerial vehicle (uav). the uav system is an unmanned aircraft flight system that is not manned by humans, which is controlled remotely, either manually or automatically, which consists of unmanned aircraft, payloads, human resources, control systems, data networks, and supporting elements [2]. utilization of the uav system basically can be an appropriate alternative to overcome existing problems, as well as a response to the influence of rapid technological advances, and in line with the implementation of revolution in military affairs (rma), which is aimed at achieving network centric operation or network centricwarfare [7]. the ability of the uav system to carry out surveillance of the national territory by air with its characteristics and advantages, including in terms of flexibility and range, minimized operational risks, and the ability to fly for a relatively long period of time, is a significant consideration for the unmanned aerial vehicle to be able to empowered as a reliable defense equipment to support national defense [8]. the development of the uav system is currently very widely used and is used for various missions such as intelligence, surveillance, reconnaissance and even including uav for attack missions or commonly called dss vol. 3, january 2022, pp.74-82 75 unmanned combat aerial vehicle (ucav) [4]. in carrying out these various missions, the uav/ucav also requires a supporting technology, one of which is stealth technology .technology stealth aims to avoid detection by enemy defense radars, so that the uav/ucav can more freely carry out its mission [9]. 1.1. concept of stealth technology the emergence of stealth is caused by the emergence of major changes in the scope of warfare that bring the application of technological inventions combined with fundamental changes in doctrine, operations and concepts of military organization, which are fundamentally related to the character and way of conducting military operations. this change is generally known as revolution in military affairs (rma) [6]. therefore, major countries are trying to develop weapons as a product of their defense industry by prioritizing the application of advanced technology. in general, the purpose of using this technology is to launch attacks using aircraft in enemy areas without being detected by the air defense radar [1]. to meet the stealth of the aircraft, there are three things that can be minimized, namely: 1. visual aspects, such as eliminating smoke trails, repainting or repainting the aircraft to resemble environment in which the mission is carried out. 2. infrared aspect which reduces the use of after burner. 3. radar aspect, namely reducing the radar cross section (rcs) of the aircraft. low surveillance is felt to be able to increase the probability of a fighter aircraft's success in carrying out its mission because it is able to provide an element of surprise in the opponent's area. in addition, with the existence of low surveillance combat aircraft, it is hoped that the aircraft will be able to have a better life cycle than combat aircraft that have a higher rcs [3]. radar cross section (rcs) is the ability of an object to reflect the radar signal back to the transmitter source. the smaller the rcs value of an object, the more difficult it is for the object to be detected by enemy radar. the advantages of reducing rcs are as follows: 1. reduction of the detection distance from the target or aircraft. 2. a reduction in the search area or search volume of enemy radar will take longer to scan than for the same amount of space . 3. the enemy defense radar will not be able to detect what objects are approaching [5]. therefore, stealth in aircraft is currently being developed with various methods, one of which is by modifying the shape of the aircraft (shaping) and with material technology that can absorb and deflect radar electromagnetic waves or commonly known as the radar absorbing material (ram) method [10]. the following is a graphic illustration of the difference in rcs values on conventional aircraft with aircraft that have stealth. figure 1. graph of comparison of rcs values between conventional aircraft (20 db) and stealth (-10 db) [1]. dss vol. 3, january 2022, pp.74-82 76 it can be seen in the image above that by modifying the shape of the aircraft using stealth technology, the rcs value is much smaller than ordinary conventional aircraft, meaning that the aircraft with stealth technology is able to provide superiority to the effect of enemy radar monitoring range so that it is suitable for use on uav for military missions or in this case for surveillance missions, reconnaissance and even attacks in the new state capital area. 1.2. radar cross section (rcs) radar cross section is the ability of a target to reflect back the radar signal towards the source from the radar transmitter. rcs has units of square meters because rcs shows signature of a target, especially fighter aircraft, because it can be said that rcs also shows the projected area of a metal sphere that will emit a certain amount power towards a target [3, 11]. in the usual rcs analysis, there are two types of cases as shown in figure 2, namely the monostatic where the radar transmitter-receiver is located in one place, or the bistatic where the radar transmitter and receiver are separated at different locations. figure 2. reference rcs concept [11] 2. research method in predicting the rcs value, there are several techniques or methods which are broadly divided into two, namely the exact method and numerical approximation. in this research, the method used is numerical approximate with the help of ansys hfss software. shooting and bouncing ray (sbr) method is an approximation method to calculate the rcs value with high frequency, so that predicting the rcs value on large objects will be more effective because great accuracy can be achieved in high frequency analysis [13, 14]. this sbr method is the latest method in analyzing rcs values based on ray tracing and combines geometric optics (go) and physical optics (po) approaches. the advantage of the sbr method is that it can consider several reflection effects and shadow effects. use of the sbr method requires a scattering analysis (sa) process which is carried out in 3 stages. dss vol. 3, january 2022, pp.74-82 77 figure 3. process of sbr method [12] for analysis, the sbr method still has a weakness because it has not considered the diffraction field at the edges. therefore, ansys hfss v193 software is used. in hfss, sbr is available with advanced diffraction and wave creep physics for increased accuracy. the following is the flow of analysis in predicting the rcs value with the sbr method in the ansys hfss software. figure 4. flowchart of rcs analysis with the sbr method in the ansys hfss software. 3. results and discussion 3.1 unmanned combat aerial vehicle (ucav) design the unmanned combat aerial vehicle (ucav) model used is a generic ucav configuration developed by the nato sto/avt-161 task group, namely saccon ucav. the main reason for choosing this ucav platform is because the geometry of the saccon ucav platform has been designed with stealth requirements which lead the ucav design to the flying wing concept. the basic lambda-shaped geometry of the saccon ucav configuration is also oriented towards the typical goal of low observability with a combination of high agility and high angle of attack (aoa) capabilities, so that in addition to considering low capabilities detected by enemy defense radars, this saccon ucav model was also developed as a realistic ucav concept. the mission parameters and boundary conditions applied to the saccon ucav design are given in table 1 and figure 5 below. table 1. mission parameters and boundary conditions yes dss vol. 3, january 2022, pp.74-82 78 figure 5. design mission of saccon ucav the total payload mass for the ucav is 2000 kg. due to signature requirements, the internal storage must be in one or two payload space. a design range of 3000 km without aerial refueling is considered sufficient as an additional spare time of about 45. with this assumption, an operational radius of 1500 km can be achieved. cruising flights to the target area were carried out at an altitude of 11 km with a rate of mach 0.8. in the target area, the ucav must descend to an altitude of 300 m while maintaining a mach figure of 0.8. during the last kilometers it can even descend to 250m and accelerate to mach 0.9 but due to its fixed outer shape, this is only an optional requirement. to maintain good maneuverability for this ucav flying wing without making it laterally unstable, a stability margin of 2–8% was chosen. furthermore, the typical mission of saccon ucav is given in figure 6 below. figure 6. typical mission of saccon ucav the following is an explanation of the typical saccon ucav mission as follows 1) take-off the aircraft will operate outside the airfield in several friendly areas. the length and distance of the runway to some threshold heights will be limited. this is very important for aircraft carrier operations. 2) climb the aircraft will rise to its cruising altitude, precisely at the edge of the stratosphere (~11,000 m). a high climb rate and low fuel requirement would be desirable. 3) cruise the plane will sail to a roaming location. with speeds just below the mach drag increase rate then long distances and fast sailings are desirable. 4) loiter the aircraft will roam, perhaps at a lower altitude, in an area that can use sensors and possibly use weapons. here long endurance is very important. 5) dash the aircraft will fly towards its target as quickly as possible to deploy weapons and/or gather intelligence. maximum speed here is very important. 6) approach during approach, the aircraft will lose altitude to land. 7) landing the aircraft must be able to slow itself down to landing speed. after landing, he must stop before the end of the runway. dss vol. 3, january 2022, pp.74-82 79 furthermore, to design the saccon ucav platform, it is necessary to determine the design variables and the geometry of the aircraft to be parameterized first. figure 7 below is given the design variables with some assumptions or limitations. figure 7. saccon ucav geometry parameterization then with the help of catia software, a saccon ucav platform design was made based on the variables and parameters that have been previously determined in figure 7 so that the saccon ucav design was obtained as follows figure 8. design of saccon ucav the coordinate system in saccon ucav are given in figure 9 below. figure 9. coordinate system of saccon ucav dss vol. 3, january 2022, pp.74-82 80 3.2 radar cross section (rcs) analysis of saccon ucav in conducting the radar cross section (rcs) analysis to calculate the value approach, it is carried out numerically with the help of the ansys hfss (high frequency structure simulator) 2019 r3 software. to perform the radar cross section (rcs) simulation, the assumption used is that the material used is in the form of perfect electric conductor (pec) which is an ideal material that can restore electromagnetic wave energy perfectly so that it is suitable for simulation of radar cross section (rcs) calculations. then the frequency used is 10 ghz, which includes high-frequency x-band radar with a frequency range of 8-12 ghz. this x-band radar is a type of radar commonly used in the military world to detect military aircraft, including aircraft with stealth technology that are still within the range of this radar. then the threat area used is 90° on the elevation plane and 0° to 360° on the azimuth plane. after these assumptions are inputted, then a setup simulation is carried out using the sbr+ method approach with the type of radar receiver used is a monostatic radar. the following are pictures of the simulation results of the radar cross section (rcs) on the ucav saccon model. figure 10. simulation of rcs linear plot figure 11. 3d rcs plots over the entire surface of the ucav geometry dss vol. 3, january 2022, pp.74-82 81 then from the simulation results above, the calculation of the rcs value can be generated as a result of entering the input in the rcs simulation in the ansys hfss software as follows. tabel 2. calculation of the rcs on the ucav saccon model freq [ghz] i wave theta [deg] i wave phi [deg] monostatic rcs total [db] 10 90 0 -17.8039 10 90 15 -39.4049 10 90 30 -33.3534 10 90 45 -33.5918 10 90 60 -46.8229 10 90 90 -58.5062 10 90 120 -47.3148 10 90 150 -35.1005 10 90 180 -17.7782 10 90 270 -35.4863 10 90 360 -17.8039 from the simulation results and the calculation of the radar cross section (rcs) value above, the average rcs value is -38.9633 db or equivalent to 0,0039 m . this rcs value is quite small for the ucav class in general, so for reconnaissance missions or air defense security this platform is very suitable for use as a defense tool. from the results of the rcs simulation in figure 10 which is a linear plot related to the effect of the incident wave on the azimuth plane to the rcs value, it shows that the rcs value experienced a spike in the graph at several points. these points cause a spike in the rcs value at approximately -5° to 5°, 30° to 45°, 145° to 150°, 210° to 215° and 315° up to 320°. these points are in the azimuth plane which is the point that has the highest rcs value where when viewed on the ucav platform these points are located on the front of the ucav platform or nose, the side of the ucav and on the tail of the ucav. this is what needs to be analyzed in more depth for the shaping technique at the time of the ucav design that in order to reduce the rcs value the things that must be considered and prioritized in shaping are the nose of the ucav, the wings and tail of the ucav. 4. conclusions the unmanned combat aerial vehicle (ucav) model used is a generic ucav configuration developed by the nato sto/avt-161 task group, which is named saccon ucav. the main reason for choosing this ucav platform is because the geometry of the saccon ucav platform has been designed with stealth requirements which lead the ucav design to the flying wing concept. the basic lambda-shaped geometry of the saccon ucav configuration is also oriented towards the typical goal of low observability with a combination of high agility and high angle of attack (aoa) capabilities, so that in addition to considering low capabilities detected by enemy defense radars, this saccon ucav model was also developed as a realistic ucav concept. the results of the saccon ucav design were then analyzed by the rcs value using the sbr method using the ansys hfss software. from the simulation results and the calculation of the radar cross section (rcs) value above, the average rcs value is -38.9633 db or equivalent to 0,0039 m . from the results of the rcs simulation in figure 10 which is a linear plot related to the effect of the incident wave on the azimuth plane to the rcs value, it shows that the rcs value experienced a spike in the graph at several points. these points cause a spike in the rcs value at approximately -5° to 5°, 30° to 45°, 145° to 150°, 210° to 215° and 315° up to 320°. these points are in the azimuth plane which is the point that has the highest rcs value where when viewed on the ucav platform these points are located on the front of the ucav platform or nose, the side or side of the ucav and on the tail of the ucav. this is what needs to be analyzed in more depth for the dss vol. 3, january 2022, pp.74-82 82 shaping technique at the time of the ucav design that in order to reduce the rcs value the things that must be considered and prioritized in shaping are the nose of the ucav, the wings and tail of the ucav. declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. references [1] n. pramadi, radar and stealth, jakarta: pena nusantara, 2019. [2] f. noor, “historiography drone: from military to cinema,” protvf, vol. 4 (02): p. 185-205, 2020. [3] f. purnomo, r. bura, “aerodynamics-radar cross section (rcs) optimization on the cropped delta wing with design of experiments (doe) and multi objective genetic algorithm (moga) methods,” journal of defense and security innovation, vol. 01 (01): p. 38-48, 2018. [4] e. sloan, military transformation and modern warfare, westport: preager security international, 2018. [5] c. m. liersch, k. c. huber, “conceptual design and aerodynamic analyses of a generic ucav configuration,” aiaa aviation, p. 1-17, 2014. [6] l. gupta et al., “survey of important issues in uav communication networks” ieee commun, vol. 18 (01): 1123–1152, 2015. [7] d. lesmana, “military drone application with indonesian alutsista products for over the horizon operations,” proceedings of the indonesian national seminar on science, technology and innovation air force academy, vol. 3, p. 1–10, 2021. [8] a. utama et al., “sejarah penggunaan pesawat terbang tanpa awak (ptta) dalam perang modern dan persiapan militer indonesia,” jurnal pertahanan dan bela negara, vol. 11 (3): p. 167-181, 2021. [9] salunkhe and naikwade, “stealth aircraft technology” international journal of engineering science and computing, vol. 8 (6): p. 18268-18271, 2018. [10] zikidis k., “low observable principles, stealth aircraft and anti-stealth technology,” journal of computations and modelling, vol. 4, no.1, pp. 129-165, 2014. [11] f. knott, eugene, t. tuley, f. shaeffer, radar cross section, 2nd edition, scitech publishing: usa, 2004. [12] j. coppin, aerodynamics-stability and shape optimisation of unmanned combat air vehicle, thesis, university of sheffield, southern yorksire, england, 2014. [13] c. m. liersch et al. “multidisciplinary design and aerodynamic assessment of an agile and highly swept aircraft configuration” ceas aeronaut, p677–694, 2016. [14] d. vicroy et al., “low-speed dynamic wind tunnel test analysis of a generic 53 swept ucav configuration with controls,” aiaa applied aerodynamics conference, 2014. microsoft word 46-51_234.docx issn 2744-1741 defense and security studies original research vol. 4, january 2023, pp.46-51 https://doi.org/10.37868/dss.v4.id234 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 46 force development against irregular and hybrid warfare in indonesia jefferson benyamin1*, much mualim2, editha praditya duarte3 1,2,3 republic of indonesia defense university, faculty of defense management, indonesia *corresponding author e-mail: jeffersonbenyamin@gmail.com received 3.2.2023. revised 22.2.2023. accepted 23.2.2023 abstract the development of national defense is directed to be able to answer various possible threats and actual problems that are adjusted to the geographical conditions and dynamics of the strategic environment. current and future threats are growing very fast and increasingly complex. threats to the state can essentially be classified into three types, namely military threats, both armed and unarmed, non-military threats, and hybrid threats. the threats that have emerged during the co-19 pandemic are irregular warfare and hybrid threats. this research will discuss the analysis of force development to face the threat of irregular warfare and hybrid warfare in indonesia. this research uses a qualitative method with a literature study approach. based on the results of the study, it is concluded that indonesia as a country that has a strategic location and attractiveness of various spectrums needs to always prepare itself by implementing relevant strategies in accordance with the capital already owned in the indonesian nation itself, this is needed to avoid national disunity due to irregular warfare that enters the joints of state life. © the author 2023. published by arda. keywords: development of national defense, irregular warfare, hybrid warfare, indonesia 1. introduction current conditions bring the world no longer in volatility, uncertainty, complexity, ambiguity (vuca) which is characterized by its complexity but in bani which brings disorientation, unpredictability and chaos. bani as an acronym for brittle, anxious, nonlinear and incomprehensible was proposed in early 2020 [2]. furthermore, according to cascio, in articulating an increasingly common situation with volatility or complexity, simple is not enough to understand the situation that occurs. the existing conditions are not only unstable but also chaotic. the shadow of the future is not only difficult to foresee but completely unpredictable. finally, what is happening is not only ambiguous but also incomprehensible. with the existence of bani, every country in the world, especially indonesia, must pay detailed attention to every threat to sovereignty that will occur. as stated by defense minister prabowo subianto in the leadership meeting, the dynamics of a complex strategic environment have the potential to give rise to various forms of threats such as military, non-military and hybrid threats that will threaten national interests, territorial integrity, danger to state sovereignty and the safety of the entire indonesian nation in the future [7]. current and future threats are growing very fast and increasingly complex. threats to the state can essentially be classified into three types, namely military threats, both armed and unarmed, non-military threats, and hybrid threats. threat estimates in the next five years, in accordance with predictions and priorities, within the framework of existing doctrine, these threats are categorized in the form of real and unreal threats [6]. threats that come must be responded to appropriately. whatever the way and whenever the time. the threats dss vol. 4, january 2023, pp.46-51 47 that have emerged during the covid-19 pandemic are irregular warfare [5] and hybrid threats [6]. in this research, the author intends to discuss the development of forces to face irregular warfare and hybrid warfare in indonesia. 2. research method the research method used in this writing is to use data collection methods through literature study [10]. literature study is a series of activities related to library data collection methods, reading and recording, and processing research materials. the stages that must be taken by the author in library research are as follows:  collecting research materials. the material collected is in the form of information or empirical data sourced from books, journals, the results of official and scientific research reports and literature on the conditions for the development of irregular warfare and hybrid warfare in indonesia.  reading library materials. in reading research materials, readers must dig deeply into reading materials so as to find new ideas related to the research title.  making research notes. taking notes on research materials is said to be the most important stage because all the materials that have been read must be drawn to a conclusion in the form of a report.  processing research notes. all materials that have been read are then processed or analyzed to obtain a conclusion that is compiled in the form of a research report. data analysis in this study was carried out through descriptive analysis method, which is defined as an effort to collect and compile data, then analyze the data so as to produce a comprehensive conclusion. 3. results and discussion a. irregular warfare and hybrid warfare irregular warfare is defined as violent conflict between states and non-state actors with the aim of gaining legitimacy and influence in the surrounding society [3]. geopolitical changes in the world that occurred at the end of the 20th century fundamentally altered the security environment and forced western countries to engage in new types of asymmetric military conflicts with non-state actors, terrorist organizations and criminal syndicates. new types of threats, various military conflicts and the search for effective responses require reconsideration, generalization and assessment of the latest military experience and the formulation of theoretical concepts that will help to prepare and operate effectively within the zone of military conflict. this condition led to the formulation and formation of new military theories, including hybrid warfare theory. the hybrid war theory developed by hoffman includes four aspects: conventional forces, irregular tactics, terrorism, and criminal acts in one battle space [8]. this is corroborated by the statement of former tni commander marshal hadi tjahjanto that the most prominent threat in the future is a hybrid threat [9]. hybrid threats are threats that mix military and non-military threats. the development of the industrial revolution 4.0 provides extraordinary benefits, but at the same time it also creates a paradox of threats that utilize industrial revolution 4.0 technology so that in the future war will no longer be dominated by military power alone. war has entered the 4th and 5th generation of warfare, namely asymmetric warfare, proxy warfare, and hybrid warfare. hybrid threats can take many forms, such as cyber threats, biological threats, such as the current covid-19 pandemic, and the threat of inequality. the future warfare model will be those who are able to exploit these threats and create security, and sovereignty. b. irregular warfare and hybrid warfare in indonesia the conditions of irregular warfare in indonesia were explained in great detail during the covid-19 pandemic by prof. indrajit, which consisted of four things [5]:  first, the perception that the government has neglected public safety since the first pandemic signals were seen is repeatedly presented to the public through a number of evidences. official remarks by government officials who were not serious in looking at the pandemic storm in the early days of its presence were framed in such a way and presented repeatedly via the mass media. before the pandemic took place, there were many discourses among political elites and the public that led to a number of tensions. the triggers came from a number of sources. first, the thick and lingering feelings of "hurt" over the process and results of the last presidential election democratic party, where dss vol. 4, january 2023, pp.46-51 48 the two competing camps still cannot forget the past feud. the losing side still feels strongly that they were cheated by their incumbent opponent.  second, there has been a slowdown in growth due to various global trade and economic dynamics due to the fierce competition between the united states and china. the increase in national debt and the increase in imports show the seriousness of the conditions faced by indonesia, which is described as a situation that will be further exacerbated by the pandemic.  third, law enforcement is still considered discriminatory, which is often compared to the phrase "sharp down, blunt up" by some critics. radicals believe that the government uses legal and bureaucratic instruments to "eliminate" its political opponents, especially evident in the pandemic management policy that does not involve "political opponents".  fourth, the political pendulum is moving very dynamically, characterized by the maneuvers of political parties in moving wildly in the face of various rapid environmental changes. the public is confused by this movement so that it is not clear which constellation is "friend, which is foe" in the state and democracy. fifth, the submission of a number of draft laws, either government or parliamentary initiatives, which are considered not in favor of the small people. an example is the omnibus law which is considered to only favor businessmen and the power elite, at the expense of ordinary people or the pancasila ideology bill which has drawn pros and cons everywhere. sixth, there is still a lot of friction between community groups due to various recent issues that are hot to talk about such as: the rise of communism, the caliphate, the concept of secularism, primordialism, and so on [1] and forgetting the common interest in facing a pandemic disaster. in addition, the existence of hybrid warfare is a concern for indonesia in running its life. one of the emerging hybrid wars is cyber warfare. the national cyber and crypto agency data states that in 2019 there were 290 million reported cases of cyber attacks in indonesia. compared to the previous year when cybercrime caused us$34.2 billion in losses in indonesia, this number is 25% more. c. analysis of irregular warfare and hybrid warfare in indonesia the occurrence of irregular warfare in the territory of the republic of indonesia, for the following reasons [5]:  by some, the relentless attacks on the government aim to bring down the legitimate government, by trying to convince the public that the government is not working as it should, and is no longer able to manage the pandemic and save the indonesian economy;  the desire to bring down the regime has also begun to appear with various parties trying to compare the success of the current government with previous regimes that are considered far more successful in managing the country, or comparisons with other countries that have succeeded in driving the pandemic out of their territory;  opinion building in the form of psy wars in various ways is put forward to win the hearts of the public, even to convince them, components that are considered to be respected such as: members of the dpr / mpr, retired military, religious leaders, former state officials, and leaders of mass organizations, who criticize the government's way of handling the pandemic; there are a number of movements that interfere with the power in running the wheels of government, as shown through various activities such as demonstrations, motions of no confidence, opposition declarations, debate challenges, complaints to international courts, and others; and  the imposition of will on power has also begun to be seen by many community groups through approaches such as: threats of mass mobilization, boycotting the implementation of regulations, ignoring enforced health protocols, and other matters. these reasons continue to surface today by presenting a new war in indonesia called irregular warfare. irregular warfare is a challenge for indonesia coupled with hybrid warfare. both must be anticipated by indonesia on the basis of the sovereignty and integrity of the indonesian state. in the context of irregular warfare, the communication approach is important to be carried out continuously and continuously. failure of political communication can trigger the development of irregular warfare in indonesia. in the context of hybrid warfare, indonesia needs to prepare for it as a response to technological developments. efforts to survive cyber operations are important but no less important is the countermeasure of such behavior so that it does not recur in the future. the presence of a cyber army is also a priority that has been launched, one of which is equipping soldiers with capabilities that they are ready to face cyber war [4]. dss vol. 4, january 2023, pp.46-51 49 d. force development in the face of irregular warfare in facing the challenges of irregular warfare that will occur in the future indonesia needs to optimize all its resources, for this reason indonesia as a large nation already has several resources that can be used as resources to face these challenges including: a. capital geography indonesia's geographical position which is located in a cross position of the world, namely between two continents (asia and australia) and two oceans (indian ocean and pacific ocean) has a very strategic meaning in the development of the indonesian state both in terms of economy, politics, socio-culture and defense and security. with this strategic position, indonesia has become an international trade route both by sea and by air. this makes indonesia a country that has the potential to develop the trade and tourism sectors in order to improve the nation's economy. indonesia is also the largest maritime country. in addition, as stipulated in law number 3 of 2022 concerning national defense, the indonesian national defense system is universal in nature, involving all citizens, territories and other national resources including natural resources and artificial resources that are prepared early by the government and held in a total, integrated, directed and continuous manner to uphold state sovereignty, territorial integrity, and the safety of the entire nation from all threats. to become a strong country, the main prerequisite is the country's ability to organize, prepare and use all resources owned for national interests. therefore, it is necessary to manage national resources for national defense including natural resource management. b. demographic capital indonesia currently has a population of 265 million or 3.49% of the world's total population. indonesia is the fourth most populous country in the world after china (1.4 billion people), india (1.3 billion people) and the united states (328 million people). this is one of the supporting factors in national development as well as in efforts to realize national resilience, but it can also be an inhibiting factor if not managed properly in terms of the quality of its human resources. c. local wisdom and pancasila indonesia's indigenous values have proven to be able to accommodate all group interests into a harmonious blend. these values are local wisdom that can bring indonesia to the peak of glory, including the spirit of gotong royong, helping each other, pluralism and ethics. the spirit of gotong royong is the local wisdom of the indonesian people that has existed since our ancestors. the precepts in the pancasila state foundation are powerful guidelines that are timeless. the first precept of belief in one god is a guideline in how we practice our religion. the second precept, fair and civilized humanity, is a guideline in interacting with fellow human beings, both domestically and around the world. the third precept, the unity of indonesia, is a guideline for how we state, our strength in the state is unity, not others. while the fourth precept, "democracy led by wisdom in the deliberation of representatives" is a guideline in democracy. if we carry out all of this well, we will undoubtedly be able to achieve the fifth principle, social justice for all indonesian people. for this reason, all components of the nation must strengthen themselves and unite their determination to return to the original values and local wisdom of the indonesian people and to guide and implement pancasila correctly and fully in every aspect of the life of the nation and state. in addition to the capital already owned in building defense forces will be related to how much the ability to convert national resources owned into an effective instrument of strength. strategies and ways to deal with future wars include: a. ideology development 1. the practice of the ideological pillars of the indonesian state. objectively and subjectively continues to be developed and improved. 2. pancasila as an open ideology needs to continue to be relevant and actualize its instrumental value so that it is still able to guide and direct life in society. 3. the motto of bhineka tunggal ika and the concept of archipelago insight derived from pancasila must continue to be developed and instilled in a plural society. b. political development in the current era of globalization, freedom of information voiced by the press and media must play an active role as a counterweight to power, not otherwise used by the authorities as a tool to perpetuate dss vol. 4, january 2023, pp.46-51 50 power. therefore, national resilience in the political field can be reformulated to create a political institutional system that is more open, transparent, accountable, clean, non-corrupt, involves broad community participation, and is of a service nature. c. economic development 1. the economic system is directed at realizing fair and equitable prosperity and welfare throughout the archipelago through a people's economy. 2. a populist economy should avoid the following:  liberalism system that only benefits strong economic actors.  the system of ethatism kills the potential and creative power of economic units outside the state system. 3. the economic structure is strengthened in a balanced and mutually beneficial manner in harmony and integration between the agricultural and industrial sectors as well as services. 4. economic development which is a joint effort based on the principle of kinship under the supervision of community members motivates and encourages active community participation. 5. equitable development and utilization of its results are always carried out with due regard to the balance and harmony of development between regions and between sectors. 6. the ability to compete must be fostered in a healthy and dynamic manner to maintain and improve the existence and independence of the national economy. d. socio-cultural development 1. recontextualize, dynamize and re-present regional culture creatively, realistically and in line with the times. 2. reviving national culture with an integrative and responsive character for the formation of a dynamic and responsive indonesian nation. 3. national integrity as a guide to national resilience in the field of socio-culture. 4. development of religious life in a tolerant, open and cultured manner. 5. democratic national education to form people of character and culture who are nationalist and responsive to the times. e. defense and security development realizing the condition of the nation's deterrence based on awareness of state defense (patriotism) which contains the ability to maintain the stability of a dynamic state security defense, carry out development and defend state sovereignty by warding off all forms of threats. as illustrated in the indonesian philosophy of war: "the indonesian people love peace, but they love independence more". defense and security must be able to realize preparedness and state defense efforts that contain resilience, ability and strength to ensure the continuity of national development and the survival of the nation and state based on pancasila and the 1945 constitution. 4. conclusions based on the explanation of force development to face the threat of irregular warfare and hybrid warfare in indonesia above, the author draws several conclusions, namely: 1. irregular warfare and hybrid warfare are defined as threats that must be taken seriously by a country that also have an impact on the sovereignty and integrity of a country. 2. the development of irregular warfare threats continues to emerge as an integral part of the covid-19 pandemic. in addition, hybrid warfare also continues to overshadow indonesia with cyber warfare as one of the factual threats. 3. cases of irregular warfare and hybrid warfare in indonesia must be used as a threat projection with careful strategic preparation starting from to shape, to respond, and to prepare both in terms of budget and human resource readiness. 4. indonesia as a country that has a strategic location and attractiveness of various spectrums needs to always prepare itself by implementing relevant strategies in accordance with the capital that is already owned in the indonesian nation itself, this is needed to avoid the occurrence of national disunity due to irregular warfare that enters the joints of state life. dss vol. 4, january 2023, pp.46-51 51 declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. references [1] m. affan, "the threat of is proxy warfare on indonesian millennial muslims", indones. j. islam muslim soc., vol. 8, no. 2, p. 199, 2018. [2] j. cascio, "facing the age of chaos", medium, 29-apr-2020. [online]. available: https://medium.com/@cascio/facing-the-age-of-chaos-b00687b1f51d. [accessed: 24-feb-2023]. [3] t. endo, "the conceptual definition of ‘irregular warfare’ and the today’s international security environment", international forum on war history: proceedings, 2017. [4] t. gestoro, "hybrid warfare", in siapkah kita menghadapinya, publika.rmol.id, 2021. [5] r. e. indrajit, p. widodo, r. w. putro, "irregular warfare phenomena in the covid-19 pandemic: situation prediction simulation of post epidemic catastrophe in indonesia", journal of informatics engineering and information systems, vol. 7, no. 3, pp. 522–532, 2020. [6] "ministry of defense strategy to build defense, from diplomacy and overcoming pandemics", nasional. tempo. co, 2021. [7] minister of defense prabowo chaired the second day of the ministry of defense meeting, attended by the tni commander and the indonesian national police chief. 2022. [8] k. kilinskas, "hybrid warfare: an orientating or misleading concept in analysing russia’s military actions in ukraine?", lith. annu. strat. rev., vol. 14, no. 1, pp. 139–158, 2016. [9] a. sudrajat, "panglima tni: hybrid war one of the threats for the next 5 years", news. detik. com. [10] m. zed, library research methods, indonesian torch foundation, 2008. microsoft word 233-article text-576-1-15-20230320.docx issn 2744-1741 defense and security studies original research vol. 4, january 2023, pp.59-64 https://doi.org/10.37868/dss.v4.id233 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 59 collaboration between the population and civil registry service with 0707/wonosobo district military command fulfillment of children's rights through child identity card selfira salsabilla1*, george royke deksino2, rizerius eko hadisancoko3, ade surya prabandari putri4, zean elhamas baihaqy5, titin sofiana6, devi kusumawati7 1,2,3republic of indonesia defense university, faculty of defense management, indonesia 4,5,6,7universitas islam negeri sunan kalijaga, faculty of adab dan ilmu budaya, indonesia *corresponding author e-mail: selfirasalsabilla20@gmail.com received feb. 2, 2023 revised 20 mar., 2023 accepted 21 mar, 2023 abstract child identity card is issued by the government to encourage increased data collection, protection and public services to realize the best rights for children. the existence of child identity card shows the government's seriousness in fulfilling the rights of indonesian citizens who are still underage to obtain public service rights that are equal to adults. the collaboration between the office of population and civil registration (disdukcapil) of wonosobo regency to issue child identity card in sigedang is considered effective in targeting the community directly so that people can be more familiar with the functions and benefits of having child identity card. this research belongs to the type of descriptive research using a qualitative approach which means this research describes a real phenomenon. there were 3 informants in this study as informants. the research data were obtained from various data sources, namely primary data and secondary data. data collection is done through observation, interviews and documentation © the author 2023. published by arda. keywords: office of population and civil registration; collaboration; 0707/wonosobo district military command 1. introduction children's rights in terms of identity ownership as fulfillment of population administration requirements are basic things that must be fulfilled. currently through permendagri number 2 of 2016 concerning child identity cards there is to guarantee children's rights in legal protection.. the central government's efforts to implement the child identity card program as an effort to the newest population administration program are a concrete form of protection for children as the state's obligation to protect every citizen. child protection is all activities to guarantee and protect children and their rights so that they can live, grow, develop and participate optimally in accordance with human dignity and values, and receive protection from violence and discrimination. efforts to protect children are absolutely needed, considering that currently there are more and more phenomena that make indonesian children victims [1]. this card is only issued by the regency/city population and civil registration office. the issuance of child identity card aims to improve data collection, protection, and fulfillment of citizens' constitutional rights. child identity card has two types, namely identity cards for children aged 0-5 years and 5-17 years. the terms of issuance, for newly born children, the child identity card will be issued together with the birth certificate. however, for children who are not yet 5 years old and do not have child identity card, the requirements include a copy of the birth certificate excerpt and show the original birth certificate excerpt. in addition, you need a family card of parents or guardians and original id cards of both parents or guardians. dss vol. 4, january 2023, pp.59-64 60 issuance of child identity cards in wonosobo regency has reached level 4 and is still continuing to disseminate information and data collection to all regions in wonosobo regency. as of july 2022, the number of children who already had a child identity card was 92,349 (38.93%) and 144,841 of those who did not yet had a total of 237,190 children. previous research in tasikmalaya regency with the title implementation of child identity card policy at the tasikmalaya city population and civil registry service written by nidia rismania dewi resulted that implementation of child identity card policy in tasikmalaya city that, implementation of child identity card policies that are in the department of population and civil registration of the city of tasikmalaya is as expected. procedures and provisions have been carried out properly. the results of research in the field show that this policy has been implemented very well by officers. employees are very proficient in carrying out their duties and serving the community in child identity card services according to established rules. in registering population data, employees only need a short amount of time to make child identity card without being charged a penny. in the dimension of communication and human resources, it is still lacking and needs to be improved again [2]. another study conducted by windi dwi arista with the title implementation of the child identity card program policy at the badung regency population and civil registry office found that implementation experienced obstacles due to problems with the application system on the computer and problematic networking. besides that, another problem is the supply of electricity in the event of a blackout, because this core equipment requires a stable supply of electricity. and related to the use of child identity card provided by the badung regency population and civil registry service, it has not been maximized and cannot be implemented properly because many people still do not understand the functions and benefits of child identity card [3]. in this study we will use the theory of collaboration and implementation of public policy. in this study, the authors found two problem formulations that will be discussed, namely how to accelerate the achievement of child identity card in wonosobo regency? and how is the implementation of the collaboration with 0707/wonosobo district military command in accelerating the achievement of child identity card? 2. research method in this study, the researcher used a qualitative descriptive research type in which the analysis will be based on the ability and results of the researcher's study in connecting field facts, information obtained and existing data. qualitative research methods were used as a procedure in this study which produced descriptive data, namely describing the facts found in the field either in writing or orally obtained from various sources encountered. the sampling technique in this study used the purposive sampling technique, namely in this method using the criteria that had been selected by the researcher in selecting the sample [4]. the analysis technique in this study used qualitative analysis, where the data obtained was clarified and described in easy-to-understand sentences. then it will be analyzed based on the object under study and will be interpreted with existing data or theoretical basis so that the results can be assessed as a whole. all data were obtained from interviews, manuscripts, documentation, official personal documents and other documents that support the validity of obtaining research data [5]. data collection techniques used were interviews, observations and literature studies. informants who became sources include: 1. commander of kodim 0707/wonosobo. 2. head of the population and civil registration office of wonosobo district. 3. head of service and registration on civil registration office of wonosobo district. 4. sigedang village head. the research location is in the wonosobo regency area (indonesia). the research time was during the activities of tmmd sengkuyung phase ii of 2022 in sigedang village, kejajar district from july 26 to august 24, 2022. dss vol. 4, january 2023, pp.59-64 61 3. results and discussion 3.1 procedures for issuing child identity card in wonosobo district the child identity card is an identity card that every child must have in order to be able to access public services independently. some of the benefits of child identity card include as an effort to improve citizen data collection, as protection and public services and as an effort to provide protection and fulfillment of children's rights as part of citizens. several legal bases for issuing a child identity card include: 1. law number 24 of 2013 concerning amendments to law number 23 of 2006 concerning population administration. 2. government regulation of the republic of indonesia number 102 of 2012 concerning amendments to government regulation of the republic of indonesia number 37 of 2007 regarding the implementation of law number 23 of 2006 concerning population administration. 3. regulation of the minister of home affairs number 2 of 2016 concerning child identity cards. as a consideration for the issuance of child identity card are: 1. currently children who are under 17 years of age and who are not married do not have a resident identity that is valid nationally and is integrated with the population administration information system (siak). 2. that the government is obliged to provide a valid national identity. 3. that the provision of population identity to children will encourage an increase in data collection. 4. whereas based on the above, the government needs to stipulate ministry regulation regarding child identity card. making a child identity card is a service product from the wonosobo regency population and civil registration office. based on minister of home affairs regulation number 2 of 2016 concerning child identity cards article 1 paragraph (7) this card is only issued by the regency/city population and civil registration office. this regulation is also in accordance with article 2 in the same regulation which contains the issuance of a child identity card aimed at increasing data collection, protection and public service as well as an effort to provide protection and fulfillment of citizens' constitutional rights. the department of population and civil registration of wonosobo regency has carried out the socialization process for issuing a child identity card since 2019. the socialization process is divided into two ways, namely direct and indirect socialization processes. the direct socialization process was carried out through commemorations of national days such as: national children's day, national education day, and through the tni manunggal pembangunan desa (tmmd) program. while indirect socialization is carried out through broadcasts on local television and socialization to operators and village officials which is carried out once a year. the child identity card priority targets for wonosobo regency are in 5 sub-districts out of 16 sub-districts, namely sukoharjo district, kalikajar district, kertek district, garung district and kejajar district. however, these 5 sub-districts have met the national child identity card target of 40 percent of the total number of children in wonosobo district. the disdukcapil of wonosobo regency has made several efforts to meet the national child identity card target, including: 1. conduct outreach either directly or through the mass media. the socialization has been carried out by department of population and civil registration wonosobo regency since 2019 directly by inviting village officials and village operators to then convey it to the target community for child identity card. in addition, disdukcapil also conducts socialization directly by participating in events that absorb public interest such as the wonosobo anniversary event, national children's day, expo and others. the department of population and civil registration always opens booths to attract public interest in issuing child identity cards. disdukcapil also conducts socialization through mass media such as making advertisements on the streets in the form of billboards, mass television, live broadcasts, the ministry of communication and informatics website and others. dss vol. 4, january 2023, pp.59-64 62 2. balateka innovation (make deeds directly become deeds, family card and child identity card). this innovation is a program from the disdukcapil of wonosobo regency, where the only requirement is to show a birth certificate and marriage certificate. this service can also be done independently using the disdukcapil whatsapp call center service by taking a photo of the requirements file. so, applicants don't have to bother coming to the disdukcapil office. disdukcapil also delivers documents to the applicant. 3. ball pick up and document delivery services. this service is carried out with the concept of kuda zebra (i came happy community) because when the people concerned want to issue documents in the form of id cards, child identity card or certificates they do not need to come to the dukcapil office but are directly escorted to their residence by officers from dukcapil. 4. the constraints experienced by the population and civil registry service (disdukcapil) of wonosobo regency based on the results of interviews with mr. siswanto, s.h., mm. as the head of service and civil registration sector, basically there were no significant obstacles during the socialization and issuance of child identity card processes. however, he said that the lack of human resources (hr) in carrying out every task, such as picking up balls to make id cards and child identity card, was still limited. the wonosobo regency disdukcapil only has 50 employees consisting of 19 civil servant and 31 freelance daily employees (phl), then a service based on sending documents via whatsapp makes it easier for the public because it is considered more flexible but disdukcapil has to sort, match and enter data -the data to the siak application (population administration information system). [6] issuance of child identity cards in wonosobo regency has reached level 4 and is still continuing to disseminate information and data collection to all regions in wonosobo regency. as of july 2022, the number of children who already had a child identity card was 92,349 (38.93%) and 144,841 of those who did not yet had a total of 237,190 children. the various benefits of child identity card issuance include: as a child's official identity, child protection and as a public service to realize the best rights for children. however, the community does not fully understand the function of child identity card, so not all of the community benefits from this child identity card. this is caused by several factors, namely: a) lack of facilities and infrastructure to more intensively carry out outreach; b) there are still many people who think that child identity card is not important; c) child identity card is not yet mandatory in wonosobo regency; and d) although the procedure for issuing child identity card is easy, there are still people who have not fulfilled the completeness of the documents such as child birth certificates, family cards or other requirements. 3.2 collaboration between kodim 0707/wonosobo and the service in issuing child identity card wonosobo regency epistemologically, the word collaboration comes from english, namely, "co-labor" which means working together. in the 19th century the word collaboration came into use when industrialization began to develop. organizations at that time became increasingly complex. divisions in the making of the organizational structure began to be made for the division of tasks for the workforce in the organization. organizational complexity is the starting point for collaboration in various organizations [7]. philosophically, collaboration is an effort made by various parties to achieve the same goal. according to schrage in [8], collaboration is an effort to unite various parties to achieve the same goal. collaboration requires various kinds of actors both individuals and organizations who work hand in hand to carry out tasks in order to achieve common goals. collaborative governance is a forum used to achieve a goal. according to [9], collaborative governance is a condition in which the government fulfills public goals through collaboration between organizations and individuals. the same thing was also expressed by [10] who stated that collaborative governance is a condition when the government and the private sector seek to achieve a common goal for society. collaborative governance can also describe a state of interdependence between actors. the desire to do collaborative governance arises because the actors are aware of the limitations they have. then, these actors need to express their desire and willingness to forge closer relationships with other actors. each actor involved needs to acknowledge the legitimacy held by other actors. once the actors are committed to collaborating, it is necessary to build a sense of shared ownership of each collaboration process [11]. the collaboration built by disdukcapil in wonosobo district was carried out because of limitations, namely in the process of conveying information related to the importance of having child identity card so that it collaborates with kodim 0707/wonosobo as a medium for conveying information to the public, especially through tmmd activities. dss vol. 4, january 2023, pp.59-64 63 based on the opinions of various experts, it can be concluded that collaborative governance is a process of cross-sectoral multiorganizational network structures (government, private sector, civil society) that make collective agreements, joint decisions, reach consensus through formal and informal interactions, the creation and development of norms in interactions that mutually beneficial in achieving common goals. therefore, in collaboration, the interactions that appear are egalitarian, that is, all actors have the same position. republic of indonesia law number 34 of 2004 concerning the indonesian national army (tni) stipulates that the duties of the tni include military operations for war (omp) and military operations other than war (omsp) [12]. implementation of military operations other than war which must be based on state policies and political decisions. military operations apart from war, one of which is the existence of community service operations which are the implementation of omsp in the form of assisting local governments. one form of service operation is the tmmd (tni manunggal membangun desa) program. the tni manunggal build village (tmmd) program has a physical target as well as carrying out non-physical activities including, by providing counseling and outreach, one of which is the success of population administration services in the form of issuing child identity card in sigedang village, kejajar district, wonosobo regency. with the role and participation of kodim 0707/wonosobo which is implementing the tmmd program in sigedang village, it facilitates direct socialization by targeting the sigedang village community. this was felt to be quite effective because the tni, through babinsa and members of the tmmd task force, immediately gave an explanation to the public about the benefits of owning a child identity card [13]. this collaboration shows a significant increase in participation in child identity card services, as evidenced by the achievement of 540 child identity card services in 30 days, whereas if there was no collaboration, only up to 60 cards [14]. 4. conclusions issuance of child identity card is very important for the fulfillment of children's rights, especially in the village of sigedang, wonosobo. the department of population and civil registration (disdukcapil) of wonosobo regency has carried out various methods ranging from outreach, innovation, to picking up and providing services via whatsapp to facilitate access to child identity card issuance. however, with the collaboration with the kodim 0707/wonosobo which works directly with the community, the child identity card data collection to be submitted to the disdukcapil to issue child identity card is felt to be very effective because the increase in requests for child identity card issuance in sigedang village is quite significant. the obstacles experienced by the disdukcapil of wonosobo regency were not significant obstacles and did not reduce the performance of child identity card issuance, which incidentally was easy and straightforward. the length and absence of issuance depends on the completeness of the data that goes to the disdukcapil of wonosobo regency. while the process itself only takes a maximum of two working days. acknowledgements thank you to the commander of the kodim 0707/wonosobo, the head of the wonosobo regency population and civil registration office and the head of sigedang village who have agreed to provide information and supporting information in writing this article. declaration of competing interest the authors declare that they haven’t any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. dss vol. 4, january 2023, pp.59-64 64 references [1] i made sila, i made purana, dan a. r. b. a. “policy implementation of minister of home affairs regulation no. 2 of 2016 concerning child identity cards (kia) at the denpasar population and civil registry service”, ipdn journal, vol. 11, no. 1, pp 84-96, 2020. [2] n. dewi, “implementation of the child identity card (kia) policy at the population and civil registry service in the city of tasikmalaya“, scientific journal of administrative sciences, vol. 10, no. 1, pp 913, 2019. [3] wd. arista, w. suderana, “implementation of child identity card (kia) program policy at the badung regency population and civil registry service”, social dynamics scientific journal, vol. 3, no.1, pp. 56-60, 2019. [4] sugiyono, understanding qualitative research, bandung: alfabeta, 2014. [5] j. w. creswell, research design: qualitative, quantitative and mixed methods approaches (4th ed.) thousand oaks, ca: sage, 2014. [6] results of interviews with mr. tarjo (head of the wonosobo regency population and civil registration service) and mr. siswanto, s. h., mm. (head of services and civil registration). [7] j. wanna, “collaborative government: meanings, dimensions, drivers and outcomes, on o‟flynn”, jannie & wanna, john. collaborative governance: a new era of public policy in australia?, canberra: australian national university e press, 2008. [8] j. harley, n. blismas, “an anatomy of collaboratuon within the online environment, on anandarajan, murugan (ed)”, e-research collaboration: theory, techniques and challengers, heidelberg: springer international publishing, 2010. [9] j. d. donahue, r. j. zeckhauser, collaborative governance: provate roles for public goals in turbulent times, new jersey: princenton university press, 2011. [10] m. holzer et al, an analysis of collaborative governance models the context of shared services dalam lauer schachter, hindy kaifeng, yang (ed). the state of citizen participation in america, charlotte: information age publishing, 2012. [11] c. ansell, a. gash, “collaborative governance in theory and practice”, journal of public administration research and theory, vol. 18, no.4, pp. 543-571, 2007. [12] law number 34, year 2004, concerning the indonesian national armed force. [13] interview results with lt. col. inf rahmat, s. e., m.sc (commander of 0707/wonosobo military district command). [14] interview results with the head of sigedang village. microsoft word 106-112_211.docx issn 2744-1741 defense and security studies original research vol. 3, january 2022, pp.106-112 https://doi.org/10.37868/dss.v3.id211 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 106 laminar composite materials for unmanned aircraft wings mala utami1*, jonathan ernest sirait2, beny budhi septyanto3, aries sudiarso4, i nengah putra apriyanto5 1,2,3 faculty of defense technology, indonesian defense university, indonesia *corresponding author e-mail: mala.utami@tp.idu.ac.id received nov. 15, 2022 revised dec. 2, 2022 accepted dec. 21, 2022 abstract unmanned aerial vehicles (uavs) have high popularity, especially in the military field, but are now also being applied to the private and public sectors. one of the uav components that require high material technology is the wing. the latest material technology developed as a material for unmanned aircraft wings is a composite material that has high strength and lightweight. this research aims to identify composite materials that can be used for unmanned aircraft wing structures. the method used in this research is a qualitative method with a literature study approach. the results of this theoretical study show that some of the latest composite materials that have been developed into materials for unmanned aircraft wings are laminar composites with a sandwich structure. laminar and sandwich composites consist of various constituent materials such as balsa wood fiber-glass and polyester resin, microparticles, carbon fibre reinforced polymer, polymer matrix composites reinforced with continuous fibers, polymer matrix composites, e-glass/epoxy, kevlar/epoxy, carbon/epoxy, woven fabrics, acrylonitrile butadiene styrenecarbon (abs) laminated with carbon fiber reinforced polymer (cfrp) and uniaxial prepreg fabrics. laminar and sandwich composite materials are a reference for developing unmanned aircraft wing structures that have resistant strength and lightweight. © the author 2022. published by arda. keywords: uav wings, composite materials, laminar composites, sandwich composites 1. introduction an unmanned aerial vehicle (uav) can be defined as a type of aircraft that is not controlled by a pilot, but uses aerodynamic forces with a lift so that it can fly autonomously or be remotely controlled, can be recovered or disposed of, and can carry payloads that can be tailored to the desired task and operation [1]. uavs are increasing in use for both civilian and military use and are preferred because they are more cost-effective and more versatile. so in the last few decades uavs have become very popular due to their versatility [6]. currently, unmanned aerial vehicles (uavs), or in indonesia known as unmanned aircraft (drones) have high popularity so the development of good materials at a low price becomes a goal. not only that but designing uavs also requires engineers to design and produce on a large scale with limited time [3]. the development of uavs in the aviation industry is to find materials or materials that have high speed. the advancement of uavs is highly dependent on innovations in various technologies such as control systems, computer technology, and communication integration. innovations in manufacturing techniques and materials are also important to develop and improve uavs’performances by producing durable and lightweight dss vol. 3, january 2022, pp.106-112 107 structures. this can be achieved by applying innovative composite materials with high strength, ballistic and rigid properties. advanced composite materials are made of fibrous materials embedded in a resin matrix, generally laminated with fibers oriented in alternating directions to form the strength and stiffness of the combined material [3]. wing development for unmanned aerial vehicles (uavs) is a multi-stage work such as airfoil selection, geometric calculation, structural design, material selection, numerical analysis, and manufacturing. the main objective in wing development is to design a structure characterized by high strength and low weight. the wing should have a high strength ratio and be supported by lightweight. there will be loads and moments acting on the wing so to overcome the stress due to these loads the wing must have high strength. the weight or weight of the wing must be low because the heavyweight will reduce unwanted efficiency in the engine [3]. with the development of material technology, it is easy to access and purchase composite materials. with the advancement of composite manufacturing technology, to make even complex shaped parts can be made easily in a few days. the use of uav composite materials is different from that of general aviation vehicles, where most of the structures are made of aluminum and titanium in addition to carbon fiber composites. whereas almost all uav structures are made of carbon fiber composites [2], it becomes possible to manufacture a uav in a laboratory or workshop for 4 or 5 people in a few weeks. in addition, maintenance and repair of uavs can also be done quickly and easily because they are assembled from small, cheap, and easy-to-manufacture composite components. composite materials offer an excellent strength-to-weight ratio with greater manufacturability of complex parts, unique contours, and special features, especially in aircraft applications. one of the basic aircraft components of concern in the application of composite material structures is the wing profile [6]. figure 1. comparison of stiffness and strength with a weight between composite materials [4] dss vol. 3, january 2022, pp.106-112 108 in the selection of composite materials for uavs that have high criteria, it means that the selected material must have resistant strength and be lightweight. for example, polymer matrix composites reinforced with continuous fibers are a good choice. these materials are characterized by young's modulus values twice as high as those of aluminum alloys and twice as lightweight [5]. the difficulty of using composite materials lies in the structure, the use of composite materials requires knowledge of material constants and mechanical properties. correctly defining the characteristics of the composite material will guarantee that the material can be a good structure and have the desired reliability of results. the use of composites in aircraft is increasing day by day, especially in military aircraft. composite materials have the advantages of high strength and lightweight which are very well applied to complex parts, unique contours, and special features, especially as aircraft materials. one aircraft component that is very suitable for using composite materials is the wing profile. therefore, this paper raises the issue of the use of composite materials in unmanned aerial vehicles (uavs), especially on the wings. this paper is a theoretical study that aims to increase the knowledge of authors and readers in material engineering technology and its application in the military. 2. research method this research uses a qualitative method with a literature review approach. the discussion or analysis is carried out based on the works of research results related to the topic and the results of thoughts that have been produced by researchers and practitioners. the literature review is one of the techniques that can be used in research. a literature review has its own difficulties when compared to other research techniques. as it requires a high understanding of the researchers in conducting a study of a problem to be solved related to the theory to be used, and the model or method to be carried out. the stages in this literature review research are as follows. a. finding and determining relevant literature, this activity requires high focus and shrewdness in finding data sources, especially secondary data. journals, articles, and books are the main sources in this research, the more sources used, the better the results obtained. b. conducting literature screening, at this second stage, the researcher must be able to filter the selection of sources that have been obtained to be used in problem-solving. of the many sources obtained, they are evaluated to adjust to the objectives of the research to be achieved. c. strengthening the topic with the sources that have been obtained, at this stage, this is the level of difficulty in the literature review because it must be able to strengthen existing theories with sources and discuss gaps in the form of advantages or disadvantages of each source. d. conclude based on the outcome of the discussion so as to reach a solution to the problem raised. 3. results and discussion the definition of composite material is a material consisting of two or more phases with significantly different properties (physical and chemical). combined together to form a new material with different characteristics from its components. the resulting composite material properties are beneficial properties that cannot be achieved with one phase/component alone. and what is unique is that each component remains separate in the finished structure [3]. one of the most common examples of composites is fiber-reinforced composite materials that consist of high-strength and modulus fibers in a matrix material. reinforced steel bars embedded in concrete provide an example of fiber-reinforced composites. in a composite, the function of the fiber is to carry the load exerted on the composite structure and provide stiffness, strength, thermal stability, and other structural properties. while the matrix material serves as a component that binds the fibers together, transfers fiber loads, and provides protection to reinforce the fibers against chemical attack, mechanical damage, and other environmental effects such as moisture and others [6]. the composite industry has grown rapidly with the advent of better plastic resins and good reinforcing fibers. as dupont developed the aramid fiber known as kevlar, it has become a standard in armor due to its high ductility. in addition, carbon fibers were also developed so since this time composites have become a dss vol. 3, january 2022, pp.106-112 109 substitute for metals as a new material. at present, of course, the composite industry continues and is still growing, its growth as a metal replacement material as an aircraft material, especially in unmanned aircraft [7]. composites have unique advantages over other monolithic materials such as high strength properties, high stiffness, durable life, low density, and adaptability to the structure being created. in addition, recent composite materials are exploring improvements such as corrosion resistance, wear resistance, appearance, temperature-dependent properties, thermal stability, thermal insulation, thermal conductivity, and acoustic insulation. the basis that makes composite materials have superior structural performance lies in the high specific strength (strength to density ratio) and high specific stiffness (modulus to density ratio) and the anisotropic and heterogeneous character of the material. the anisotropic and heterogeneous character also provides the freedom to design structures with optimal configurations to obtain certain functions [8]. composite materials can be classified into several types, namely [9]: a. first classification, based on matrix constituents. organic matrix composites (omcs), metal matrix composites (mmcs), and ceramic matrix composites (cmcs). the term organic matrix composites are generally assumed to cover two classes of composites, namely polymer matrix composites (pmcs) and carbon matrix composites commonly referred to as carbon-carbon composites. b. the second classification refers to reinforcement. fiber reinforced composites, laminar composites, and particulate composites. c. fiber reinforced composites, are composites in which fibers as reinforcement are embedded in the matrix material. these composites are called discontinuous fiber composites or short fiber composites with properties that vary depending on the length of the fiber. d. laminar composites, composites consisting of material held together by a matrix. sandwich structures fall under this category. e. particulate composites, composites consisting of particles distributed or embedded in the matrix body. the particles are in the form of flakes or powders. article board, concrete, and wood are examples. in its application as a leading material in uavs, especially wings, ceramic materials used are various as described above. based on research conducted by lamaini et al., [10] the sandwich structure made consists of balsa wood, fiberglass, polyester resin, and microparticles used to close the pores of the balsa wood surface. the results of the mechanical properties analysis of the uav wing structure can be seen in that the sandwich structure can be used in uav applications. the developed uav wing weighs 800 grams, 20 mm camber thickness with a length of 20 mm and a span of 70 mm. tensile, compressive, and flexural tests have been carried out on the sandwich structure. the results of the average tensile and compressive properties of the composite can compete with existing composite materials. the lay-up method can cost production and can also be used in large-scale production. so it can be concluded that balsa wood-based sandwich composites can be used as uav wing structures. all main components in the aircraft are made of cfrp (carbon fibre reinforced polymer) composite material consisting of woven and uniaxial prepreg fabrics. uniaxial prepreg fabrics aim to ensure volume consistency and will provide a smooth overlap. a low-cost manufacturing process can be achieved by reducing the number of parts and a fabrication process that does not require costly autoclaving. the characteristics obtained from the test results of the uav wing structure with composite materials are the shaker-table approach to simulate the wing on the uav. the shaker-table method produces a signal of greater magnitude with less noise when compared to data obtained from a full aircraft configuration [11]. table 1 shows previous research on material utilization for uav wings, with authors, titles, methods and type of composite materials given. dss vol. 3, january 2022, pp.106-112 110 table 1. previous research on material utilization for uav wings author (year) title methods composite material lamani, shivaji., stanvil dsouza, dane hubert saldanha, granvil dsouza and madhurima r londhe. (2020) [10] analysis, fabrication and testing of a sandwich composite for an uav wing hand lay-up technique sandwich composite (fiberglass and polyester resin and microparticles) j. simsiriwong & r. warsi sullivan. (2012) [11] experimental vibration analysis of a composite uav wing the form of woven and uniaxial prepreg fabrics carbon-fiber reinforced polymer (cfrp) composite basri, e. i., sultan, m. t. h., m., f., basri, a. a., abas, m. f., majid, m. s. a., ahmad, k. a. (2019) [12] performance analysis of composite ply orientation in aeronautical application of unmanned aerial vehicle (uav) naca4415 wing ply combinations carbon fiber reinforced polymer (cfrp) laminated composite grodzki, w., & łukaszewicz, a. (2015) [3] design and manufacture of unmanned aerial vehicles (uav) wing structure using composite materials. polymer matrix composites reinforced with continues fibers, polymer matrix composites (laminates and sandwich structures) tah’ir turgut (2007) [6] manufacturing and structural analysis of a lightweight sandwich composite uav wing vacuum bagging method with curing at room temperature laminated composite and sandwich structure (eglass/epoxy, kevlar/epoxy, carbon/epoxy) sasi kirono (2015) [13] mechanical properties of unmanned aircraft composite materials a comparison of the mechanical properties of composite materials is carried out by tensile strength testing. front fuselage components upper skin with three layers of carbon fiber, honeycomb, and glass fiber vasić, zoran, stevan maksimović, and dragutin georgijević (2018) [15] applied integrated design in composite uav development pyrolysis of an organic precursor such as rayon or poly-acrylonitrile, or petroleum pitch graphite fibers, glass, carbon and graphite, kevlar, boron and carbon fibers dss vol. 3, january 2022, pp.106-112 111 according to research conducted by basri et al., [12], the acp (ansys composite preppost) module is used to apply composite materials with various thicknesses and angles. which is applied to wing skins, spars, and ribs. laminate composite is prepared according to the classical laminate theory (clt) to investigate the behavior of composite sandwich structures subjected to internal influences from applied loads. in ansys, the model of a wing structure is interpreted in the form of shell elements (lamina). the effect of ply orientation on the naca 4415 uav wing composite laminate was evaluated. analytical predictions show that the stress state developed in the variation of fiber orientation with ply-angle has a significant influence on the strength. finite element analysis studies show the total displacement values obtained are within the acceptable range. unmanned aerial vehicle (uav) wings according to their purpose vary in airfoil shape, thickness, chord dimension, span, surface area, and geometry. despite the differences, the design concept is similar to all types of structures. due to the high requirements of modern uav (high-strength-low-weight) composite materials, especially polymer matrix composites reinforced with continuous fibers are the most appropriate choice. to transfer such loads, composite structures have been designed. the first proposed structure is a laminated composite consisting of glass cloth (outer) and unidirectional carbon cloth (inner) reinforced with balsa wood ribs for proper shape. the construction made is a type of sandwich structure, since the upper and lower layers of fabric are separated with balsa wood ribs. the second analysis structure is characterized by an additional foam core separating the glass-carbon fabric layers. numerical analysis of composite structures based on the same boundary conditions showed that the sandwich structure is characterized by the deflection of the foam core layer under the load of 11.34 mm 3 times smaller than the carbon fiber laminate deflecting 32.16 mm considering the same weight. lightweight composite structures based on carbon, glass fibers produced by the vacuum bag technique minimize the creation of voids (bubbles and wrinkles) and allow to obtain of high fiber content which translates into higher strength of the created structures [3]. according to research by vasić et al [15] composites with graphite fiber materials are the strongest and stiffest materials widely used in unmanned aircraft structural systems. placing fibers in graphite composites, it will increase the strength and stiffness of the composite material. tensile testing of coupon specimens was conducted to obtain the modulus of elasticity of the composites used in the uav. the elastic properties obtained from the mechanical tests were used in the elemental analysis of the uav wing. the woven fabric was modeled as a 2-d orthotropic layer in the analysis. in addition to mechanical testing, elastic properties were also obtained by two other methods. one method is the composite micromechanics approach. in this approach, the properties are obtained based on the volume fraction of the constituents and their respective mechanical properties. the woven fabric is modeled as a biaxial cross-ply laminate in the analysis. another method used to derive elastic properties is the approximate approach. this approach is based solely on the rule of mixtures. in this case, the woven fabric is also modeled as a 2-d orthotropic layer. it can be concluded from the results of the full-wing analysis that the three material definitions used to give consistent and acceptable results. moreover, if the displacement results are observed, it is clear that they are almost the same [10]. research has been conducted by galatas et al [16] using the latest sandwich composite structure consisting of acrylonitrile butadiene styrenecarbon (abs) laminated with carbon fiber reinforced polymer (cfrp) layer with abs/cfrp/abs arrangement. a series of tests were conducted with tensile measurements for 3d printed samples with varying filler densities and cfrp layers. the results showed that the abs/cfrp/abs sandwich structure during the tensile tests exhibited brittle properties while it was ductile for the monolithic abs samples. 4. conclusions laminar composites type composite material with sandwich structure is the latest composite material and is widely applied as a uav wing structure. laminar composites and sandwiches consisting of various materials such as balsa wood fiberglass and polyester resin, microparticles, carbon fiber reinforced polymer, polymer dss vol. 3, january 2022, pp.106-112 112 matrix composites reinforced with continuing fibers, polymer matrix composites, e-glass/epoxy, kevlar/epoxy, carbon/epoxy, woven fabrics, acrylonitrile butadiene styrenecarbon (abs) laminated with carbon fiber reinforced polymer (cfrp)and uniaxial prepreg fabrics. this laminar-type composite material with a sandwich structure has good test values and can be used as a uav wing structure material. declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. references [1] us department of defense, “dictionary of military and associated terms”, joint publication 1-02. [2] hexcel corporation. unmanned aerial vehicles (uavs). retrieved from https://www.hexcel.com/resources/uav#:~:text=today%2c%20almost%20all%20uav%20structures, addition%20to%20carbon%20fiber%20composites. diakses pada 28 agustus 2022. [3] grodzki w., łukaszewicz a. (2015), “design and manufacture of unmanned aerial vehicles (uav) wing structure using composite materials”. materialwissenschaft und werkstofftechnik, 46(3), 269–278. doi:10.1002/mawe.201500351. [4] http://www-materials.eng.cam.ac.uk/mpsite/interactive_charts/spec-spec/ns6chart.html [5] ch. kassapoglou, “design and analysis of composite structures with applications to aero-space structures”, wiley, 2013. [6] t. tah’ir, “manufacturing and structural analysis of a lightweight sandwich composite uav wing”. thesis. middle east technical university, 2007. [7] s. k. mazumdar, “composites manufacturing: materials, product, and process engineering”. crc press, 2002. [8] i. m. daniel, o. ishai, “engineering mechanics of composite materials”. oxford university press, 1994. [9] r. r. nagavally, composite materials history, types, fabrication techniques, advantages, and applications”. proceedings of 29th irf international conference, 2016. [10] s. lamani, s. dsouza, d. h. saldanha, g. dsouza, m. r. londhe, “analysis, fabrication and testing of a sandwich composite for an uav wing”. 3rd international conference on frontiers in automobile and mechanical engineering (fame 2020). doi:10.1063/5.0033993, 2020. [11] j. simsiriwong, r. w. sullivan, “experimental vibration analysis of a composite uav wing”. mechanics of advanced materials and structures, 19(1-3), 196–206. doi:10.1080/15376494.2011.572248 2012. [12] e. i. basri, m. t. h. sultan, m. f. basri, a. a. abas, m. f. majid, m. s. a. ahmad, “performance analysis of composite ply orientation in aeronautical application of unmanned aerial vehicle (uav) naca4415 wing”. journal of materials research and technology. doi:10.1016/j.jmrt. 2019.06.044. 2019. [13] k. sasi. (2015). “sifat mekanis material komposit pesawat udara tanpa awak”, retrieved from: http://repositori.lapan.go.id/525/1/bunga%20rampai_sasi%20kirono_bppt_2015.pdf, 28 august 2022. [14] j. n. reddy, mechanics of laminated composite plates. crc press, 1997. [15] z. vasić, s. maksimović, d. georgijević, "applied integrated design in composite uav development." applied composite materials 25.2: 221-236, 2018 [16] a. galatas, h. hassanin, y.zweiri, l. seneviratne. "additive manufactured sandwich composite/abs parts for unmanned aerial vehicle applications." polymers 10, no. 11: 1262, 2018. microsoft word 79-85_172.docx defense and vol. 2, may 2 https://doi.org this work is lice to share and ada authorship and in analysis coefficie tarik šaban 1 mechanical e *correspond © the auth 2021. published by arda. 1. introdu small calibe for personal ammunition ammunition due to the m move and th the force w the projectile the surface), in aerodynam three refere are: referenc force of dra dimensionle empirical fo used to pred the projecti developmen d security s 2021, pp.79-85 g/10.37868/ds nsed under a cre apt the material nitial publication s of th ent usin nović1 engineering fac ding author: : hor y uction er ammunitio protection. i n, in the gen generally do movement o he parameters with which th e (namely th , and has a ve mics, in ord ence quantitie ce length, re ag that divi ess quantity c ormulas were dict the press ile for a de nt of comput studies 5 ss.v2.id172 eative commons a for any purpose in this journal. he influe g cfd culty, university tariksabanov abstract this paper determine the coeffic projectile, to drag. th that affect shape of th more deta supersonic simulation for describ numerical of cfd an comparison the results. keywords: on includes a it is fired fro neral case, co o not contain of the project s of the state e air acts on he force of pr elocity in the der to avoid es are used b eference area ided with th called the aer e obtained on sure distribut efined range ter technolog attribution licen e (even commer ence of y of sarajevo, b vic2203@gm r describes the influence ient of drag the aerodyn he second se drag, prima he ogive, and il. the third flow and g s and softwa bing the em simulation m alysis of 5.5 n of projectil in the sixth cfd, small ammunition u om direct fire onsists of a p n explosive c tile through changes wh the projectil ressure actin e opposite di difficulties w by which oth a and referen he product rodynamic dr n the basis o tion, i.e. for e of flow v gy begins th nse (https://creativ rcially), in any m 79 5.56 m bosnia and her mail.com the comput e of certain force. the fi namic forces ection was r arily the slen d the angle o d section de gives the eq are package mergence of model. the f 56 mm projec les by geome section, a co caliber amm up to 12.7 m e weapons th projectile and charges and f the air, the hich requires le, which is ng normally o irection, is ca with dimensi her quantitie nce pressure of the refer rag coefficie f theoretical the aerodyn velocities. b he era of co vecommons.org/l medium with an mm pro rzegovina ter dynamic geometrical first section i acting on th reserved for nderness of t of the frustum escribes the quations for ansys fluen a physical m fourth section ctiles: ss109 etry. the fift onclusion is g munition, aer mm caliber an hat have high d a propulsio fuse, and use air environm a certain am the resultant on surface an alled the drag ions, we wo s can be use (dynamic pr rence area ent. calculations namic coeffic based on th mputer prog licenses/by/4.0/) t acknowledgeme ojectile cs of fluids, characteristi s an introduc he projectile a review of he ogive and m. this sectio mathematic the mathem nt. this sect model and t n presents an 9, m855, l1 th section com given. odynamics, d nd is typical h initial veloc on group. pr only kinetic ment is distu mount of kine t of all forces nd friction fo g. rk with dim d to make it ressure in un and the refe s and experim cient estimat hese empiric grams for pr iss orig that allows others ent of the work's shape o , which wa ics of the pr ction and de with special f projectile p d the frustum on also defin cal model o matical mode tion was also the verificati nd describes 10, and m85 mprises the a drag force ammunition city and flatt rojectiles of c energy upon urbed; the air etic energy. s acting on t orce acting ta mensionless q t dimensionle ndisturbed a ference press mental tests w tion, on a sp cal expressi rediction of sn 2744-174 ginal research s s on drag as used to ojectile on scribes the l reference parameters m, and the nes drag in of fluid in el, used in o reserved ion of the the model 56, and the analysis of n for weapon ter trajectory small calibe n impact. r is forced to the surface o angentially to quantities [1] ess and these ir flow). the sure gives a which can be ecific part o ons and the aerodynamic 1 h g s y. r o f o ]. e e a e f e c dss vol. 2, may 2021, pp.79-85 80 coefficients based on the geometric characteristics of the projectile. the rapid advancement of computer technology has introduced a new discipline called computational fluid dynamics (cfd computational fluid dynamics) which represents the third method in aerodynamics completing the previous two, pure theory and pure experiment. computer fluid dynamics is the art of approximating major partial differential equations which describe fluid flow by simple algebraic expressions [2]. the end result of the application the cfd on the projectile flow is a picture of the flow field around the projectile which allows for a detailed analysis of the influence of individual parameters on the pressure (velocity) distribution and thus on aerodynamic drag coefficient. 2. influence of projectile shape on drag force coefficient in addition to the flow velocity (represented through mach number), the aerodynamic drag coefficient in large extent depends on the geometric characteristics of the projectile. slenderness of the projectile implies the ratio of the length of the projectile to the reference diameter of the projectile. figure 1. shows the dependence of the drag coefficient on the mach number for the three shapes of projectiles. the upper curve represents the drag coefficient for a spherical projectile, the middle curve corresponds to the drag coefficient for the projectile without the rear cone and with front part made with small slenderness, and the lower curve is the drag coefficient of a modern projectile. in terms of projectile slenderness, the sphere has the lowest slenderness and the modern projectile has the greatest slenderness. figure 1. coefficient of drag as a function of mach number depending on the shape [3] all three curves shown in figure 1. have the same trend. in the subsonic area the drag coefficient is constant (middle and lower curve) or changes very little, in the transonic area rises sharply to its maximum value and begins to slowly decline. the trend of a slight decrease in the drag coefficient with an increase in the mach number continues in the supersonic range. it can also be noticed that projectiles with higher slenderness have smaller drag coefficient and that their maximum value of the drag coefficient occurs for the values mach's number closer to one. 3. mathematical model aerodynamics is a theoretical and experimental science, and represents a branch of fluid mechanics. theoretically approach is based on the analytical solution of mathematical models of air flow. an analytical solution gives a complete insight into the physics of a problem, and once determined the analytical solution is suitable for the analysis of the influence of individual parameters in the mathematical model. most airflow problems are described by nonlinear partial differential equations, which do not have a general analytical solution. this is especially true for turbulent flow, which due to the stochastic nature of that flow cannot be described analytically. with the development of computers, conditions were created for the numerical solution of mathematics model. each simulation is based on a mathematical model, which denotes a mathematical notation physical model. dss vol. 2, may 2021, pp.79-85 81 the mathematical model includes the following assumptions:  air is a continuum.  air is considered a homogeneous mixture of gases.  the physical properties of air are the same in all directions the air is isotropic.  air is a single-phase fluid.  mass forces are neglected. the continuum assumption implies that the density of the fluid is large enough that even the infinitesimally small element of the fluid contains a satisfactory number of particles so it is possible to specify average velocity and average kinetic energy. that way they can determine flow characteristics (velocity, pressure, temperature, etc.) at each fluid point [4]. continuity behavior can be described by transport equations based on the basic laws of mass conservation, momentum, and energy. the equations derived from the given laws are presented in integral form for an arbitrarily selected part of the continuum, the volume ω bounded by a closed area the limit of the control volume dω (figure 2). the surface element ds is defined by the unit vector of the normal 𝑛 [4]. figure 1. control volume [4] law of mass conversation states: 𝛿𝛿𝑡 𝜌𝑑𝛺 + ρ(�⃗� ∗ 𝑛) 𝑑𝑆 = 0 (1) law of momentum conservation implies: 𝛿𝛿𝑡 𝜌�⃗� 𝑑𝛺 + ρ�⃗�(�⃗� ∗ 𝑛) 𝑑𝑆 = 𝜌𝑓 𝑑𝛺 − ρ(𝑛) 𝑑𝑆 + (𝜏̿ ∗ 𝑛) 𝑑𝑆 (2) law of energy conservation states: 𝜌𝐸 𝑑𝛺 + ∮ ρe(�⃗� ∗ 𝑛) 𝑑𝑆= ∮ k(∇t ∗ 𝑛) 𝑑𝑆 + 𝜌𝑓 ∗ �⃗� + 𝑞 𝑑𝛺 − ∮ p(�⃗� ∗ 𝑛) 𝑑𝑆 + ∮ (𝜏̿ ∗ �⃗�) 𝑑𝑆 (3) here 𝑣 is velocity of airflow, p is pressure, ρ is density, t is temperature, e is total energy, and �̿� is stress tensor. the system of equations describing high-velocity flow cannot be solved analytically. to solve this system it is necessary to introduce a simplification or a problem or the equations. with the development of computers and computer fluid dynamics (cfd) numerical solution of equations describing the flow can be obtained. 4. solving equations using cfd numerical solution of a mathematical model that describes the flow in the considered problem consists of three steps. in the first step, the area is discretized. result of discretization of space is called a geometric grid. on the defined geometric grid it is necessary to discretize the partial differential equations of the mathematical model, respecting specific boundary conditions. the discretization of the equations is carried out by some of dss vol. 2, may 2021, pp.79-85 82 the known methods (finite volume method, finite element method, finite difference method etc.). result of discretization of partial differential equation on given geometric web is a system of algebraic equations. the nonlinear system of equations is solved iteratively by a procedure that involves solving a system of linear algebraic equations. a numerical solution is obtained, followed by its analysis, which includes a display of scalar, vector and tensor fields, integration of flow, force, moments, thermal flows, etc., and a diagram of the desired quantities. one of the main prerequisites for using a cfd model is validation model that takes place in several steps [4]:  checking the program code.  comparison of the obtained results with the available experimental data (predicting measurement errors).  sensitivity analysis and parametric study.  application of different models, geometry and initial/boundary conditions.  reports on findings, model limitations, and parameter settings. the aerodynamic drag coefficient of the sphere was used here to verify the flow model for which experimental data are available [3]. the physical model of this case, the sphere in air flow, is shown in figure 3. figure 2. sphere in air flow the diameter of the sphere in the simulations was 2.54 mm and the flow was simulated at different velocities (2; 2.5; 2.64 and 3 mach). pressure and temperature of free air flow in all simulations were: p∞ = 101325 pa and t∞ = 300 k. figure 3. drag coefficient as a function of mach number for spheres with different diameters figure 4 shows a comparison of experimental and numerical results obtained. for free air flow velocity of ma = 2.64 (point c) by numerical simulation the value of the coefficient of drag for the sphere, with diameter 2.54 mm, was cd =0.95, which is about 1% higher than the value obtained experimentally. deviation (relative difference) observed were as follows: for m = 2 the deviation was 3%, for m = 2.5 the deviation was 4%, for m = 2.64 the deviation was 5% and for m = 3 the deviation was 4%. comparing the values, very good agreement was observed between the experimental values and values determined using the ansys fluent software package. dss vol. 2, may 2021, pp.79-85 83 5. analysis of results the flow for four 5.56 mm projectiles with different (supersonic) velocities was considered in the research. the following assumptions were adopted for all simulations:  working fluid is air, an ideal gas, which is modified in accordance with compressibility and changes in thermo-physical characteristics with temperature.  density and viscosity depend on temperature, and cp and thermal conductivity are considered constant.  the parameters of free air flow were: p∞ = 101325 pa and t∞ = 300k.  the flow around the projectile is considered compressible and turbulent.  discretization of the spatial domain was performed by non-uniform unstructured mesh.  a "density-based solver" was used, developed for compressible high-speed flows.  the equations were linearized in implicit form, i.e. for given variable, unknown in each cell was calculated using relations that include existing and values from adjacent cells. the flow field around the projectile and the aerodynamic drag coefficient were determined by using fluent program for specified conditions. four small-caliber projectile were used for num. simulations; for these projectiles experimentally determined values of aerodynamic drag coefficient [6] were known. models used were:  5.56 mm ss109,  5.56 mm m855,  5.56 mm l110,  5.56 mm, m856. simulations with free flow for each of the projectiles was performed for velocities in the range of 1.2 up to 3 mach for the following values of mach numbers: 1.2; 1.5; 1.7; 2; 2.5; 2.64 and 3. although all observed projectiles consist of a front part, a cylindrical part and a rear part, on projectiles ss109 and m855 the rear part have the shape of a bevelled cone and on projectiles l110 and m856 the rear part have the edged shape. for this reason, two groups will be formed in the analysis of results. the first group consists of projectiles with a conical rear part, ss109 and m855, and the second group consists of projectiles with a edged rear end, l110 and m856. the results of the simulations, in the form of the drag coefficient values, for the first group of projectiles are shown in figure 5. in figure 5. are also presented the results of experimental tests for projectiles ss109 and m855. figure 4. drag coefficient vs mach number for projectiles 5.56 mm, models ss109 and m855 [5] 0.25 0.3 0.35 0.4 0.45 0.5 1 1.5 2 2.5 3 cd ma ss-109/m855 ss-109 m855 experimental data ss109 experimental data m855 dss vol. 2, may 2021, pp.79-85 84 from the figure 5. it can be seen that the agreement of experimental and numerical data in supersonics is very good and the maximum rel. error is 2%. agreement in transonics is somewhat lower, with rel. error of 10%. it can be noticed that the 5.56 mm ss109 projectile has a lower drag coefficient than the 5.56 mm projectile m855 in the supersonic range. observing the pressure distribution [6] around the projectiles 5.56 mm, ss109 and m855, shows that the ss109 projectile has a lower maximum pressure at the top of the front part in relation to the pressure at the top of the front part of the projectile 5.56 mm, m855; this also results in less drag on this part of the projectile. if we compare the pressure distribution at the rear for these two projectiles, it can be seen [6] that the m855 projectile has a lower bottom pressure than the ss109 projectile at the same velocity flow, which results in a higher coefficient of drag for this part and in accordance with the theoretical considerations 5.56 mm projectile ss109 has a slightly larger slenderness of the front part, significantly higher slenderness of the rear end and approximately the same overall slenderness in relation to the 5.56 mm m855 projectile; although it has larger angle of inclination of the rear cone, which is unfavorable, it can be stated that it is better aerodynamically shaped from a 5.56 mm projectile, m855, for flight at supersonic speeds. simulation results, drag coefficient vs ma number, for the second group of projectiles, projectiles 5.56mm, l110 and m856, are shown in figure 6. together with the experimental data. figure 5. drag coefficient vs. mach number for 5.56 mm projectiles, models l110 and m856 [5] on figure 6. it can be seen that the agreement of the experimental with the numerical results is very good and that many points actually match. observing the pressure distributions [6] flowing around the front of the 5.56 mm projectile l110, and around the front part of the projectile 5.56 mm m856, it can be noticed that the pressure at the top of the front of the projectile m856 is less than the pressure at the top of the projectile l110, which also results in less drag on this part. the front of the l110 projectile is also slimmer from the front part of the m856 projectile, resulting in a lower drag coefficient of the front part of the projectile. considering the pressure distribution at the rear of the l110 projectile and at the rear projectile m856, a lower pressure is observed at the rear and at the bottom of projectile 5.56 mm l110. although the m856 projectile has a greater slenderness of the rear and smaller coefficient of drag at the bottom, it can be concluded that the greatest influence on the total coefficient of drag in the supersonic area have the shape and slenderness of the front part of the projectile. figure 6. shows that the 5.56 mm projectile l110 has a lower drag coefficient than projectile 5.56 mm m856 in the considered velocity range. in the range of velocities up to mach 1.5, the trend of the l110 projectile drag curve is the same as the trend of the coefficient curve for projectile m856. at the flow rate m = 1.7, the value of the drag coefficient projectile l110 approaches the value of the drag coefficient of the projectile m856, where the rel. difference is less than 5%. with a further increase in the flow rate, this difference decreases and for m = 3 it is less than 4%. more data from this research can be found in reference [6]. 0 0.1 0.2 0.3 0.4 0.5 1 1.5 2 2.5 3 cd ma l110/m856 l110 m856 experimental data m856 experimental data l110 dss vol. 2, may 2021, pp.79-85 85 6. conclusions in this paper, the influence of projectile shape for 5.56 mm ammo on aerodynamic drag coefficient is analyzed at supersonic velocities, using computational fluid dynamics. during these analyses, the following was found:  shorter, blunt projectiles have a higher drag coefficient than slender projectiles.  in the supersonic range, the length of the fornt part has a large influence on the drag coefficient and with increasing slenderness of the front of the projectile comes a significant reduction of the coefficient of drag.  at higher (supersonic) velocities, the front of the projectile shaped like a secant has the lowest drag, less so than the conical and tangential front shapes.  the rounded tip of the projectile will result in less drag than the blunt tip.  increasing the slenderness of the rear part of the projectile reduces the coefficient of drag and for supersonic velocities the optimal length of the rear part is between 0.5 and 1 caliber.  the optimal value of the rear cone angle, at supersonic speeds, is 7. in the ansys fluent software package, based on a theoretical consideration of the supersonic projectile flow, a system of equations is chosen to describe the flow of air around projectiles. the domain in which the calculation is performed has been defined and boundary conditions have been set. from the offered software options for solving equations, the solving model was chosen and for each simulation the initial conditions were defined. before num. simulations for projectiles, the model was verified based on the aerodynamic drag coefficients of the sphere for different flow velocities. analysis of the influence of projectile geometrical characteristics on the drag coefficient at zero yaw angle was performed based on the results of numerical simulations. they are simulated for 5.56 mm projectile, ss109, m855, l110 and m856 models. these projectiles have similar outer shape: front part in the shape of a secant, cylindrical part and end part. they differ in the slenderness of individual parts of the projectile, in the slenderness of the whole projectile, by the radii of the ogive, by the shape of the rear part of the projectile. for each of the projectiles, 7 simulations were performed for ma = 1.2; 1.5; 1.7; 2; 2.5; 2.64 and 3. the greatest influence on the drag of the projectile has the shape and slenderness of the front part of the projectile; 5.56 mm ss109 and m855 projectiles have lower slenderness compared to projectiles 5.56 mm l110 and m856. regardless of the slenderness and how the ss109 and l110 projectiles are different they show similar aerodynamic characteristics in terms of the influence of their shape on drag; subsequent analysis of the results concluded that these two projectiles in some parts of the supersonic regime have the same drag. the drag analysis showed that the ss109 and l110 projectiles have less drag compared to projectiles m855 and m856. references [1] s. janković, aerodynamics of projectiles, faculty of mechanical engineering, belgrade, 1979. [2] anderson, j., modern compressible flow, mcgraw‐hill publishing, singapore, 1990. [3] mccoy, r., modern exterior ballistics: the launch and flight dynamics of symmetric projectiles, schiffer publishing ltd, 2nd edition, pennsylvania, 2012. [4] blazek, j., computational fluid dynamics: principles and appications, elsevier science ltd, oxford, uk, 2001. [5] sabanovic t., “analysis of influence of projectile shape on its drag coefficient for 5,56 mm ammunition using cfd”, mechanical engineering faculty, university of sarajevo, 2021. microsoft word 23-28_228.doc issn 2744-1741 defense and security studies original research vol. 4, january 2023, pp.23-28 https://doi.org/10.37868/dss.v3.id228 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 23 indonesia's role in the g20 presidency during the conflict between russia and ukraine ria purwati1*, hikmat zakky almubaroq2, edy saptono3 1,2,3 republic of indonesia defense university, faculty of defense management, indonesia *corresponding author e-mail: riapurwa21@gmail.com received jan. 13, 2023 revised jan. 31, 2023 accepted feb. 1, 2023 abstract indonesia was appointed as the g20 presidency holder at the 2020 riyadh summit and handed over from italy on october 31, 2021 in rome, italy. along with the g20 presidency activities in indonesia, the conflict between russia ukraine heated up again in early february 2022 after the russian fighter fleet attacked the ukrainian border, precisely in belarus. various impacts were felt by countries around russia-ukraine including indonesia. indonesia as the holder of the g20 presidency in 2022 must take a stand against russia invading ukraine. this paper uses qualitative research methods, data collection techniques in this paper are based on internet-based research. the indonesian government as the g20 presidency has also conducted political, legal and security negotiations that not only talk about the issue of war that occurred between russia and ukraine in early 2022 but also bring the main issue of the economy. indonesia's duty according to the constitution is to encourage that world issues can still be resolved in the g20 forum. indonesia's stance in realizing world peace is enshrined in the preamble of the 1945 constitution. in an effort to create world peace, indonesia is considered to still have to prioritize wise steps. © the author 2023. published by arda. keywords: presidency, g20, indonesia, russia, ukraine 1. introduction the global financial crisis in 2007 has created a negative impact on both developed and developing countries. the global financial crisis occurred due to a lack of international coordination that was responsive to the crisis and unaccountable financial sector regulations (excessive risk taking). the global financial crisis caused developed countries to experience a downturn in their financial sector and impacted the real sector, while developing countries were affected in the field of trade and foreign investment. so the idea of the g-20 leaders meeting group was formed to organize a g20 summit for the leaders or heads of state of the g20 group in washington dc on november 15, 2008 [1]. g20 members began coordinating joint action through an assessment process that identified common goals for the global economy, the policies needed to achieve them, and progress toward meeting those common goals. the fact that gdp per capita in g20 countries is on a lower growth path than before the global financial crisis is a major concern for the g20. nonetheless, employment levels have risen to almost pre-crisis levels. the g20 is a multilateral cooperation forum consisting of 19 major countries and the european union that have middle to high income classes, developing countries to developed countries. g20 members consist of countries from various regions in the world including the united states, canada, mexico, argentina, brazil, united kingdom, germany, italy, france, russia, south africa, saudi arabia, turkey, china, japan, south korea, india, indonesia, australia and the european union. the g20 has no permanent leader or chairman, while the presidency function is held by one of the members for one year [2]. dss vol. 4, january 2023, pp.23-28 24 indonesia was confirmed as the g20 presidency holder at the 2020 riyadh summit and handed over from italy on october 31, 2021 in rome, italy. indonesia's g20 presidency officially begins on december 1, 2021 until the next presidency handover at the summit at the end of 2022. g20 indonesia consists of various meetings that will be held in several cities in indonesia. about 19 cities besides bali will be involved such as jakarta, bogor, semarang, solo, batam bintan, medan, yogyakarta, bandung, sorong, lombok, surabaya, labuan bajo, lake toba, manado, malang and others. the g20 presidency in 2022 was the first time for indonesia to join the g20 since the international forum was established in 1999. at that time, indonesia was recovering from the 1997-1998 economic crisis and was considered an emerging economy with enormous economic size and potential in the asian region. indonesia was the only asean and g20 member that played an important role in the recovery of the world's health and economy. the 2022 g20 presidency in indonesia could be the right momentum for the indonesian government to reset its focus on the long-term development agenda and to realign the post-covid-19 recovery agenda. indonesia has the opportunity to lead the g20 presidency in harmonizing several global and regional issues. the priority issues discussed at the g20 presidency are understanding the challenges and the need for collective action so that indonesia will focus on three main pillars at the 2022 g20 presidency namely the global health architecture, sustainable energy transition and digital and economic transformation. along with the g20 presidency activities in indonesia, the conflict between russia ukraine heated up again in early february 2022 after the russian combat fleet attacked the ukrainian border, precisely in belarus. the russian troops sent to ukraine are estimated to be in large numbers and can be used as a force to invade ukraine. this was the cause of the escalation of tensions between russia-ukraine after russia had previously been angry at ukraine for having good relations with nato countries [3]. the russia-ukraine conflict has created a catastrophic humanitarian crisis and threatened the stability of geopolitical relations. the war has added to growing concerns of slowing global growth, rising inflation and debt, and a surge in poverty. the main impact of the russia-ukraine conflict on the world economy is rising energy prices and declining confidence in global financial markets, coupled with massive international sanctions against russia. while ukraine is not a significant trading partner for any major economy, it is russia that has a large exposure to the eu and the uk. countries such as china, the united states, germany, france and italy represent one of russia's main import partners, with russian demand accounting for between 1.3-7 % of its gdp [4]. various impacts are felt by countries around russia-ukraine including indonesia. indonesia as the holder of the g20 presidency in 2022 must take a stand against russia's invasion of ukraine. the geopolitical condition caused by the russia-ukraine war is one of the risks faced by the indonesian g20 presidency in 2022. the g20, which was established as a forum for global economic cooperation, is overshadowed by the russiaukraine conflict. according to finance minister sri mulyani, the conflict is a challenge that threatens the values of the g20. for indonesia, managing a meeting in the midst of conflict is a challenge in itself because the indonesian g20 presidency must continue to run according to the agenda of strategic discussions that not only concern indonesia but also the world [5]. there is a sad history in the world economy when there was a monetary crisis that struck from 1997 to 1999. the monetary crisis that occurred led to a movement formed by finance ministers from several major countries in the world. this was later named the g7 or the group of seven. this forum was formed as a response to the concerns that plagued the world community as a result of the monetary crisis that occurred at that time. in 1997 the monetary crisis spread in the asian continent, especially thailand, which experienced a decline in the value of the baht currency. this is because foreign currencies have a minimal nominal amount so that thailand is unable to maintain the value of the baht currency against the united states dollar. this then made thailand have a large debt, which resulted in an economic crisis as a result of the decline in the value of the currency. the development and progress of the world is very much determined by the global commitment in realizing developed and developing countries and having a balance in advancing the economy, environment and social. this commitment is very important in order to synergize the steps and policies of countries in the world in achieving the same goal of prosperity for all. indonesia's involvement in this matter is very important because on several occasions indonesia has become one of the countries capable of synergizing world welfare and peace, one of which is through indonesia's role in initiating countries that are members of asean. therefore, dss vol. 4, january 2023, pp.23-28 25 it is not impossible that in 2022 indonesia will be asked to be the g20 presidency which will automatically host the g20 summit in 2022 [6]. in carrying out its duties at the g20 presidency, indonesia took part in helping to resolve the conflict between russia and ukraine. conflict resolution is a social situation in which the conflicting parties in an armed conflict want to make peace and voluntarily choose to coexist and solve the basic causes of the incompatibility of the interests of the two parties so that violence can be stopped [7]. then galtung [8] defines 2 types of peace, namely positive peace and negative peace. positive peace is peace that creates an atmosphere of harmony and harmony between parties who were previously in conflict in social life. meanwhile, negative peace is peace that occurs because of the elimination of things that are seen as negative such as violence, hostility and conflict. in conflict resolution efforts, achieving peace can be done through 3 stages, namely: 1) peacemaking, this stage is the initial stage where peace is sought in conflict resolution. efforts can be made such as negotiations between the two parties and also peace planning. 2) peacekeeping, at this stage the parties must discuss how to implement the results of negotiations and peace plans that have previously been formulated. 3) peacebuilding, at this final stage the parties must rebuild a peaceful atmosphere by restarting communication and cooperation and repairing any damage caused by the conflict. this article discusses indonesia's role in the g-20 forum amid the conflict between russia and ukraine. not only seeing how far indonesia has contributed, but also how important indonesia's position is in playing its role as a member of the g-20. indonesia's contribution can be seen from how it responded to the conflict that occurred between russia and ukraine as a non-aligned country. 2. research method this paper uses qualitative research methods, which are defined as research tools, techniques, and strategies that help writers to collect, interpret and analyze data. qualitative research is a research that basically uses a deductive-inductive approach. this approach departs from a theoretical framework, the ideas of experts, and the understanding of researchers based on their experience which is then developed into problems and their solutions which are proposed to obtain justification (verification) in the form of empirical data support in the report [9]. the data collection technique in this paper is based on internet-based research. the data collected in the form of official reports and press releases from institutions/agencies are categorized as primary data. then data from mass media, articles and scientific journals that have been published are categorized as secondary data. so that the author hopes to provide an in-depth analysis in this paper. 3. results and discussion since december 1, 2021 indonesia has been the g20 presidency country which lasts throughout 2021-2022. the g20 presidency was attended by 19 heads of state, one eu institution, 20,988 delegates consisting of 429 delegates at the g20 summit, 4,581 ministerial meetings, 1,212 sherpa meetings, 8,330 working group meetings and 6,436 engagements groups meeting and is a world forum to discuss world economic issues in a sestimic manner which represents 60% of the world's population, accounts for 80% of world gdp and 75% of world trade [10]. the presence of the g20 is in principle an effort to respond to the problems of global issues, one of which is the global crisis in 1998 which hit the world including indonesia. one of the things that was declared successful in handling the crisis was the policy taken in 2008 which was then followed up through supervision and control of financial problems. the global conditions that occurred in 1998 and 2008 are repeated in 20212022 where there is a crisis due to the covid-19 pandemic which has not subsided, including the global economic crisis which has not subsided. therefore, it is necessary to synergize between g20 members in an effort to overcome the impact of the covid-19 pandemic, including indonesia. there are two important things in indonesia's involvement in the g20 forum, first as a country that seeks to match product quality standards in accordance with global consumers. in this case, indonesia has the opportunity to get input related to its products that are exported abroad. second, indonesia also gets broad market opportunities, technology transfer and open cooperation. indonesia, which has always been a vital dss vol. 4, january 2023, pp.23-28 26 point in maintaining regional stability, will be very important to be involved in the g20 forum. in addition, indonesia's involvement is also supported by the interests of a high bargaining power position, because with indonesia's position in the global forum, indonesia's decision can be used as a representation of developing countries in multilateral forums that discuss trade issues at the wto, financial issues at the imf and other relevant issues. developing countries generally have economic problems such as high inflation rates and slow economic growth. inflation is an important economic indicator, its growth rate is always sought to be low and stable so as not to cause macroeconomic impacts that are feared to have an impact on economic instability. the indonesian government through joko widodo stated at the g20 forum that indonesia is very consistent in overcoming problems related to inflation, especially during the covid-19 pandemic by emphasizing consolidation policies with economic diplomacy patterns involving trade, commercial and financial which can certainly overcome the inflation problem that occurs. indonesia's role is very important because it is not only limited to theory but real practice related to the indonesian economy. this means that the indonesian government's political and legal policy at the g20 meeting is to emphasize healthy finance between countries and include healthy competition in financial relations. this practice is certainly very important to do so that the g20 member countries are not exposed to the brink of recession. in another position, the indonesian government as the g20 presidency has also conducted political, legal and security negotiations that not only talk about the issue of war that occurred between russia and ukraine in early 2022 but also bring the main issue of the economy. although the two countries are currently still in military conflict, indonesia has a role to contribute directly in making the two countries maintain economic stability because one of the countries in conflict is the largest wheat supplier in the world, ukraine. this is very important to pay attention to so that the need for wheat is not disrupted and does not become one of the causes of inflation in both g20 member countries and non-g20 members. since 1986, the grouping of finance ministers in the group of seven (g-7) has proved quite important in its function as a forum for informal and substantive discussion on international economic issues. one of the objectives of the forum is to achieve an understanding and closer coordination among policy makers in the g7 countries. on september 25, 1999, in washington dc, finance ministers from the leading industry group group of seven (g-7) announced the formation of the group of twenty (g20). the basic objective of establishing the g20 is to discuss, study and review policy issues among industrialized countries and developing countries with the aim of promoting international financial stability [11]. g20 leaders meet annually and each g20 president invites several state guests annually. in addition, ministers of finance and central bank governors meet regularly throughout the year to discuss measures to strengthen the global economy, reform international financial institutions, improve financial regulations and implement key economic reforms needed in each of the g20 member economies. underpinning these meetings is a yearround program of meetings among senior officials and working groups that coordinate policy on specific issues. in the conflict between russia and ukraine, peacemaking and peacekeeping efforts have been carried out many times but have not really reached a peaceful and peace positive stage, because the conflict is increasingly escalating because the causes of the emergence of the conflict are not really resolved. if this is allowed to continue, the conflict will get bigger and could endanger other countries around russia and ukraine so that peacebuilding efforts are urgently needed so that the two countries can make peace in the long term and the conflict does not escalate again. to reach this stage, cooperation and support from other actors are needed as mediators from nearby countries such as turkey, belarus and our country, indonesia. in this peace process, indonesia became one of the countries that was considered capable of being a mediator and helping to resolve conflicts between russia and ukraine because indonesia already had experience in resolving conflicts, one of which was the cambodia conflict through the jakarta informal meetings in 1988 and 1989. indonesia is also a country that neutral to both russia and ukraine. indonesia as a country that adheres to the free and active principle in foreign relations confirms its consistency with this principle in the crisis between russia and ukraine. the director of europe ii of the ministry of foreign affairs of the republic of indonesia, winardi hanafi lucky emphasized that the principle of free and active does not mean that it is neutral and active, but also contributes both in the form of ideas and assistance for conflict resolution. the attitude taken by indonesia is not just following other countries, but an effort to dss vol. 4, january 2023, pp.23-28 27 voice the importance of respecting international legal norms. indonesia will also continue to encourage the use of force to stop so that all parties can resolve the conflict. according to a spokesperson for the ministry of foreign affairs, teuku faizasyah said that there were four points conveyed by the government of indonesia regarding its position on ukraine. first, indonesia is concerned about the escalation of armed conflict in ukrainian territory which is very dangerous to the safety of the people and has an impact on peace in the region. second, indonesia emphasized that it complies with international law based on the un charter regarding the integrity of a country's territory, and condemned any actions that threaten the territory and sovereignty of a country. third, indonesia reiterated that all parties should prioritize negotiations and diplomacy to end conflicts and prioritize peaceful resolution. fourth, the embassy of the republic of indonesia has taken steps to save indonesian citizens in ukraine according to the plan that has been prepared [12]. indonesia made peace efforts by holding meetings with president zelensky as president of ukraine and president vladimir putin as president of russia to open up space for dialogue between the two as a peace effort and encourage an end to the conflict between russia and ukraine. in addition, indonesia's role was even greater during the indonesian presidency at the g20 forum. indonesia's task according to the constitution is to encourage world issues to be resolved in the g20 forum. indonesia's attitude in realizing world peace has been contained in the preamble to the 1945 constitution. in an effort to create world peace, indonesia is considered to still have to put forward wise steps. 4. conclusions indonesia was confirmed as the g20 presidency holder at the riyadh summit 2020 and handed over from italy on october 31, 2021 in rome, italy. the 2022 g20 presidency in indonesia could be the right momentum for the indonesian government to reset its focus on the long-term development agenda and to realign the post-covid-19 recovery agenda. indonesia has the opportunity to lead the g20 presidency in harmonizing several global and regional issues. the priority issues discussed at the g20 presidency are understanding the challenges and the need for collective action so that indonesia will focus on three main pillars in the 2022 g20 presidency, namely the global health architecture, sustainable energy transition and digital and economic transformation. along with the g20 presidency activities in indonesia, the conflict between russia ukraine heated up again in early february 2022 after the russian fighter fleet attacked the ukrainian border, precisely in belarus. the russia-ukraine conflict has created a catastrophic humanitarian crisis and threatened the stability of geopolitical relations. various impacts are felt by countries around russia-ukraine including indonesia. indonesia as the holder of the g20 presidency in 2022 must take a stand against russia's invasion of ukraine. the geopolitical condition caused by the russia-ukraine war is one of the risks faced by the indonesian g20 presidency in 2022. the indonesian government as the g20 presidency has also conducted political, legal and security negotiations that are not only talking about the issue of war that occurred between russia and ukraine in early 2022 but also bringing the main issue of the economy. indonesia's duty according to the constitution is to encourage that world issues can still be resolved in the g20 forum. indonesia's stance in realizing world peace is enshrined in the preamble of the 1945 constitution. in an effort to create world peace, indonesia is considered to still have to prioritize wise steps. declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. references [1] w. r. astuti, l. m. fathun, "indonesia's economic diplomacy in the g20 economic regime during the joko widodo administration", intermestic: journal of international studies, vol. 5, no. 1, pp. 47-68, 2020. dss vol. 4, january 2023, pp.23-28 28 [2] kominfo, g20pedia, jakarta: djikp kominfo, 2022. [3] s. hidriyah, "escalation of russia-ukraine tensions", research center of dpr ri expertise agency, 2022. [4] d. dano, "analysis of the impact of the russia-ukraine conflict on indonesian fuel oil prices", cendekia: journal of science, vol. 2, no. 3, pp. 261-269, 2022. [5] m. natalia, june 16, 2022. [online]. available: https://ekbis.sindonews.com/read/800039/33/sri-mulyanibeberkan-dampak-perang-rusia-ukraina-terhadap-pertemuan-g20-1655374018. [6] m. junaidi, "indonesian legal politics in controlling world inflation through the g20 agreement instrument", journal of ius constituendum, vol. 2, no. 2, pp. 207-215, 2022. [7] r. &. a. v. kazansky, "conflict resolution approaches towards smart sustainability of internal relations", entrepreneurship and sustainability issues, vol. 6, no. 3, pp. 1468-1484, 2019. [8] galtung, "peace studies and conflict resolution: the need for transdiciplinarity", transcultural psychiatry, vol. 47, no. 1, pp. 20-32, 2010. [9] hardani and et al, qualitative & quantitative research methods, yogyakarta: science library, 2020. [10] martono et al, indonesia 2022 g20 summit: russia vs ukraine war, security and gender, purbalingga: cv. eureka media script, 2022. [11] c. larasati, e. d. natasya, "indonesia's role in the g-20: opportunities and challenges", journal of international relations, vol. x, pp. 42-54, 2017. [12] t. f. arbar, "indonesia's position on the russia-ukraine war", june 30, 2022. [online]. available: https://www.cnbcindonesia.com/news/20220302182710-4-319672/posisi-indonesia-dalam-perang-rusiaukraina. microsoft word modif 3.docx issn 2744-1741 defense and security studies original research vol. 4, january 2023, pp.15-22 https://doi.org/10.37868/dss.v4.id224 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 15 concept of the defense material system for the security of indonesian national armed personnel against threats mahyaruddin mrp1*, sovian aritonang2 1,2 the republic of indonesia defense university, faculty of defense technology, motion power technology, indonesia. *corresponding author e-mail: mahyarudin.mrp@tp.idu.ac.id received jan. 9, 2023 revised jan. 29, 2023 accepted feb. 1, 2023 abstract it is essential to have materials that can support armor systems for the application of body armor composed of anti-ballistic material from coated fibers in trials in order to defend military personnel with better ballistic performance who are lighter against growing threats and conflicts. to support defense-related ballistics. new materials used in personnel protection systems are the subject of this discussion. as ballistic shields, fiber composite materials are currently used due to their light weight and high flexibility. this essay also discusses a thorough analysis of mechanism performance and failure. this study's goal is to advance knowledge about composite material body armor that is covered with a soft spall liner material, which can be used as a model for lightweight, affordable, and safe designs for military troops in times of conflict. © the author 2023. published by arda. keywords: body armor, fiber materials, ballistic protection. 1. introduction one of the ways the development of the defense industry in the area of materials supports the indonesian national armed defense equipment's availability in preserving and maintaining the security of the territory of the unitary state of the republic of indonesia. one of them is the development of bullet-resistant materials, also known as armor, which has been widely carried out through the development of new materials, composition integration, heat treatment, surface coating, and the manufacture of composites made of both metallic and non-metallic materials[1]. in order to increase defense mobility, particularly in the technology of the defense sector, namely in the material section, the government has developed a policy relating to updating and modernizing defense and security equipment (alpahankam), known as the minimum essential force. [2]. the protection of protective armor parts used to protect a person, vehicle, or device from penetration risks that may occur from devices used for explosive or ballistic events is one highly significant material development. protective armor was typically comprised of metal, ceramic sheet, or a combination of these materials. these materials can be made better despite generally offering decent protection. more specifically, it would be great to offer armor that may be lighter than conventional armor [3]. developing armor that can protect against various projectile threats, such as solid particles and molten metals, is desirable, for example composite fiber material. furthermore, it is better to have defensive armor that is made of materials that are inexpensive and simple to build. similar to soft body armor, stiff plates that shield vital organs from small-arm fire can be added to body armor. body armor has historically had to function against both deformable (bullets) and non-deformable (shrapnel) threats in order to meet international military requirements. usually, each end user develops their own performance requirements. it may incorporate widely accepted (public) standards at times, either with or without the need for extra testing [4]. dss vol. 4, january 2023, pp.15-22 16 general performance tests, such as those commonly referred to as the v50 test and the v0 test, may be used to test soft body armor. in order to calculate the velocity (v) at which 50% (v50) or 0% (v0) of the projectile completely penetrates an object, it is necessary to repeatedly strike the target with the threat [5]. the standard polymer fiber materials that are used into the present armor protection systems for military vehicles against threats are the first thing we discuss in this review. the review is then divided into four sections, which each highlights a superior mechanical characteristic of polymer composites created for ballistic purposes. epoxy-based composites have a great potential for application in military vehicle body armor in times of war to shield soldiers from threats as an alternative to aramid materials typically utilized in multi-layered armor systems (mas) [6]. 2. research method this paper is review article which explained about the behavior of the defense material concept in protecting indonesian national armed personnel is examined in this research using a qualitative approach of literature review. based on research findings relating to the subjects and ideas that were acquired from earlier researchers and practitioners, the discussion or analysis is conducted. one method of research is conducting a literature review. comparing literatures to other research methods, they each have their unique challenges. because doing a study of an issue that has to be solved in relation to the theory to be utilized, the model to be used, or the method to be used calls for a high level of understanding from researchers. finding and determining the literature that is pertinent to the topic is one of the stages in this literature review research. this activity calls for a high concentration on locating data sources, particularly secondary data in the form of journals, articles, and books; the more sources used, the better the results. filter the sources that have been acquired for use in problem-solving by performing literature screening. at this point, the literature review's difficulty level is at its highest since it must be able to fill in any gaps in the current theories using sources, analyze the benefits and drawbacks of each source, and conclude based on the discussion's findings to provide a solution to the problem. 3. results and discussion 3.1 conditions structure protection from threats studying the development of military equipment is essential, especially in protecting soldiers from enemy threats while maintaining a high level of personnel mobility. this is the result of advances in weapons technology, particularly in the field of materials. because the tni must be free to move in the field, the performance of the necessary personal protective equipment must also be good. the indonesian national army needs to be protected from threats, so protection requirements are important. figure 1. concept of threat protection requirements. dss vol. 4, january 2023, pp.15-22 17 figure 1 shows the key factors that must be taken into account for protecting military vehicles from threats are ballistic protection, mine protection, noise levels, and the environment. when there is a threat, these components are in the body armor and spall liner to protect military vehicles, especially porcelain. in military operations and peacekeeping, military vehicles are crucial. the type and level of armor protection required for many military vehicles depends on the objective. combat vehicles need to be protected from projectiles, shrapnel, explosive bursts, missiles, and other hazards that could endanger the lives of military personnel [7]. 3.2 body armor made of ballistic panel composite with the growth in threats and conflicts over the past few decades, there has been a lot of interest in the development of personal protection systems with improved ballistic performance and less weight. in this study, many nanomaterials, including carbon nanotubes and graphene with advanced structural and mechanical properties, as well as their strengthening potential of armor composites, are typically used as polymer fibers in the manufacture of body armor [8] examined using a variety of recent studies that are listed in the literature. additionally, natural fibers are incorporated into multi-layered armor systems and ballistic testing that support their importance in the near future. the new materials that are used in specific and important body armor protection systems with the goal of creating the durable and lightweight body armor of the future are the main subject of this brief. table 1. mechanical properties of high-performance polymeric fibers [9] fiber density, (r), (kg/m3 ) modulus (e), (gpa) specific strength (mpa/(g/cm3)) strength (s), (gpa) strain to fracture (e), (%) specific modulus (mpa/(g/cm3)) sonic velocity, vs, (m/s) specific energy absorption capacity (m2 /s2) nylon 6 1140 3 0,44 0,5 18–26 2,63 1622 57,017 s2 glass 2500 86 1,8 4,5 1,8–5,4 34,4 5865 48,600 cotton 1550 6–11 0,19–0,45 0,3–0,7 6–7 3,87–7,10 2663 15,806 silkworm silk (bombyx mori cocoons) 1320 5 0,38 0,5 15 3,79 1946 28,409 spider silk (dragline of nephila) 1320 22 0,98 1,3 40 16,67 4082 196,969 m5 fiber (goal) 1700 450 5,59 9,5 2,0-2,5 264,71 16,269 69,852 m5 fiber (conservation) 1700 300 5 8,5 2,5 176,47 13,284 62,500 zylon hm 1560 270 3,72 5,8 2,5 173,08 13,155 46,474 spectra 1000 970 120 2,65 2,57 3,5 123,71 11,122 46,365 dyneema sk 76 970 116 3,71 3,6 3,8 119,59 10935 70,515 kevlar 29 (1500 denier) 1440 74,4 2,01 2,9 3,38 51,67 7187 34,034 kevlar 49 (1140 denier) 1440 120 2,11 3,04 2,3 83,33 9128 24,277 kevlar 129 (840 denier) 1440 99,1 2,25 3,24 3,25 68,82 8295 36,562 kevlar km 2 (850 denier) 1440 73,7 2,32 3,34 3,8 51,18 7154 44,006 t–1000 (toray) 1820 294 3,88 7,06 2,4 161,54 12,709 46,549 p–120 2190 827 1,02 2,24 0,2 377,63 19,432 1022 swcnt-a 1400 1000 9,29 13 16 714,29 26,726 742,857 swcnt-b 1400 1000 37,86 53 16 714,29 26,726 3,028,571 table 1 displays the relationship of speed and energy absorption capacity in addition to the types of materials punched from the mechanical properties associated with their individual strengths (toughness) [8]. there is a lot of potential for armored applications in the new high-performance fibers based on polypyridobisimidazole that also have very high specific energy absorption capacity and sonic velocity. table 1 illustrates the specific strength of the material plotted against the specific stiffness in figure 2, while the sonic velocity plotted dss vol. 4, january 2023, pp.15-22 18 against energy absorption capability (toughness) is shown in figure 2. due to its extremely low specific energy absorption capacity, ultra-high modulus carbon fiber, which has the highest strain wave velocity when compared to other fibers, is frequently employed in ballistic applications. figure 2. specific tensile strength and modulus of high performance fibers [10]. figure 2 illustrates the relationship between high-performance fibers' specific tensile strength and specific tensile modulus when the latter is determined from bending tests and employed in structural composite applications. 3.3 spall liner for soft body armor armored equipment mounted on the hull of a ground vehicle protects the soldier inside the vehicle to increase survivability. there are additional components that exist inside and outside the ground vehicle but do not add to its structural integrity. the composite used is referred to as a spall liner. the term "spall liner" refers to soft materials that are installed in the crew compartment of vehicles and line the interior surfaces of tanks, combat vehicles, and personnel carriers as a form of interior protection. these materials are typically made of laminated aramid fiber, glass fiber, or high density polyethylene (hdpe). the purpose of the spall liner is to shield the defensive personnel from being struck by fragments (spall) created during combat. if the armor system is "overmatched," which is the phrase used when the incoming bullet has more penetrating strength than the armor's stopping capability, spall liners can be added as additional security [6]. figure 2 an d show in examples of a spall liner that helped save individuals who were outclassed. table 2. physical properties of glass fiber, aramid fiber, and ultrahigh-molecular-weight polyethylene (uhmwpe) fiber [7][10] fiber density (g/cm3) young’s modulus (gpa) tensile strength (mpa) uhmwpe fiber 0,97 62-132 2200-3900 aramid 1.44 70-112 1880-2860 s-glass 2.49 89 4750 e-glass 2.55 90 2000 dss vol. 4, january 2023, pp.15-22 19 characteristics of the spall liner material, a molecular structure and high-performance chemical and polymer surfaces that is used to make body armor protection vehicles. table 2 displayed to one of the materials that doesn't contain chemical components that are susceptible to attack from aggressive agents is uhmwpe, which has a low surface energy and is very resistant to water, humidity, most chemicals, uv radiation, and microorganisms. this allows it to bond with other polymers and adhere to surfaces for coating or more challenging painting. performance of composite varies with threat. as a result, uhmwpe is a material that is very effective at reducing the threat posed by deformable bullets. for example, uhmwpe can be as little as half to one third the weight of aramid and glass composites and still perform comparably well in stopping typical deformations that an assault rifle or sniper rifle threatens to do on its own. uhmwpe often uses 20– 50% less material for the same performance in terms of fragment protection. it is difficult to predict how different composite materials, such metal or ceramic, will operate in a system composed of several components [6]. 3.4 vehicle spall liners thermoset resins and thermoplastic resins are two types of polymer matrices that are frequently utilized in the military. phenolic, epoxy, vinylester, and polyester are the four most often used thermoset resins in ballistic composites. phenolic resins are frequently selected because they work well with glass and aramid fibers and are fire retardant, liquid and chemical resistant, stiff, and have good ballistic efficiency. because of its excellent toughness, high mechanical and thermal qualities, superior water and thermal resistance, low shrinkage rate, and ease of fabrication, epoxy resin was chosen. vinylesters combine outstanding mechanical characteristics with simplicity in fabrication [11]. this para-aramid fiber is five times stronger than steel and performs better in ballistic tests than nylon. because they have benefits in several aspects, ultra high molecular weight polyethylene (uhmwpe) fibers have started to be exploited for ballistic applications recently [12]. figure 2. a spall liner is used on a light armored vehicle [7]. below is a hypothetical armored personnel carrier with a life-saving spall liner in an overmatch. as can be seen, the spall liner significantly reduced the spread of fragmentation while protecting lives. figure 3. armor design [7]. dss vol. 4, january 2023, pp.15-22 20 vehicle makers and armored integrators have created a variety of inventive connection techniques that enable soldiers to quickly install these auxiliary systems in the field with extremely basic and limited gear [6]. hardness ratings and impact load resistance are related to resistance to ballistic loads. projectile penetration will be more difficult the harder the material is. however, because to the projectile's high velocity of impact, resistance to shock loads is also necessary, necessitating considerable toughness in the material. a tank is an example of a ground vehicle that needs to have the type of armor used depending on the mission and threat environment. when operating in challenging terrain, special operations must be agile. protection is thus needed from surprise attacks as well as while confronting small arms fire. figure 4. spall liner saves lives in overmatch in hypothetical armor personnel carrier [7]. from the illustration figure 4 show is crew safety from large-caliber armor-piercing (ap) rounds, landmines, and rocket-propelled grenades. special operations vehicles, for example, cannot be constructed for this level of protection and still be agile. material selection is intended to handle the weight required to give protection from such threats. the weight or areal density of the spall liner and the material used in it all affect how far the cone angle can be reduced. as shown in table 2. composite materials with higher performance have a lower cone spall angle while being lighter in weight. utilization of the spall liner has begun to develop into a part of the overall armor system, which will also contain the hull (basic armor), spall liner within the vehicle, and additional armor protection linked to the outside of the vehicle [13]. the objective of additional armor, which is frequently high-hardness steel or ceramic, is to break or bend incoming projectiles, while the metal hull and composite spall coating are designed to catch shards [7]. table 3 displays the stanag 4569 threat level. at the bare minimum range they are anticipated to be encountered, the speeds shown in the table are the anticipated ammunition velocity. in terms of the capacity to penetrate armor, the lower threat levels are the least deadly, and this tendency grows as the threat level rises numerically. occasionally, more than one threat is defined to some extent. for instance, the penetration capabilities of two category 3 threats are comparable. both have 7.62 mm diameter high-penetrating tungsten cores, however one (b32) is significantly heavier (10.0 g vs. 8.4 g) and has a slightly slower velocity (854 m/s vs. 930 m/s) [5]. testing the area density panels above and below the intended v50 results in the answer for threat level 4 being near to the ideal solution. the answer is then extrapolated using the test findings. the most current data, level 5 testing, were conducted on panels with area densities as high as 200 kg/m2, which did not provide the necessary protection. as a result, extrapolation from the tested panel configurations led to the panel constructions proposed in the table for protection level 5. the suggested protection was extrapolated from the areal densities above and below it at all other levels . dss vol. 4, january 2023, pp.15-22 21 table 3. threat solutions and composite protection levels for stanag 4569 [5] threat ammunition v0 (m/s) threat type panel construction v50 (m/s) area density required (kg/m2) 5 25 x 137 mm apds-t, pmb 073 1258 auto cannon, apds ammunition 88 mm pmb 073 composite, 25 mm ceramic surface 1258 276 4 14,5 x 114 mm api/b32 911 heavy machine guns, ap ammunition 16,5 mm, facing ceramic 15 mm 911 90,5 3 7,62 x 54r mm b32 api 854 assault rifles and snipers, ap wc core 25 mm api composite, ceramic facing 854 67,5 2 api bz 695 assault rifle 8 mm composite, 8 mm ceramic facing 917 46,6 1 7,62 x 51 mm nato ball 833 assault rifles/ ball round surfaceless composite panels 833 48,2 1 5,56 x 45 mm m193 937 assault rifles/ ball round surfaceless composite panels 937 38,4 when a threat from high-hardness armor with a bullet-defeating system is present, then add the right coating material. through tests and simulation, it was established that the mechanism of the bullet in armor testing includes (a) asymmetrical forces that cause the projectile to deviate from the incidence trajectory, (b) core fracture, and (c) erosion of the nose of the core. with this technique, good agreement was demonstrated between the simulated and experimental base armor penetration depths and the post-ballistic deformation pattern of perforated plates [14]. based on the threat level given in the table, it is clear that military vehicles' body armor needs to be strengthened in addition to being constructed from materials that must be appropriate for the type of threat and the need to produce materials in line with threats now in existence. 4. conclusions the desire for light, flexible, and robust bodies that can give better ballistic protection is growing as technology, particularly in the area of materials, progresses, especially in light of the increasingly deadly dangers that troops will be subjected to. polymer fibers and composites have been used to create a variety of materials that are stiff, strong, and lightweight. without a doubt, the development of fiber as ballistic protection holds significant promise for assisting and protecting indonesian national armed soldiers in the future. the most recent composite material to be developed for vehicle armor body materials is sandwich structure polymer composite material. along with the significance of soft body armor spall liner composites, which are made of a variety of materials including uhmw pe, aramid, s-glass and e-glass to composite material has good test results and can be employed as an armor body structure material to shield troops from dangers. declaration of competing interest the authors declare that none of the topics discussed in this paper are the subject of any known financial or non-financial competing interests held by the authors. dss vol. 4, january 2023, pp.15-22 22 funding information no funding was received from any financial organization to conduct this research. references [1] h. purwanto, r. soenoko, a. purnowidodo, and a. suprapto, "development of ballistic resistant materials as combat vehicle materials in indonesia: review", semin. nas. inov. dan apl. teknol. di ind. 2016, p. a.127-132, 2016. [2] y. saputro and c. s. pramudyo, "5m analysis (man, material, machine, money & method) in the development of defense technology in indonesia (case study: pt len industri)", no. november, pp. 96–103, 2022. [3] m. mehara, c. goswami, s. ranjan kumar, g. singh, and m. kumar wagdre, "performance evaluation of advanced armor materials", mater. today proc., vol. 47, no. xxxx, pp. 6039–6042, 2021, doi: 10.1016/j.matpr.2021.04.611. [4] b. schram, r. orr, r. pope, b. hinton, and g. norris, "comparing the effects of different body armor systems on the occupational performance of police officers", int. j. environ. res. public health, vol. 15, no. 5, pp. 1–8, 2018, doi: 10.3390/ijerph15050893. [5] d. fecko, d. lyle, x. gambert, “composite armor solutions for stanag 4569 ballistic protection levels,” agt, 2005. [6] p. v. cavallaro, "soft body armor : an overview of materials ,manufacturing , testing , and ballistic impact dynamics naval undersea warfare center division", nuwc-npt tech. rep. 12, vol. 12, no. august, pp. 1–22, 2011. [7] a. bhatnagar, lightweight ballistic composites: military and law-enforcement applications: second edition, woodhead publishing, 2016. doi: 10.1016/c2014-0-03657-x. [8] z. benzait and l. trabzon, "a review of recent research on materials used in polymer–matrix composites for body armor application", j. compos. mater., vol. 52, no. 23, pp. 3241–3263, 2018, doi: 10.1177/0021998318764002. [9] y. r. mahajan, “in pursuit of the ultimate body armor”, pp. 1–9, 2010. available : https://studylib.net/doc/25719402/in-pursuit-of-the-ultimate-body-armor [accesed : 29 january 2023]. [10] a. h. elkarem, "a study on dyneema fabric for soft body armor", int. j. eng. appl. sci. technol., vol. 5, no. 2, pp. 115–118, 2020, doi: 10.33564/ijeast.2020.v05i02.016. [11] h. pang, l. xu, d. x. yan, and z. m. li, "conductive polymer composites with segregated structures", prog. polym. sci., vol. 39, no. 11, pp. 1908–1933, 2014, doi: 10.1016/j.progpolymsci.2014.07.007. [12] m. r. m. isa, "processing and characterisation of aramid/carbon hybrid fibre reinforced polypropylene composites", thesis, faculty of science (department of chemistry), university of malaya, 2014. [13] m. mardiyati, "polymer composites as ballistic resistant materials", j. inov. defense and security, vol. 1, no. 1, pp. 20–28, 2018, doi: 10.5614/jipk.2018.1.1.3. [14] n. kiliç, s. bedir, a. erdik, b. ekici, a. taşdemirci, m. güden, "ballistic behavior of high hardness perforated armor plates against 7.62 mm armor piercing projectile", mater. des., vol. 63, pp. 427–438, 2014, doi: 10.1016/j.matdes.2014.06.030. microsoft word 202-article text-368-1-4-20221023.docx issn 2744-1741 defense and security studies original research vol. 3, january 2022, pp.67-73 https://doi.org/10.37868/dss.v3.id202 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 67 (16pt) (16pt) increasing cultural intelligence for military troops and civilian officers serving in the united nations organization stabilization mission in the democratic republic of the congo (monusco) (16 pt) furqan abdul rais zordi1*, siswo hadi sumantri2, m. adnan madjid3 1,2,3 indonesia defense university, indonesia (9 pt) (9 pt) *corresponding author e-mail: furqan.abdul.r.z@gmail.com received: oct 23, 2022. revised: nov 1, 2022 accepted: nov 2, 2022 abstract the democratic republic of the congo is still experiencing internal political turmoil between the tutsi and hutu tribes. therefore, the united nations through the security council established the united nations organization stabilization mission in the democratic republic of the congo (monusco) to monitor the peace process after the second congo war. several approaches must be applied so that the mission carried out is able to reconcile the conflicting actors. the purpose of this research is to find out the obstacles faced in the monusco mission and their solutions. the method used in this research is to use a literature study and to test the credibility of the data found. the peace mission carried out by monusco can be said to be quite successful despite facing several strategic and operational challenges. the use of cultural intelligence and prospect theory in pre-mission training should be done in order to increase the success of the mission. © the author 2022. published by arda. keywords: peacekeeping, cultural intelligence, prospect theory, monusco, democratic republic of the congo 1. introduction the congo conflict was caused by the protracted conflict in the democratic republic of the congo. before the conflict occurred, there were two wars that caused further conflict, namely the first congo war (africa's first world war) and the second congo war (great war of africa). this war was a civil war as well as an international military conflict that took place in the democratic republic of the congo, formerly known as zaire. the beginning of the conflict was caused by a severe economic downturn in 1996 and longstanding inter-tribal disputes under president mobutu sese who was a dictator [1]. in addition, the unstable conditions on the eastern border which were affected by the rwandan genocide also contributed to the escalation of conflicts that occurred in the country. president mobutu sese's deteriorating health condition also caused the government's authority to almost collapse. this put the militias, rebels, and soldiers at odds with each other [2]. ethnic tensions have existed for generations in zaire, especially in the east. these tensions occurred mainly between the indigenous agrarian tribe of zaire, the hutu and the tutsi who settled semi-nomadic and had emigrated from rwanda. the tutsis who emigrated to zaire before congo's independence in 1960 are dss vol. 3, january 2022, pp.67-73 68 known as banyamulenge and have citizenship rights under zairian law. while the tutsis who emigrated to zaire after 1960 are called banyarwanda, although the natives often do not distinguish these differences, they still refer to banyamulenge and banyarwanda as foreigners [3]. banyamulenge launched a rebellion aimed at seizing power in the province of kivu in the eastern part of the country of zaire. the rebellion was an anticipatory measure to combat hutu extremist forces who were trying to continue the genocide in zaire. president mobutu sese's harsh policies in dealing with rebellions made him a common enemy at all levels of society. as a result, the new uprising gained massive public support and grew into a general revolution and not just an uprising promoted by banyamulenge. the rebellious militias belonged to the alliance of democratic forces for the liberation of congo (afdl) [4]. the culmination of this war was the occupation of the capital city of kinshasa by the afdl assisted by foreign militaries from uganda, rwanda, and eritrea and the overthrow of president mobutu sese. furthermore, the power was held by the leader of the afdl, namely laurent-désiré kabila. he later changed the name zaire to the democratic republic of congo [2]. the democratic republic of the congo led by kabila shows the similarity in the method of government, this is evident where the social and economic conditions in the country have a higher and more severe level of corruption compared to the era of president mobutu sese's leadership. the economy remained in a state of disrepair and worsened under the kabila government. on the other hand, kabila started an intense campaign of centralization of government that gave rise to new conflicts with minority groups in the eastern part of the democratic republic of the congo who demanded special autonomy [5]. president kabila's leadership is also seen as a “puppet” of foreign governments. in order to dispel this image, he began to fight against his allies from abroad during the first congo war. the culmination of this event was the expulsion of all foreign troops from the democratic republic of the congo on 26 july 1998 [6]. this incident had an impact on the internal political conditions in the country. on august 2, 1998, banyamulenge in goma formed a rebel group called rally for congolese democracy (rcd) and fought against president kabila. rcd itself is also supported by rwanda and uganda [7]. on the other hand, the government of president kabila was supported by namibia, zimbabwe, angola, chan, libya and sudan [8]. in 2001, president kabula was shot and killed by rashide mizele who was his personal bodyguard. in order to fill power, joseph kabila was appointed president by the congo parliament replacing his father [9] [9]. this war ended with a peace agreement between the democratic republic of the congo and rwanda on july 30, 2002 in the pretoria accord [10] and between the democratic republic of the congo and uganda on september 6, 2002 in the luanda agreement [11]. although it has entered a period of peace with its neighbors, the democratic republic of the congo is still experiencing internal political turmoil between the tutsi and hutu tribes. therefore, the united nations through the security council established the united nations organization stabilization mission in the democratic republic of the congo (monusco) to monitor the peace process after the second congo war. in order to increase the success of the peacekeeping mission carried out by monusco in the democratic republic of the congo, several approaches must be applied so that the mission carried out is able to reconcile the conflicting actors. therefore, the authors recommend training and coaching regarding the application of cultural intelligence and prospect theory to peacekeepers serving in the democratic republic of the congo. 2. research method this study uses a documentation study which is defined as a data collection technique by studying documents to obtain data or information related to the problem under study [12]. the data collection technique is done by means of literature study. literature study is a study carried out using literature (library), either in the form of books, notes, or reports on research results from previous researchers [13]. collecting data through library research is done by looking for sources from textbooks, articles, journals, electronic media, magazines and other related sources. credibility testing is carried out by extending observations, increasing persistence, triangulation, negative case analysis, using reference materials, and member checks in order to obtain the dss vol. 3, january 2022, pp.67-73 69 degree of accuracy of the research design with the results to be achieved [12]. in addition, this study also uses several theories, which are described below: 2.1. cultural intellegence cultural intelligence is defined as a person's ability to function effectively and in diverse cultural conditions. cultural intelligence is a multidimensional construct that is intended to be used in situations where cross-cultural interactions are required due to differences in race, ethnicity, and nationality [14]. cultural intelligence is also a personality that can be developed (state-like personality) and not a personality that is stable and cannot be changed (trait-like personality). in order to measure a person's cultural intelligence, several measurements are needed based on four indicators, namely [15]:  metacognitive intelligence (metacognitive cq) metacognitive cq shows a person's mental processes in obtaining and understanding cultural knowledge, including knowledge about control over individual thinking processes related to culture [16]. skills related to metacognitive intelligence are the ability to plan, monitor, and revise mental models of personal cultural norms in order to adapt to a country or group of people. individuals who have high metacognitive intelligence are instinctively aware of the cultural preferences of others before and during interacting with them. individuals who have high metacognitive intelligence also question the cultural assumptions of a region and adapt them to their mental models during and after interactions [17].  cognitive intelligence (cognitive cq) cognitive intelligence shows a person's knowledge of norms, practices, and conventions in different cultures and is obtained from education and personal experience. individuals who have high cognitive intelligence are able to understand the similarities and differences across cultures [17].  motivational intelligence (motivational cq) motivational intelligence is the ability to direct attention and personal energy to learn and contribute in conditions that are rich in cultural differences. individuals who have high motivational intelligence are able to direct their attention and personal energy to cross-cultural conditions based on intrinsic interest [18] and belief in their cross-cultural effectiveness [19].  behavioral intelligence (behavioural cq) behavioral intelligence is intelligence that shows a person's ability to show appropriate verbal and nonverbal actions when interacting with people from different cultures. individuals with high behavioral intelligence are able to show behavior that is in accordance with conditions based on their verbal and nonverbal abilities [20]. 2.2. prospect theory prospect theory is a psychological theory that describes how a person's actions in assessing their advantages and disadvantages in an asymmetrical condition [21]. prospect theory begins with the concept of loss aversion which is an asymmetric form of risk aversion. the results of research observations show that people will react differently when faced with potential losses and potential gains. this is based on certain situations when potential losses and potential gains are faced by them. the act of selecting the existing potential is called reference dependence which can be explained as follows: (1) when a person is faced with a risky choice that leads to a potential profit, they tend to avoid risk by choosing an option that has a smaller return but has a higher level of certainty of profit. tall; (2) if faced with risky choices that lead to potential losses, they tend to take risks by preferring options that have lower returns as long as those choices have the potential to avoid losses. 3. results and discussion 3.1. obstacles in the monusco mission the united nations organization stabilization mission in the democratic republic of the congo (monusco) is a united nations peacekeeping force in the democratic republic of the congo (drc) dss vol. 3, january 2022, pp.67-73 70 created by the united nations security council in resolutions 1279 (1999) and 1291 (2000) to monitor the second congo war peace process. however, the focus of the mission being carried out shifted to dealing with the ituri conflict, the kivu conflict and the dongo conflict. prior to the issuance of un security council resolution (unscr) 1291, unscr resolution 1258 (1999) was issued with the initial aim of being a military observer in the democratic republic of the congo to observe and report on the compliance of factions in reaching a peace agreement [22]. at this time, unscr resolution 2612 (2021) is the basis used by the united nations to authorize monusco to carry out peace missions in the area [23]. at the start of implementing the measures to end the mission in the drc, it is very important to carry out an impact assessment of the monusco activities. in carrying out such impact assessments, observers may have to change the point of view used in assessing un peacekeeping actions. it should also be acknowledged that peacekeeping missions are only provided with funding sources in locations that do not have high priority and have limited strategic importance. most missions have accomplished much and assisted the international community in monitoring and preventing conflicts from escalating to massive levels of violence. given the relatively few resources allocated to large areas, the achievements of monusco have been impressive. peacekeeping missions do their best to carry out mandates that are often unrealistic or overly ambitious, and measuring their effectiveness should also involve examining the reality of implementing the mandates presented by the security council against the means and capabilities at hand [24]. some of the strategic impacts of the ppb peacekeeping mission in the drc can be traced from the mission carried out by the united nations mission in the democratic republic of congo (monuc), which was the predecessor to monusco. one of them is the success of the mission in the reunification of the country. which if the peacekeeping mission is not carried out properly, it is likely that the drc will not exist in its current form. in addition, monuc/monusco also has a strategic impact in preventing the recurrence of major violent conflicts by using its presence to enable international, national and private sector actors to provide services to the community as well as to stimulate local economies and support democratic politics. the role of monuc/monusco is also very important in monitoring, reporting, collecting and sharing information related to human rights violations in support of international criminal justice and the fight against impunity [24]. on the other hand, the mission carried out by monusco encountered several strategic obstacles, namely: (1) the decreasing level of cooperation between the un forces and the drc; (2) the role of neighboring countries in triggering instability; and (3) the absence of a winner for monuc and monusco on the security council to utilize a mutually agreed blueprint for comprehensively addressing conflict. the mission also faced a number of operational obstacles, namely (1): operational and tactical challenges due to not having adequate facilities and capacity to carry out the mission; (2) the contingent of peacekeepers who do not want to carry out the mandate given; (3) lack of effective leadership and pre-mission training; (4) the problem of multiple interpretations of what peacekeeping and mission mandates are; (5) lack of strategic communication strategies to reduce misunderstandings and to explain the mandate and mission to the drc community or even internally [24]. the rejection of the monusco mission was also voiced by the local community, for almost 25 years, the united nations has continued to renew the mandate of the monusco mission in drc, but from year to year the situation is getting worse [25]. anti-un protests have occurred in recent years. however, the demonstrations that took place in august 2022 were large-scale demonstrations. peacekeepers shoot dead civilians. the demonstration that took place claimed 36 lives, four of whom were peacekeepers. the demonstrations come amid an insurgency by the m23 armed group that has seized swathes of territory in the eastern province of north kivu. protesters say monusco has been slow and has failed to acknowledge rwanda's alleged support for the group. most residents in north kivu province and ituri province want the 12,000 monusco peacekeepers to leave the drc immediately [26]. monusco came to protect the people of drc, but there was only a feeling of insecurity. therefore, monusco has failed in its main mission to protect civilians [27]. dss vol. 3, january 2022, pp.67-73 71 3.2. applications of cultural intelligence and prospect theory in peacekeeping the use of cultural intelligence in peacekeeping is able to provide a framework for improvement of the design and implementation of cross-cultural activities. in addition, the end of the cold war forced modern military forces to be able to carry out peacekeeping operations as part of a coalition of international cooperation. it is also possible that the commando team on the ground consists of troops with diverse cultural backgrounds. therefore, the application of cultural intelligence is very important to be applied to peacekeepers in order to prepare cross-cultural leadership competencies. several ways that can be done to improve cross-cultural leadership competence can be described below [28].  modified cognitive behavioral techniques (personal reflection, planning and monitoring skills) can be used to train metacognitive intelligence.  training on traditional cultural awareness (specific knowledge about the destination country) can be used to increase cognitive intelligence.  goal setting and goal setting techniques can be used to increase motivational intelligence  dramaturgy approach by way of role playing, performance, and visual arts can be used to train and improve behavioral intelligence. an example of the use of cultural intelligence and prospect theory can be seen in the success of the garuda xii contingent that is part of the u.n. transitional authority in cambodia (untac) in cambodia. the program run by the garuda contingent emphasizes building a common identity and minimizing differences between local residents. the openness of the indonesian military camp to the local population made it easier for the garuda contingent to mingle and discuss with local residents from all walks of life. in addition, the similarity of skin color and high patience greatly benefit them in approaching groups that are quite difficult to approach. the garuda contingent always invites and includes local residents in the activities of indonesian holidays, traditions and customs at the military camp. the garuda contingent's programs such as health and dental care, video broadcasts, sports activities, and village development projects where planning and implementation always involve local communities further increase their trust in the garuda contingent. the local communities who were involved in the garuda contingent's activities were both supporters and members of the conflicting actors. this made the garuda contingent able to carry out development programs in all areas including areas controlled by the khmer rouge where this situation could not be achieved by other peacekeepers serving in cambodia [29]. the actions of the garuda contingent that benefited all parties made the conflicting actors prefer to make peace with common interests. this is in accordance with the determination of reference dependence point 1 where when a person is faced with a risky choice that leads to potential benefits, they tend to avoid risk by choosing the option that has a smaller return but has a higher level of certainty of profit [21]. 4. conclusions although there are differences in social, political and economic conditions between cambodia and the democratic republic of the congo, there are similarities in conflict between the two countries where the conflicting actors have different cultural backgrounds. by placing troops that have high cultural intelligence, the garuda xii contingent is able to increase the percentage of program success that is higher than peacekeepers from other countries. in addition, by giving benefits to all warring parties, the warring actors in the conflict in cambodia decided to make peace. this has proven to be able to restore the stability of social, political and economic conditions in the country. although there has been no research that examines the success of applying cultural intelligence to peacekeeping missions in the democratic republic of the congo, the success achieved by the garuda xii contingent on peace missions in cambodia should be applied in order to achieve conflict resolution that is accepted by all warring parties in the democratic republic of congo. dss vol. 3, january 2022, pp.67-73 72 declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. acknowledgements thanks are addressed to rear admiral tni (ret.) dr. siswo hadi sumantri., st., m.mt., m.tr.opsla., ciqnr., ciqar., ipu and tni first admiral (ret.) dr. m. adnan madjid, sh., m. hum. as a research supervisor while studying at the peace and conflict resolution study program, faculty of national security, indonesia defense university. references [1] a. abbott, "the problem of excess," sociological theory, vol. 32, no. 1, pp. 1-26, 18 march 2014. [2] g. prunier, "rebel movements and proxy warfare: uganda, sudan and the congo (1986–99)," african affairs, vol. 103, no. 412, pp. 359-383, july 2004. [3] r. lemarchand, the dynamics of violence in central africa, philadelphia: university of pennsylvania press, 2012. [4] j. pomfret, "rwandans led revolt in congo," 9 juli 1997. [online]. available: https://www.washingtonpost.com/archive/politics/1997/07/09/rwandans-led-revolt-incongo/7d210372-e307-4222-a04b-a65cd816be5f/. [5] i. w. zartman and c. arnson, "the democratic republic of the congo: structures of greed, networks of need.," in rethinking the economics of war: the intersection of need, creed, and greed, washington, d.c., woodrow wilson center, 2005, p. 154. [6] k. vlassenroot, "citizenship, identity formation & conflict in south kivu: the case of the banyamulenge," review of african political economy, vol. 29, no. 93/94, pp. 499-515, 2002. [7] j. f. clark, the african stakes of the congo war, new york: springer, 2002. [8] l. machipisa, "disarmament: sadc moves into unknown territory," 19 agustus 1998. [online]. available: http://www.ipsnews.net/1998/08/disarmament-sadc-moves-into-unknownterritory/. [9] s. baldauf, "dr congo election: kabila sworn in as rival challenges his legitimacy," 21 december 2011. [online]. available: https://www.csmonitor.com/world/africa/2011/1221/dr-congo-electionkabila-sworn-in-as-rival-challenges-his-legitimacy. [10] un, "inter-congolese dialogue," 12 december 2002a. [online]. available: https://peacemaker.un.org/sites/peacemaker.un.org/files/cd_021216_global%20and%20inclusive%2 0agreement%20on%20transition%20in%20drc.pdf. [11] un, "agreement between the governments of the democratic republic of the congo and the republic of uganda on withdrawal of ugandan troops from the democratic republic of the congo, cooperation and normalisation of relations between two countries," 2002b. [online]. available: https://peacemaker.un.org/sites/peacemaker.un.org/files/cd%20ug_020906_luanda%20agreement. pdf. [12] sugiyono, metode penelitian kuantitatif, kualitatif dan r&d, bandung: alfabeta, 2016. [13] i. hasan, analisis data penelitian dengan statistik, jakarta: pt bumi aksara, 2004. [14] p. c. earley and s. ang, cultural intelligence: individual interactions across cultures, redwood city: stanford business books, 2003. [15] s. ang, l. v. dyne, c. koh, k. y. ng, k. j. templer, c. tay and n. a. chandrasekar, "cultural intelligence: its measurement and effects on cultural judgment and decision making, cultural dss vol. 3, january 2022, pp.67-73 73 adaptation and task performance," management and organization review, vol. 3, no. 3, pp. 335371, november 2007. [16] j. h. flavell, "metacognition and cognitive monitoring: a new area of cognitive–developmental inquiry," american psychologist, vol. 34, no. 10, p. 906–911, 1979. [17] r. brislin, r. worthley and b. macnab, "cultural intelligence: understanding behaviors that serve people’s goals," group & organization management, vol. 31, no. 1, pp. 40-55, 1 february 2006. [18] e. l. deci and r. m. ryan, intrinsic motivation and self-determination in human behavior, new york: springer us, 1975. [19] a. bandura, "social cognitive theory in cultural context," applied psychology, vol. 51, no. 2, pp. 269-290, 2005. [20] w. b. gudykunst, s. ting-toomey and e. chua, culture and interpersonal communication, new york: sage publications, 1998. [21] d. kahneman and a. tversky, "prospect theory: an analysis of decision under risk," econometrica, vol. 47, no. 2, pp. 263-292, march 1979. [22] unscr, "resolution 1258: the situation in the democratic republic of the congo," 6 august 1999. [online]. available: http://unscr.com/en/resolutions/1258. [23] un, "security council extends mandate for united nations organization stabilization mission in democratic republic of congo, unanimously adopting resolution 2612 (2021)," 20 december 2021. [online]. available: https://press.un.org/en/2021/sc14743.doc.htm. [24] a. novosseloff, "the effectiveness of the un mission in the democratic republic of the congo," 19 december 2019. [online]. available: https://theglobalobservatory.org/2019/12/effectiveness-unmission-democratic-republic-of-the-congo/. [25] w. mbokani, interviewee, why we’re protesting against un peacekeepers in dr congo. [interview]. 18 agustus 2022. [26] c. sengenya, "the new humanitarian," why we’re protesting against un peacekeepers in dr congo, 18 august 2022. [online]. available: https://www.thenewhumanitarian.org/2022/08/18/whywe-re-protesting-against-un-peacekeepers-dr-congo. [accessed 23 october 2022]. [27] c. zawadi, interviewee, monusco came to secure us, but there is only insecurity. [interview]. 18 august 2022. [28] k. y. ng, r. ramayana, t. m. teo and s. f. wong., "cultural intelligence : its potential for military leadership development," in 47th international military testing association, singapore, 2005. [29] j. b. haseman, "garuda xii: indonesian peacekeeping in cambodia," joint force quarterly, pp. 8994, 1996. microsoft word 26-33_145.docx defense and vol. 1, decem https://doi.org this work is lice to share and ada authorship and in perspec innovati benjamin d 1 industrial and 2 mechanical e *correspond © the auth 2020. published by arda. 1. introdu over the pas export being egypt, saud when it com amount from weapons sal the defense to the policie defense indu one commod spending in level is impa in this indus defense ind posed by ot implemented moreover, s industry dev [3][4]. throughout developed in specializatio land equipm d security s mber 2020, pp g/10.37868/ds nsed under a cre apt the material nitial publication tives and ion syste durakovic1, d mechanical en engineering, int ding author: bd hor y uction st decade, th g the united di arabia, an mes to weapo m those two e trends is un e industry is es a country ustry in total dity would re military are acted by the try. dustry is an e ther countrie d over the do ecurity threa velopment is history, the n almost ev on production ment’s and arm studies p.26-33 ss.v1.id145 eative commons a for any purpose in this journal. d the rol em erwin trgo ngineering, inte ternational univ durakovic@ius abstract the increa civilian gra trades and about us$ trends in d with the fo bosnian de innovation positive im keywords: system he internation d states, chi nd the united on sales are t areas was u ndoubtedly t an element f chooses to p [3]. one of esult in prod ea would cau defense indu essential com es, both in te omestic prod ats encourage s the conseq defense indu very sphere n to compan ms. attribution licen e (even commer le of bos o2 ernational univ versity of saraj .edu.ba ased global ade equipme production $ 1.9 trillion efense throu focus to bos efense indust system thro mpact on the n defense ind nal transfer o na, russia, f d arab emir those from t sd 194.8 bi the us [2]. for reaching pursue, it is d the basic co ucing smalle use lower sp ustry as many mponent in p erms of host ducts of a cou e the increas quence of the ustry was se of our life. ies which be nse (https://creativ rcially), in any m 26 snian def versity of saraje evo, bosnia an demand for ent. the defe over the glo n, with a tren ugh analysis snian defens try has poten ough which national econ dustry; r&d of weapons h france and rates (uae) the us and t illion. overa the potentia decided if an oncepts of the er quantities pending in c y people dep providing sec tility and in untry. se in the dev e overall inc een as a stric the industr ecame conglo vecommons.org/l medium with an fense ind evo, bosnia and nd herzegovina r weapons i ense industry obe. current nd of increa of global def e industry p ntial to be on the national nomic perfor investment; has significa germany, an [1]. highly the western ll, the countr al sustainable nd how many e economics of another c civilian area. pend on the j curity for a c terms of im velopment of crease in the ctly military ries operatin omerates, pr licenses/by/4.0/) t acknowledgeme dustry in d herzegovina s growing f y is experien tly global m ase. this pap fense spendi perspectives. ne of the key r&d outpu rmances. innovation; ntly increase nd the larges influential c europe. in 2 ry with the m e economic g y resources w is that produ ommodity. t also, econo obs and inco country whil mposing their f this industry e country’s t branch of in ng in this br oducing ever iss orig that allows others ent of the work's n nationa fast both mi ncing an incr market trade per investiga ing and r&d it was obs players of th ut would mak national inn ed with the l st importers companies in 2016, the co most influen growth of a would be allo ducing larger this means t omic growth omes possibi le it eliminat r products th ry. in conclu total industr ndustry. now ranch have erything for n sn 2744-174 ginal research s s al ilitary and rease in its of arms is ates global d activities served that he national ke notable novation leaders in the being india n the industry mbined sale ce on overal country. due ocated for the quantities o hat increased h at the loca ilities created tes the threa hat would be sion, defense ry production wadays it ha shifted from naval, air and 1 h e a, y s ll e e f d al d at e e n s m d dss vol. 1, december 2020, pp.26-33 27 the goal of this paper to investigate perspectives of bosnian defense industry in national innovation system as well as global trends and local bosnian defense sector opportunities for generating significant added value through customized innovative solution for targeted global market. national innovation system is defined as “…set of distinct institutions which jointly and individually contribute to the development and diffusion of new technologies and which provides the framework within which governments form and implement policies to influence the innovation process. as such it is a system of interconnected institutions to create, store and transfer the knowledge, skills and artefacts which define new technologies” [5]. the defense industry is primarily a business with the main objective to maximize profit with minimal investments. also, bosnian defense industry has all potential to be recognized as one of the strategic industries for the development of the country. 2. top global market trends for the purpose of this research, global trends are reflected in two directions: spending trends and r&d trends. global defense spending continues to increase despite financial pressure due to covid-19. the global defense spending for period 1988 – 2019 is shown in figure 1. figure 1. global defense spending for period 1988 – 20191 the demand for military equipment is growing as governments around the world focus on military modernization busting worldwide defense expenditure. global defense spending reached us$1.914 trillion in 2019, and continue to grow in 2020 for about 3.9% despite coronavirus pandemic. to identify general trends in different weapons deliveries and to permit comparison between the data, stockholm international peace research institute (sipri) developed a unique system to measure the volume of international transfers of major conventional weapons using a common unit, the trend-indicator value (tiv). the tiv trends of total arm transfer for period 1950 – 2019 is presented in figure 2. figure 2. total arms transfers for period 1950 – 2019 2 1 sipri military expenditure database, https://www.sipri.org/gallery/military-spending-graphics-2019 500 700 900 1100 1300 1500 1700 1900 1985 1990 1995 2000 2005 2010 2015 2020 m ili ta ry e xp en di tu re (i n u s$ bi lli on s) year dss vol. 1, december 2020, pp.26-33 28 it is observed that tiv had been growing over the time until it achieved a peak in 1982. in period between 1982 and 2002 the tiv was significantly decreased. since 2002 the tiv has been growing until now. it is expected that covid-19 will slightly slow the tiv growth in upcoming period. the trends in r&d are focused on the artificial intelligence systems, additive manufacturing, as well as cost reduction. future weapons are not something so sci-fi nowadays. electric rifles, advanced magnetic armor, robot soldiers, etc. are all being devised today by big, both public and private institutes [6]. defense is interested in technologies, systems and processes that improve intelligence collection, analysis and dissemination across all capabilities within defense and in all domains: land, maritime and aerospace. this includes the advanced use of biometric data, as well as innovation in cyber technology to support every facet of capability development. supporting the shift from intelligence, surveillance and reconnaissance to targeting, as well as the advancement of hypersonic technology as an opportunity for defense’s space capabilities also warrant attention in this stream. the relevancy of smart defense in modern international security has been on natos list ever since 2008 financial crisis [7]. 2.1. artificial intelligence global market trends are important indicators for the contractors or companies in the global market as the more updated one is the more market area can be covered. according to case studies done [8], the defense industry shifts towards robotics, cyber weaponry and automated complex systems [9]. starting with the main technological trends, artificial intelligence (ai) has certainly become a great tool for defense industry in the sense of processing large amounts of data with which organizations have struggled over the past few years. data processing done by ai allows people to shift their focus on the results and findings in contrast to primarily producing them. advanced robots and augmented reality are some similar paths companies are already taken interests into with heavily investments already being taking places. 2.2. additive manufacturing 3d printing has become a huge disruptor ever since 2017. the militaries are already looking into the potential of printing spare parts and military equipment in-theatre to drive down costs and drive-up availability. the aerospace and defense (a&d) sector is set to become one of the biggest contributors to 3d printing’s global revenues, predicted to reach a mammoth $1.4 billion by 2019, producing parts in-house, a development that will completely reshape the relationship between contractors and manufacturers [10], [11]. 2.3. cost reduction another trend is cost technology. clean technology measures within the a&d sector include energy efficiency, waste management, recycling, use of digital and paperless products, video conferencing, and many more. according to well defined research the budget for the global defense clean technology market will increase 7.5% between 2016 and 2021. this also includes paperless documents and clean power. a difficulty defense companies face as they try to move forward with these environmentally friendly technology initiatives will be integration with current systems. however, the savings over the long run from eco-friendly and costeffective solutions are worth the initial investment. cost-effectiveness can be listed as the back bone of all the major trends. innovation is the key factor in this industry and those who are willing to adapt are those who survive. technology investments are elements that enable manufacturers to innovate on-the-go. these improvements should lower manufacturers’ costs and help them stay a relevant member of the industry. companies in sectors of the healthcare, software and internet show the substantial grow in the r&d spending over the last fifteen years, while typically spend less on r&d and it has been largely flat over recent years. 2 source: sipri trend indicator values (tivs), http://www.sipri.org/databases/armstransfers/sources-andmethods/ dss vol. 1, december 2020, pp.26-33 29 companies from south korea, israel, europe, japan, north america and china demonstrate the most significant growth in r&d spending. figure 3. r&d spending by industry3 3. current state and trend in bosnian defense industry as result of increased global defense spending, in recent years turnover of bosnian defense industry started to grow. reports say that the total income has increased for 21% and the total export has increased for 29% when compared to 2015 [12]. the defense industry is mainly based on the production of ammunition and artillery pieces. this is far away from the time when bosnia as a part of former yugoslavia, produced a wide variety of both complex and non-complex products. being a war-ravaged transition country, the reduction in production is not something out of the ordinary. ukraine, as one of the world’s super power in weapon production, experienced a huge decrease in every branch of their defense industry in their transition period of 1991 to 1999 [13]. through investments in r&d and through arms export to 3rd world countries, ukraine’s defense industry rocketed sky high again. although a small country, with small influence, bosnia can allocate the steps which ukraine undertook in order to get its industry back in its tracks. representative products of bosnian defense industry [14], [15]:  all kinds of small-arms ammunition, ranging from cal. 5.56 to 12.7 mm  artillery howitzers and mortar systems  artillery ammunition, ranging from 75 to 152 mm  mortar ammunition, ranging from 60 to 120 mm  fuses and cartridges  observing and sighting equipment  uniform and soldier protection equipment (military vests, helmets, riot control equipment, boots) recently developed:  self-propelled howitzer 155 mm with fully automatic loading (prototype made) 3 source: capital iq data, strategy and analysis healthcare computing and electronics software and internet auto industries chemical and energy aerospace and defense0 50 100 150 200 250 2005 2007 2009 2011 2013 2015 2017 2019 r& d s pe nd in g in u s$ b ill io ns year healthcare computing and electronics software and internet auto industries chemical and energy aerospace and defense dss vol. 1, december 2020, pp.26-33 30  light armored vehicle  gun 9 mm and rifle 7.62 mm  rpg 7 following the world defense industry trends and investing in r&d, bosnia can take a piece of the world trade cake. recently, bosnia developed its first fully automatic, mobile artillery piece. it complies with nato standards, is lighter than its french and serbian competition and is ought to cost less than its counterparts. the manufacturer bnt novi travnik, devised everything except the sophisticated electronics and the truck [14]. analyzing the portfolio of local defense industry, it is observed that only recently developed self-propelled howitzer is on the track with global r&d trends. to be on the track with the global r&d trends in defense, a significant upgrade of the existing product is required, and development of solution for the global market. to asses alignment of bosnian defense sector with the global trends, swot analysis is done and the results are provided in table 1. table 1. swot analysis of bosnian defense industry strengths opportunities tradition in making weapons and other metallurgy products reliable, battle tested products skilled workforce brand growth in global defense spending growing trends in smart weapon ammunition artificial intelligence autonomous complex systems bio design drones laser-based weapons to become strategic industry for bosnian economy weaknesses threats insufficient investment in r&d lack of knowledge needed for the creation of more complex weapon systems little or no r&d lack of political stability current world policies world competitors as previously explained, the strengths are analyzed as one of the internal elements of this analysis. in this case, strengths of the bosnian defense industry are tradition in making weapons and other metallurgy products, reliability of products and proven brands. on the other hand, weaknesses of the industry could either be lack of knowledge regarding producing complex weapon systems, as well as insufficient investment in research and development, which are driving forces of industry growth. tapping into the area of drones, or artificial intelligence based systems could be considered as opportunity of defense industry of bosnia, while the competitors and potential political instability as well as new global policies on defense products and distribution are perceived as threats of the industry. along with the pharmaceutical industry, local defense industry has potential to become one of the key sectors of the bosnian innovation system. innovations are key factors to generate significant added-value, to improve economic performance and to ensure business future. opportunities lie in global defense spending growth, growing trends in smart weapon ammunition, autonomous complex systems, artificial intelligence, drones. spending in defense sector on global level is continuously and significantly grooving, therefore this sector should become one of the strategic industries for the bosnian economy and country development. this is an opportunity to invest in end-user-solutions on the global market through this industry, which will have significant added value and a significant share of knowledge. dss vol. 1, december 2020, pp.26-33 31 comparing the current production program from the bosnian defense industry with global trends, it is observed that significant upgrade is required to keep pace with global trends, which requires significant investment in research and development. therefore, potential investors as well as the government should recognize their interest in this sector, explore and encourage investors to invest. the r&d expenditure for selected countries as percentage of gdp for period 1996 – 2019 is shown in figure 4. figure 4. r&d expenditure in bosnia and for selected countries4 recent spending on r&d projects in bosnia are one of the lowest in the world as well as the lowest in the region. companies and government from bosnia spend less than 0.2% of gdp on r&d projects, which is about 5 times lower than regional average (compared with neighboring countries) and about 15 times less that the average of top global investor in r&d. to improve economic performance of bosnian defense industry, investment in r&d is necessary, since there is significant positive correlation between investment in r&d and economic performance [16]. over the last decade south korea has the highest grow in r&d spending as percentage of gdp. reforms which took place in south korea would be a good model of restructuring the defense industry and the military in general [4]. making strategic alliances with countries that are already producing sorts of smart weapons would be an important step in the development of a domestic smart weapon or ammunition. obtaining the knowledge through partnerships with countries which are leaders in the market, bosnia would be able to become a regional factor in the production of smart weapons. a good example could be the israel, spain and portugal, which became regional leaders in arms production through investments in r&d, but also through their acute strategic need [17]. 4 the world bank, https://data.worldbank.org/indicator/gb.xpd.rsdv.gd.zs bosnia china eu croatia israel japan serbia turkey usa world south korea russia 0 1 2 3 4 5 6 1995 2000 2005 2010 2015 r& d e xp en di tu re (% o f g d p) year bosnia china eu croatia israel japan serbia turkey usa world south korea russia dss vol. 1, december 2020, pp.26-33 32 as already stated, bosnia’s ammunition products are already used in many nations, all over the world. they are less expensive but battle proven and reliable. so, there is a solid turf at which bosnia can aim their sights. following trends and further developing the production of arms, increases interest in products which are made in bosnia. cooperation between partners countries can definitely lead them to a profound and well-established r&d and manufacturing industry for the defense systems. for instance, in the us most of the r&d investment were made by business, which is shown in figure 5. figure 5. history of r&d expenditure in the us by business and government [18] recently the business share in the us r&d expenditure is about 67% of total gdp for r&d, while the government is about 33% [18]. 4. conclusion opportunities for bosnian defense industry in global trends are analyzed. the defense industry is primarily a business, and as in every business the main objective is to maximize profit with minimal investments. bosnia is a small country and has negligible influence in the global market of arms. this can be considered as an advantage for bosnian defense sector to be specialized on customized solutions for narrow global market rather than modular ones. customized solutions for narrow global market might be less interesting to big players, which could make some room for bosnian defense industry. current rate of expenditure in the r&d sector is not fare below world average, as well as far below regional average. to bridge the gap between the desire to invest in r&d and the provision of the necessary funds, the public private partnership model could be one with an emphasis innovative solution. in order to achieve this, it is necessary to recognize the domestic defense sector as a strategic branch for economic development. opportunities lie in growing of global expenditure for the defense products and positive trend in artificial intelligence systems. tradition in making weapons and other metallurgy products, reliable battle proven products and skilled workforce are major strengths. among the other domestic sectors, the defense industry along with pharmaceutical has the potential to deliver via r&d end user solutions, which qualifies them to generate increased added-value through the knowledge and branding. therefore, the defense industry through the r&d output may play a key role in the national innovation system and achieve notable positive impact on the national economic performances. 5. references [1] pieter d. wezeman, dr aude fleurant, alexandra kuimova, dr diego lopes da silva, dr nan tian, and siemon t. wezeman, “trends in international arms transfers, 2019,” 2020. [2] aude fleurant, sam perlo-freeman, pieter d. wezeman, siemon t. wezeman, and noel kelly, “the sipri top 100 arms-producing and military services companies, 2015,” 2016. [3] a. kuah and b. loo, “no. 70 examining the defence industrialization-economic growth relationship:the case of singapore with compliments,” 2004. [4] j. carlos and o. torrenova, “global defence industry and the asia-pacific region,” 2012. [5] metcalfe and s., “the economic foundations of technology policy : equilibrium and evolutionary perspectives,” handb. econ. innov. technol. chang., 1995, accessed: mar. 04, 2021. [online]. available: https://ci.nii.ac.jp/naid/10021355612. dss vol. 1, december 2020, pp.26-33 33 [6] c. denicolo and a. herbert, “industry top trends 2017 aerospace and defense overview,” 2017. [7] i. d. ivanov, “the diffusion of nato partnerships and their effect on alliance’s smart defense.” accessed: mar. 16, 2021. [online]. available: https://www.academia.edu/2022709/the_diffusion_of_nato_partnerships_and_their_effect_on_alli ance_s_smart_defense. [8] uk ministry of defense, “sustainable mod strategy 2015-2025.” accessed: mar. 16, 2021. [online]. available: sustainable mod strategy 2015 to 2025 gov.uk. [9] v. boulanin and m. verbruggen, “mapping the development of autonomy in weapon systems,” stockholm, 2017. [10] “three key trends hitting the defence industry in 2017 defenceweb.” https://www.defenceweb.co.za/joint/science-a-defence-technology/three-key-trends-hitting-thedefence-industry-in-2017/?catid=74&itemid=30 (accessed mar. 16, 2021). [11] “becoming a digital frontrunner in aerospace and defense.” https://www.bcg.com/publications/2017/transformation-becoming-digital-frontrunner-aerospacedefense (accessed mar. 16, 2021). [12] “trends in world military expenditure, 2019 | sipri.” https://www.sipri.org/publications/2020/siprifact-sheets/trends-world-military-expenditure-2019 (accessed mar. 16, 2021). [13] a. j. k. bailes, o. melnyk, and i. anthony, “relics of cold war: europe’s challenge, ukraine’s experience | sipri,” 2003. accessed: mar. 16, 2021. [online]. available: https://www.sipri.org/publications/2003/sipri-policy-papers/relics-cold-war-europes-challengeukraines-experience. [14] “bnt tmh tmih tvornica masina i hidraulike novi travnik bratstvo vojna industrija bih tmih tmh. bosnia and herzegovina | bnt-tvornica mašina i hidraulike, novi travnik.” http://www.bnt-tmh.ba/vojni-program/ (accessed mar. 16, 2021). [15] “unis group – bosnian defence industry.” https://www.unisgroup.ba/ (accessed mar. 16, 2021). [16] ü. ampirik and b. analiz, “paradoks ekonomi, sosyoloji ve politika dergisi paradoks economics, sociology and policy journal relationships between r&d and corporate performance: an empirical analysis in istanbul stock exchange ar---ge ve firma performansi arasindaki i̇lişki: borsa i̇stanbul,” 2016. [17] j. brauer, “the arms industry in developing nations: history and post-cold war assessment,” in arming the south, palgrave macmillan uk, 2002, pp. 101–127. [18] r. d. a. caleb foote, “federal support for r&d continues its ignominious slide.” information technology and innovation foundation, 2019, accessed: mar. 04, 2021. [online]. available: https://itif.org/publications/2019/08/12/federal-support-rd-continues-its-ignominious-slide. microsoft word 195-article text-343-1-15-20220829.docx issn 2744-1741 defense and security studies original research vol. 3, january 2022, pp.50-57 https://doi.org/10.37868/dss.v3.id195 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 50 review of indonesian government policy in procurement plan of dassault rafale fighter aircraft a. wardana1, t. b.cahyana2, h. tahdi3, y. h. yogaswara4 1,2,3,4 faculty of defense technology, indonesia defense university, indonesia *corresponding author e-mail: achmad.wardana@tp.idu.ac.id received aug. 16, 2022 revised aug. 29, 2022 accepted sept. 1, 2022 abstract indonesia's decision to procure 4.5 generation rafale fighter jets has been approved to replace obsolete aircraft, namely the us-made f-16 and the russianmade su-27 and su-30. the selection of rafale was based on indonesia's defense relationship with france which had existed for a very long time, besides that it was also based on the foreign policy adopted by indonesia, namely the free and active policy shown from several defense equipment owned by indonesia, not only from a particular country. this study aims to examine government policies in the plan to procure dassault rafale fighter aircraft for indonesia. this study uses a descriptive qualitative approach through literature review from reputable national and international journals, ebooks, and online media by exploring or explaining more broadly the government policy issues in the plan to procure the dassault rafale fighter aircraft for indonesia. the findings of this study indicate that indonesia is still lagging behind vietnam, thailand, and singapore in terms of the number of first-tier modern combat aircraft that are ready for combat. in addition, purchase of the dassault rafale aircraft must provide effectiveness to improve national defense and security by using a definitive combination of "highlow" that can be adopted from the usaf (united states air force), and also indonesia must be realistic in responding to the regional balance of power (asean) through the realization of the mef towards ief. one important factor that needs to be considered in the procurement agreement is the existence of a strong policy and commitment from the government that emphasizes the transfer of technology (tot) by sending human resources to study and do internships in the development industry. © the author 2022. published by arda. keywords: dassault rafale, combination high-low, transfer of technology, mef, ief 1. introduction the process of globalization has touched various fields of human life, in the fields of education, socio-culture, economy, politics, defense and security. they are never separated from the effects of globalization. the transformation process that aims to make people around the world into a single society and interdependent on each other is growing rapidly due to the sophistication of information and communication technology. however, the occurrence of the globalization process as a process that will bring the world under dss vol. 3, january 2022, pp.50-57 51 one control through one global power has resulted in the dominance of the world community by countries that have great powers that are able to take a role in the process. [1] for indonesia as a developing country with an area that stretches from sabang to merauke and with the fourth largest population in the world, it has not been able to take advantage of the momentum properly. indonesia's strategic position has been used by other countries in various forms, indonesia is used as a consumer in trade for other countries' products, so that indonesia is only used as a market. as an independent and sovereign country, it is fitting for indonesia to increase its defense and security forces. in order to protect the sovereignty of the nation. moreover, in recent times there have been frequent conflicts in the border areas due to illegal fishing by foreign vessels flagged by vietnam, malaysia, china and several other countries who consciously take natural resources and wealth. indonesian sea. besides that, the confrontation carried out by the chinese state over the south china sea dispute by sending several warships in the indonesian maritime border area allowed an open war for the countries with an interest in it. this further emphasizes the importance of the strength of military weapons for the defense and security of the nation. mainly to anticipate conflicts in the southeast asian region by strengthening the military weapons of the indonesian national army (tni). indonesia continues to strengthen its military defenses under the command of defense minister prabowo subianto. recently, indonesia entered into a contract to purchase one of the most sophisticated types of fighter aircraft in the world to improve defense and maintain indonesia's air sovereignty. airspace is one of the most important defenses in military defense. from the news on defense minister prabowo's working visit, the dassault rafale multirole generation 4.5 from france is the strongest candidate, in addition to the hope to get an aircraft from the united states f-15ex. indonesia will buy 42 rafale aircraft and hopes to become the owner of 8 f-15ex. [2] the purchase of 42 rafale fighter planes by defense minister prabowo subianto in early 2022 raised pros and cons. apart from that, purchase of 6 rafale type aircraft (36 planes will follow) with representatives of dassault aviation in jakarta, thursday (10/2/2022). [3] buying a new fighter aircraft is an optionstrategic political and military. this decision, of course, is not just a purchase for valor, but for the defense and security of the country. if it is not used to actively fight, then its existence must be effective in giving effects that affect the defense and security of the country. therefore, this study aims to examine government policies in the plan to procure dassault rafale fighter aircraft for indonesia. 2. research method this study uses a descriptive qualitative approach by exploring or explaining more broadly government policy issues in the plan to procure the dassault rafale fighter aircraft for indonesia. the research focuses on the strategic plan for the procurement of the dassault rafale and the presence of the dassault rafale for indonesia. data collection is carried out through literature studies originating from reputable national and international journals, ebooks, and online media. the literature study in this study was conducted by searching and studying various literatures related to government policies in the plan to procure the dassault rafale fighter aircraft for indonesia. sources of data in this study are books, journals, website pages and other references that are considered relevant to the theme in this study. the author uses data analysis techniques with qualitative descriptive analysis strategies. 3. results and discussion 3.1 global free power index the global free power index is one of the institutions that assesses the military strength of all countries in the world, indicators that assess a country's military strength include several aspects. among them are geography, the number of troops, the strength of military weaponry on land, water and air. until the military budget becomes an assessment aspect. according to several public releases, such as the global free power index, currently the indonesian air force only has about 445 aircraft forces. this fleet consists partly of second-tier light fighter aircraft that are running down. meanwhile, the total area of indonesia that must be dss vol. 3, january 2022, pp.50-57 52 covered is 1.9 million km2. this does not include important flash points, such as the south china sea, natuna waters, the malacca strait, and parts of the eastern region, which need more attention and fleets. [4] table 1. air force comparison of several asean (source: gfp index, 2022; processed data) countries total aircraft strength fighter/interceptors dedicated attack transport trainers indonesia 445 41 23 66 126 malaysia 144 26 12 18 39 thailand 496 74 18 50 130 singapore 224 100 0 9 36 vietnam 218 75 0 9 30 myanmar 280 55 21 26 93 philipines 182 0 25 21 24 cambodia 23 0 0 4 0 laos 32 0 0 1 4 the data above shows that indonesia's total aircraft strength sub-indicator is at 445 which only loses to thailand at 490, then on the transport sub-indicator, indonesia is superior compared to other asean countries, namely 66. for matters of the number of first-tier modern fighter aircraft that are ready in combat, indonesia is also still lagging behind vietnam, thailand, let alone singapore. indonesia's lack of hitting power in air defense, as the largest country in asean, is quite a contrast to some of its neighbors. in terms of the number of air force personnel, indonesia has an estimated 37,850 personnel, which is still less than thailand with 47,000 personnel, whose area and total population differ greatly (270 million vs. 70 million), and is almost on par with vietnam (95 million people). million people) with a total of 35,000 air force personnel. for this reason, as an effort to anticipate conflicts and attacks on a country, maintenance and renewal of the main weapon system for each country is very important. the modernization of military power is also influenced by advances in defense technology. this reflects alertness, valor as a nation (ksau marsda tni dr. umar sugeng hariyono, s.ip, s.e, m.m.) 3.2 strategic considerations indonesia plans to purchase a number of major modern weapons systems (alutsista) in stages until 2024, in order to fulfill the strategic plan for phase iii of the tni's minimum essential force (mef) program. some of the defense equipment to be purchased include 8 units of multirole combat aircraft f-15 ex (united states) and 42 units of dassault rafale fighter aircraft (france). although there are guidelines for posture, strategic plan and mef, the procurement of defense equipment basically depends on the conditions of the strategic environment that continue to change dynamically. in addition, the procurement of defense equipment also has a contribution to defense diplomacy efforts with other countries of strategic value to the global political constellation. the purchase of these two fighter aircraft can also increase the deterrence effect for indonesia in the region. previously, indonesia planned to procure russian-made fighter aircraft, namely the sukhoi su-35, but the purchase plan was not forwarded by the ministry of defense and tni headquarters. the plan to purchase the dassault rafale & f-15 ex is considered a wise step amid the united states' implementation of the countering america's adversaries through sanctions act (caatsa). caatsa is a rule applied to impose sanctions in the form of sanctions and embargoes against countries that buy weapons from russia, iran and north korea. [4] the addition of the main fighting force is a very important requirement for indonesia. from the global firepower it is clear that indonesia's air combat power is still relatively inadequate. purchasing more precise fighter aircraft is the key word. if it is assumed that the purchase of rafale fighter aircraft is in accordance with the plan, then the combat power of the indonesian air force will increase from 461 units to 503 units of defense equipment. [5] dss vol. 3, january 2022, pp.50-57 53 3.3 combination “high and low” buying a new fighter is a strategic political and military choice. the decision to operate it is not just a purchase with a certain ability for valor, but for military defense. if it is not used to actively wage war, then its presence must be effective in providing a deterrence, which also affects regional security and as part of the country's political tools. in concocting fighter aircraft postures, we can learn from the usaf example (united states air force), which uses the definitive combination of "high-low". the usaf does not rely on one type of advanced aircraft, but operates several types of fighter aircraft, designed for a specific mission and simplified into two. that is, those with high abilities (high) and those with abilities below (low). table 2. fighter aircraft category fighter aircraft high capability fighter aircraft low capability gd f-111 boeing f/a-18a atau f16 sukhoi su-32fn/34 dassault rafale sukhoi su-27/30/33 eurofighter typhoon boeing f-15k/sg lm f-16c lm f-22a joint strike fighter f-35 "high" fighter aircraft dedicated to air superiority (air-to-air combat). the specifications are very high speed above mach 1.5, long range, sensitive advanced radar, advanced computer that can identify and track multiple targets at once, and can carry multiple air-to-air missiles. the main role of the "high" fighter aircraft is to clear the air combat zone of enemy fighters and air defense systems. this makes the combat area relatively safer for other vehicles, such as tactical bombers and helicopters, which are more vulnerable to attack by aircraft and anti-aircraft defense systems, from that function emerged the f-15 eagle and now its successor is the f-22, the su35, su-57. however, of course this existence is very expensive and requires a high commitment with a long process. therefore, the production of "high" class fighter aircraft is not as high as other classes, and the fleet is also specialized in the elite tier. while the high demand due to conflict persists, the solution is to design a second tier fighter, which has been reduced in specifications and is definitely cheaper. however, the line which was less sophisticated than the first tier was covered by a sizable quantity of the second tier fleet. for "low" fighter aircraft, its main role is to strike the ground with more air-to-surface. air-to-air missiles still exist, but only as a limited support tool for self-defense. "low" fighter planes will rely on their friends "high" fighter planes to guard and defend themselves from enemy threats. “low” fighter designs are usually smaller and have a shorter cruising range. the maximum speed is lower, the radar is not as sophisticated as the “high” class, and the avionics are simpler. an example of a fighter of this category is the f-16 fighting falcon, then now there is the f-35. [6] 3.4 mef to ief according to the expert staff coordinator (koorsahli) ksau marsda tni dr. umar sugeng hariyono, s.ip, se, mm, in his doctoral dissertation explained that the indonesian air force is still far from the ideal number of aircraft fleet needs with a total of around 600 units. the plan to develop the power towards the ideal essential force (ief) for the period 2024-2039 requires at least 348 aircraft to be added. [7] assuming the posture of the fighter aircraft is in the 30-40% range, it means that the indonesian air force still needs more than 100 units of first-tier modern fighter aircraft (comparable to and above the f-16 specifications) to reach the ideal essential force (ief). in practice, the air defense posture of each country or defense agency of course does not or cannot be exactly the same as the usaf's, due to financial constraints and so on. however, the basis of reference for the us setting the definition of high-low was because it had been actively fighting in various combat theaters outside its own territory. of course, the indonesian air force dss vol. 3, january 2022, pp.50-57 54 is not required to have a 100% same definition of fleet posture, but the usaf approach can be adopted, according to the advantages of each type of aircraft that can be acquisition. [6] if indonesia's current free-active policy tends to be oriented towards the us and allied defense equipment, the posture of its fighter aircraft can modify the usaf high-low , to then equalize its position with thailand and approach or slightly exceed singapore. the uniformity of the fighter aircraft fleet is very important, especially since the tni is currently strengthening its network centric warfare system. the strength of the indonesian air force cannot be dominated, for example, fighter aircraft made in the us vs. russia. this is because it will cause system conflicts in the field, in addition to disrupting the smooth interoperability of the three dimensions. not only is it an up-to-date fighter specification, but the presence of an ideal fighter combination at the outermost air base, and cruising range (including response time) around flash points is imperative. [6] plan a is a combination of f-15ex aircraft (not yet us approval), rafale (bright, but not final), old f16s, and some sukhois. however, indonesia must also have a plan b. for example, the rafale as the "high" aircraft and the f-16 "low". then, another decade or two, the f-16 was dethroned by the rafale, and the "high" role was filled by the f-15ex or f-35 and others. [6] 3.5 rafale fighter aircraft secretary general of the ministry of defense marsdya donny ermawan taufano in the webinar 'welcoming the rafale plane', said that indonesia currently only relies on 33 f-16 aircraft that are more than 30 years old. meanwhile, 16 sukhoi su 27 and su 30 fighters are almost 20 years old. under these conditions, it is the obligation of the ministry of defense to plan fighter aircraft that will serve in the 2030s and 2040s. the government's decision to choose the rafale fighter is based on technical and non-technical considerations. choosing products made in france is safer from us sanctions against russia or better known as caatsa (countering america's adversaries through sanction act). this is inseparable from the military competition between the us and russia. in addition, the certainty of technology transfer of the rafale fighter is more secure than the previous two types of fighter aircraft. [8] rafale is known as a versatile aircraft because it can be used for various missions. for example, interdiction (ban), aerial reconnaissance (air reconnaissance), ground support (ground support), anti-ship strike (anti-ship attack) and nuclear deterrence mission (nuclear prevention mission). dassault rafale fighter specifications: 1. generation 4.5 aircraft. 2. maximum speed 1.8 mach or 750 knots. 3. maximum altitude 50,000 feet. 4. has an 'active electronically scanned away' radar. 5. has a wingspan of 10.9 meters, length 15 .30 meters and 5.30 meters high. armament specifications dassault rafale: 1. the mica combat and self-defense missile. 2. meteor long range rocket. 3. high agile and manouvrable munition extended range equipped with gps and infrared. 4. aircraft-brake-powered air missiles. 5. scalp long range missile. 6. am39excocet anti-ship missile. 7. laser guided bombs with warheads ranging from 500-2,000 pounds. 8. internal gun with 2,500 rounds/minute nexter30m791 mm in addition, for special missions, the rafale can deliver mbda nuclear missiles. with the addition of the main combat defense equipment in the form of the rafale type fighter aircraft, it is certain that the combat dss vol. 3, january 2022, pp.50-57 55 power of the indonesian air force is the strongest in southeast asia for now. however, it must still be noted that the very large area of the air boundary with the four sector commands (kosek) of the national air defense command (korhanudnas) which includes: jakarta, makassar, medan and biak is not sufficient. the current number and posture of the main combat defense equipment can only support a maximum of 30 units per korhanudnas. seeing the development of the global geopolitical situation which is full of uncertainty after the start of the russian invasion of ukraine, the indonesian government needs to consider the fulfillment of the main combat defense equipment which is relatively adequate, sophisticated and modern. thus, the sovereignty of indonesia's airspace is not easily threatened and violated by foreign parties and is protected from enemy attacks if at any time there is a war between indonesia and other countries. 3.6 transfer of technology (tot) transfer of technology is one way to eliminate the limitations that hinder mastery of technology and towards increasing mastery of technology. the policy is a strategy in developing the capacity of human resources so that their productivity will increase even more. increased human productivity will produce quality and competitive products. [9] in the contract for the purchase of 42 rafale aircraft made by dassault, a memorandum of understanding (mou) of the offset and tot program cooperation between dassault and pt di was also made. the dassault rafale aircraft procurement contract agreement should emphasize the transfer of technology (tot) by sending human resources to study and do internships in the development industry. in addition to hr offsets, there is also a need for an offset scheme for the production of aircraft components in indonesia by the national industry, namely pt dirgantara indonesia (pt di). as a strategic national asset, pt di requires continuity between human resources and facilities that are recognized by authority globally. pt di's business portfolio consists of aircraft (airplane and helicopter), aircraft services (maintenance, overhaul, repair and alteration), aerostructure (parts and sub assemblies, assemblies tools and equipment), engineering services (communication technology, simulator technology, information technology). solution, design center) should focus on optimizing the national aviation system as a provider and supporter of commuter aircraft and tni defense equipment. the development strategy must prioritize the importance of the independence of the nation and the mastery of technology by the nation's own children. for this reason, the government needs to include elements of science and technology for human resource development in the defense equipment spending agreement. it must be admitted that the human resources we currently have are still limited, both in terms of quality and quantity. hr is the main component in determining the success of r&d work. the limited quality and quantity of technology experts will only shackle the r&d function. r&d is a bridge that connects science and technology with human interests. therefore, r&d agencies must be supported by qualified technology experts and in sufficient numbers. every effort and effort must be made to increase the number of transfer of technology (including transfer of technology/tot) of a general nature, or military, in accordance with the demands of the required disciplines. [10] the development of the defense technology industry does require a strong commitment from the government. this commitment is certainly related to the development of the defense industry, including the offset policy in it, as an effort towards indonesia's defense independence. the government holds the main control in the development and implementation of offset policies because the support of funds, human resources, and political will is very much needed. however, if this policy is carried out optimally, we will see an independent indonesia and talk a lot on the international stage. [11] in addition, the role of academics can help maximize the absorption and dissemination of knowledge that can help smooth the transfer of knowledge needed to support technology transfer. in addition, influential factors in technology transfer include production facilities, managerial capabilities of human resources, and government commitment in transfer projects. technology. in technology transfer, a large investment is needed to prepare the required production support facilities. investment is needed to support the success of the technology transfer process. the success dss vol. 3, january 2022, pp.50-57 56 of technology management in a country depends on the political commitment of the government to be able to increase mastery of certain technologies, such as making regulations that support the achievement of mastery of technology, and other supports such as financial support aimed at the success of technology management in the context of mastering certain technologies. [12] defense minister prabowo's military diplomacy, which has been active for the past year, must be able to produce concrete results. it must no longer run aground, such as the planned acquisition of the su-35 and the development of kfx/ifx, where almost a decade has been wasted, swallowing the bitter pill of defense equipment politics and the complexities of aerospace technology. the issue of the balance of power in asean and the potential conflict between the south china sea and china are definitely part of indonesia's ammunition, in lobbying for defense equipment needs to other strong democratic countries, such as the us and its allies. the successive governments must also faithfully guard this vision and commitment. [6] 4. conclusions based on the results of the analysis, conclusions can be drawn in this study as follows. the existence of indonesia, which is in the southeast asian region as well as bordering the pacific ocean, makes the country characterized by the archipelago must have a military force that is capable of dealing with various external threats. especially in the southeast asia region. so that the strength of military weapons for a country is very important to anticipate various threats that have the potential to come to disturb the security and peace of a country. fighter aircraft dassault rafale that has been carried out by the ministry of defense so that its existence becomes effective in formulating defense postures, the usaf approach (united states air force) the definitive combination of "high-low" can be adopted according to the advantages of each type of aircraft that can be acquired. in fulfilling its defense equipment, indonesia must also be realistic in responding to the balance of regional power, namely asean. the realization of the mef towards ief must adapt, for example, to the air power of three strong neighboring countries, such as vietnam, thailand and singapore. thus, the sovereignty of indonesia's airspace is not easily threatened and violated by foreign parties and is protected from enemy attacks if at any time there is a war between indonesia and other countries. the dassault rafale aircraft procurement contract agreement should emphasize the transfer of technology (tot) by sending human resources to study and do internships in the development industry. in addition to hr offsets, there is also a need for an offset scheme for the production of aircraft components in indonesia by the national industry. this policy does require a strong commitment from the government. the government holds the main control in the development and implementation of offset policies because the support of funds, human resources, and political will is very much needed. if this policy is carried out optimally, we will see an independent indonesia and speak a lot on the international stage. references [1] m. a. wibowo, "eksistensi tni dalam menghadapi ancaman militer dan nir militer multidimensional di era milenial". kemhan ri : edisi khusus (wira), 2019. [2] t. p. sorongan, "prabowo borong 42 jet tempur rafale", cnbc indonesia, 2022. [3] f. c. farisa, "deretan alutsista yang di beli prabowo". kompas, indonesia, 2022. [4] a. fitri, p. dalam n. kepakaran, s. pertahanan, p.penelitian b.keahlian sekjen, dpr ri, 2022. [5] mujiburrahman, "menakar kekuatan tni au pasca kontrak pembelian rafale", politik dan keamanan budget issue brief vol 02, ed 3, maret 2022. [6] d. toruan, "menanti kombinasi maut jet tempur indonesia", armory reborn 6, 2021. [7] f. setiawan, "menuju ideal essential force (ief), indonesia perlu menambah 348 unit pesawat untuk tni au, air space riview, 2018. [8] b. santosa, "pembelian pesawat rafale," kompas, indonesia , 2022. dss vol. 3, january 2022, pp.50-57 57 [9] m. waluyo, "transfer teknologi dan keberlanjutan industri", lipi, 2018 [10] i.samego, s. pertahanan-keamanan negara, "analisis potensi dan problem", (jakarta: the habibie center, pp. 227-228, 2001. [11] r. m. j. indrawan, "kebijakan ofset dalam membangun kemandirian pertahanan negara", 2016. [12] r. l. muchtiwibowo, "transfer of technology," jurnal industri pertahanan, volume 1, no 1 , 2019. microsoft word 195-article text-343-1-15-20220829.docx issn 2744-1741 defense and security studies original research vol. 3, january 2022, pp.50-57 https://doi.org/10.37868/dss.v3.id195 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 50 review of indonesian government policy in procurement plan of dassault rafale fighter aircraft a. wardana1, t. b.cahyana2, h. tahdi3, y. h. yogaswara4 1,2,3,4 faculty of defense technology, indonesia defense university, indonesia *corresponding author e-mail: achmad.wardana@tp.idu.ac.id received aug. 16, 2022 revised aug. 29, 2022 accepted sept. 1, 2022 abstract indonesia's decision to procure 4.5 generation rafale fighter jets has been approved to replace obsolete aircraft, namely the us-made f-16 and the russianmade su-27 and su-30. the selection of rafale was based on indonesia's defense relationship with france which had existed for a very long time, besides that it was also based on the foreign policy adopted by indonesia, namely the free and active policy shown from several defense equipment owned by indonesia, not only from a particular country. this study aims to examine government policies in the plan to procure dassault rafale fighter aircraft for indonesia. this study uses a descriptive qualitative approach through literature review from reputable national and international journals, ebooks, and online media by exploring or explaining more broadly the government policy issues in the plan to procure the dassault rafale fighter aircraft for indonesia. the findings of this study indicate that indonesia is still lagging behind vietnam, thailand, and singapore in terms of the number of first-tier modern combat aircraft that are ready for combat. in addition, purchase of the dassault rafale aircraft must provide effectiveness to improve national defense and security by using a definitive combination of "highlow" that can be adopted from the usaf (united states air force), and also indonesia must be realistic in responding to the regional balance of power (asean) through the realization of the mef towards ief. one important factor that needs to be considered in the procurement agreement is the existence of a strong policy and commitment from the government that emphasizes the transfer of technology (tot) by sending human resources to study and do internships in the development industry. © the author 2022. published by arda. keywords: dassault rafale, combination high-low, transfer of technology, mef, ief 1. introduction the process of globalization has touched various fields of human life, in the fields of education, socio-culture, economy, politics, defense and security. they are never separated from the effects of globalization. the transformation process that aims to make people around the world into a single society and interdependent on each other is growing rapidly due to the sophistication of information and communication technology. however, the occurrence of the globalization process as a process that will bring the world under dss vol. 3, january 2022, pp.50-57 51 one control through one global power has resulted in the dominance of the world community by countries that have great powers that are able to take a role in the process. [1] for indonesia as a developing country with an area that stretches from sabang to merauke and with the fourth largest population in the world, it has not been able to take advantage of the momentum properly. indonesia's strategic position has been used by other countries in various forms, indonesia is used as a consumer in trade for other countries' products, so that indonesia is only used as a market. as an independent and sovereign country, it is fitting for indonesia to increase its defense and security forces. in order to protect the sovereignty of the nation. moreover, in recent times there have been frequent conflicts in the border areas due to illegal fishing by foreign vessels flagged by vietnam, malaysia, china and several other countries who consciously take natural resources and wealth. indonesian sea. besides that, the confrontation carried out by the chinese state over the south china sea dispute by sending several warships in the indonesian maritime border area allowed an open war for the countries with an interest in it. this further emphasizes the importance of the strength of military weapons for the defense and security of the nation. mainly to anticipate conflicts in the southeast asian region by strengthening the military weapons of the indonesian national army (tni). indonesia continues to strengthen its military defenses under the command of defense minister prabowo subianto. recently, indonesia entered into a contract to purchase one of the most sophisticated types of fighter aircraft in the world to improve defense and maintain indonesia's air sovereignty. airspace is one of the most important defenses in military defense. from the news on defense minister prabowo's working visit, the dassault rafale multirole generation 4.5 from france is the strongest candidate, in addition to the hope to get an aircraft from the united states f-15ex. indonesia will buy 42 rafale aircraft and hopes to become the owner of 8 f-15ex. [2] the purchase of 42 rafale fighter planes by defense minister prabowo subianto in early 2022 raised pros and cons. apart from that, purchase of 6 rafale type aircraft (36 planes will follow) with representatives of dassault aviation in jakarta, thursday (10/2/2022). [3] buying a new fighter aircraft is an optionstrategic political and military. this decision, of course, is not just a purchase for valor, but for the defense and security of the country. if it is not used to actively fight, then its existence must be effective in giving effects that affect the defense and security of the country. therefore, this study aims to examine government policies in the plan to procure dassault rafale fighter aircraft for indonesia. 2. research method this study uses a descriptive qualitative approach by exploring or explaining more broadly government policy issues in the plan to procure the dassault rafale fighter aircraft for indonesia. the research focuses on the strategic plan for the procurement of the dassault rafale and the presence of the dassault rafale for indonesia. data collection is carried out through literature studies originating from reputable national and international journals, ebooks, and online media. the literature study in this study was conducted by searching and studying various literatures related to government policies in the plan to procure the dassault rafale fighter aircraft for indonesia. sources of data in this study are books, journals, website pages and other references that are considered relevant to the theme in this study. the author uses data analysis techniques with qualitative descriptive analysis strategies. 3. results and discussion 3.1 global free power index the global free power index is one of the institutions that assesses the military strength of all countries in the world, indicators that assess a country's military strength include several aspects. among them are geography, the number of troops, the strength of military weaponry on land, water and air. until the military budget becomes an assessment aspect. according to several public releases, such as the global free power index, currently the indonesian air force only has about 445 aircraft forces. this fleet consists partly of second-tier light fighter aircraft that are running down. meanwhile, the total area of indonesia that must be dss vol. 3, january 2022, pp.50-57 52 covered is 1.9 million km2. this does not include important flash points, such as the south china sea, natuna waters, the malacca strait, and parts of the eastern region, which need more attention and fleets. [4] table 1. air force comparison of several asean (source: gfp index, 2022; processed data) countries total aircraft strength fighter/interceptors dedicated attack transport trainers indonesia 445 41 23 66 126 malaysia 144 26 12 18 39 thailand 496 74 18 50 130 singapore 224 100 0 9 36 vietnam 218 75 0 9 30 myanmar 280 55 21 26 93 philipines 182 0 25 21 24 cambodia 23 0 0 4 0 laos 32 0 0 1 4 the data above shows that indonesia's total aircraft strength sub-indicator is at 445 which only loses to thailand at 490, then on the transport sub-indicator, indonesia is superior compared to other asean countries, namely 66. for matters of the number of first-tier modern fighter aircraft that are ready in combat, indonesia is also still lagging behind vietnam, thailand, let alone singapore. indonesia's lack of hitting power in air defense, as the largest country in asean, is quite a contrast to some of its neighbors. in terms of the number of air force personnel, indonesia has an estimated 37,850 personnel, which is still less than thailand with 47,000 personnel, whose area and total population differ greatly (270 million vs. 70 million), and is almost on par with vietnam (95 million people). million people) with a total of 35,000 air force personnel. for this reason, as an effort to anticipate conflicts and attacks on a country, maintenance and renewal of the main weapon system for each country is very important. the modernization of military power is also influenced by advances in defense technology. this reflects alertness, valor as a nation (ksau marsda tni dr. umar sugeng hariyono, s.ip, s.e, m.m.) 3.2 strategic considerations indonesia plans to purchase a number of major modern weapons systems (alutsista) in stages until 2024, in order to fulfill the strategic plan for phase iii of the tni's minimum essential force (mef) program. some of the defense equipment to be purchased include 8 units of multirole combat aircraft f-15 ex (united states) and 42 units of dassault rafale fighter aircraft (france). although there are guidelines for posture, strategic plan and mef, the procurement of defense equipment basically depends on the conditions of the strategic environment that continue to change dynamically. in addition, the procurement of defense equipment also has a contribution to defense diplomacy efforts with other countries of strategic value to the global political constellation. the purchase of these two fighter aircraft can also increase the deterrence effect for indonesia in the region. previously, indonesia planned to procure russian-made fighter aircraft, namely the sukhoi su-35, but the purchase plan was not forwarded by the ministry of defense and tni headquarters. the plan to purchase the dassault rafale & f-15 ex is considered a wise step amid the united states' implementation of the countering america's adversaries through sanctions act (caatsa). caatsa is a rule applied to impose sanctions in the form of sanctions and embargoes against countries that buy weapons from russia, iran and north korea. [4] the addition of the main fighting force is a very important requirement for indonesia. from the global firepower it is clear that indonesia's air combat power is still relatively inadequate. purchasing more precise fighter aircraft is the key word. if it is assumed that the purchase of rafale fighter aircraft is in accordance with the plan, then the combat power of the indonesian air force will increase from 461 units to 503 units of defense equipment. [5] dss vol. 3, january 2022, pp.50-57 53 3.3 combination “high and low” buying a new fighter is a strategic political and military choice. the decision to operate it is not just a purchase with a certain ability for valor, but for military defense. if it is not used to actively wage war, then its presence must be effective in providing a deterrence, which also affects regional security and as part of the country's political tools. in concocting fighter aircraft postures, we can learn from the usaf example (united states air force), which uses the definitive combination of "high-low". the usaf does not rely on one type of advanced aircraft, but operates several types of fighter aircraft, designed for a specific mission and simplified into two. that is, those with high abilities (high) and those with abilities below (low). table 2. fighter aircraft category fighter aircraft high capability fighter aircraft low capability gd f-111 boeing f/a-18a atau f16 sukhoi su-32fn/34 dassault rafale sukhoi su-27/30/33 eurofighter typhoon boeing f-15k/sg lm f-16c lm f-22a joint strike fighter f-35 "high" fighter aircraft dedicated to air superiority (air-to-air combat). the specifications are very high speed above mach 1.5, long range, sensitive advanced radar, advanced computer that can identify and track multiple targets at once, and can carry multiple air-to-air missiles. the main role of the "high" fighter aircraft is to clear the air combat zone of enemy fighters and air defense systems. this makes the combat area relatively safer for other vehicles, such as tactical bombers and helicopters, which are more vulnerable to attack by aircraft and anti-aircraft defense systems, from that function emerged the f-15 eagle and now its successor is the f-22, the su35, su-57. however, of course this existence is very expensive and requires a high commitment with a long process. therefore, the production of "high" class fighter aircraft is not as high as other classes, and the fleet is also specialized in the elite tier. while the high demand due to conflict persists, the solution is to design a second tier fighter, which has been reduced in specifications and is definitely cheaper. however, the line which was less sophisticated than the first tier was covered by a sizable quantity of the second tier fleet. for "low" fighter aircraft, its main role is to strike the ground with more air-to-surface. air-to-air missiles still exist, but only as a limited support tool for self-defense. "low" fighter planes will rely on their friends "high" fighter planes to guard and defend themselves from enemy threats. “low” fighter designs are usually smaller and have a shorter cruising range. the maximum speed is lower, the radar is not as sophisticated as the “high” class, and the avionics are simpler. an example of a fighter of this category is the f-16 fighting falcon, then now there is the f-35. [6] 3.4 mef to ief according to the expert staff coordinator (koorsahli) ksau marsda tni dr. umar sugeng hariyono, s.ip, se, mm, in his doctoral dissertation explained that the indonesian air force is still far from the ideal number of aircraft fleet needs with a total of around 600 units. the plan to develop the power towards the ideal essential force (ief) for the period 2024-2039 requires at least 348 aircraft to be added. [7] assuming the posture of the fighter aircraft is in the 30-40% range, it means that the indonesian air force still needs more than 100 units of first-tier modern fighter aircraft (comparable to and above the f-16 specifications) to reach the ideal essential force (ief). in practice, the air defense posture of each country or defense agency of course does not or cannot be exactly the same as the usaf's, due to financial constraints and so on. however, the basis of reference for the us setting the definition of high-low was because it had been actively fighting in various combat theaters outside its own territory. of course, the indonesian air force dss vol. 3, january 2022, pp.50-57 54 is not required to have a 100% same definition of fleet posture, but the usaf approach can be adopted, according to the advantages of each type of aircraft that can be acquisition. [6] if indonesia's current free-active policy tends to be oriented towards the us and allied defense equipment, the posture of its fighter aircraft can modify the usaf high-low , to then equalize its position with thailand and approach or slightly exceed singapore. the uniformity of the fighter aircraft fleet is very important, especially since the tni is currently strengthening its network centric warfare system. the strength of the indonesian air force cannot be dominated, for example, fighter aircraft made in the us vs. russia. this is because it will cause system conflicts in the field, in addition to disrupting the smooth interoperability of the three dimensions. not only is it an up-to-date fighter specification, but the presence of an ideal fighter combination at the outermost air base, and cruising range (including response time) around flash points is imperative. [6] plan a is a combination of f-15ex aircraft (not yet us approval), rafale (bright, but not final), old f16s, and some sukhois. however, indonesia must also have a plan b. for example, the rafale as the "high" aircraft and the f-16 "low". then, another decade or two, the f-16 was dethroned by the rafale, and the "high" role was filled by the f-15ex or f-35 and others. [6] 3.5 rafale fighter aircraft secretary general of the ministry of defense marsdya donny ermawan taufano in the webinar 'welcoming the rafale plane', said that indonesia currently only relies on 33 f-16 aircraft that are more than 30 years old. meanwhile, 16 sukhoi su 27 and su 30 fighters are almost 20 years old. under these conditions, it is the obligation of the ministry of defense to plan fighter aircraft that will serve in the 2030s and 2040s. the government's decision to choose the rafale fighter is based on technical and non-technical considerations. choosing products made in france is safer from us sanctions against russia or better known as caatsa (countering america's adversaries through sanction act). this is inseparable from the military competition between the us and russia. in addition, the certainty of technology transfer of the rafale fighter is more secure than the previous two types of fighter aircraft. [8] rafale is known as a versatile aircraft because it can be used for various missions. for example, interdiction (ban), aerial reconnaissance (air reconnaissance), ground support (ground support), anti-ship strike (anti-ship attack) and nuclear deterrence mission (nuclear prevention mission). dassault rafale fighter specifications: 1. generation 4.5 aircraft. 2. maximum speed 1.8 mach or 750 knots. 3. maximum altitude 50,000 feet. 4. has an 'active electronically scanned away' radar. 5. has a wingspan of 10.9 meters, length 15 .30 meters and 5.30 meters high. armament specifications dassault rafale: 1. the mica combat and self-defense missile. 2. meteor long range rocket. 3. high agile and manouvrable munition extended range equipped with gps and infrared. 4. aircraft-brake-powered air missiles. 5. scalp long range missile. 6. am39excocet anti-ship missile. 7. laser guided bombs with warheads ranging from 500-2,000 pounds. 8. internal gun with 2,500 rounds/minute nexter30m791 mm in addition, for special missions, the rafale can deliver mbda nuclear missiles. with the addition of the main combat defense equipment in the form of the rafale type fighter aircraft, it is certain that the combat dss vol. 3, january 2022, pp.50-57 55 power of the indonesian air force is the strongest in southeast asia for now. however, it must still be noted that the very large area of the air boundary with the four sector commands (kosek) of the national air defense command (korhanudnas) which includes: jakarta, makassar, medan and biak is not sufficient. the current number and posture of the main combat defense equipment can only support a maximum of 30 units per korhanudnas. seeing the development of the global geopolitical situation which is full of uncertainty after the start of the russian invasion of ukraine, the indonesian government needs to consider the fulfillment of the main combat defense equipment which is relatively adequate, sophisticated and modern. thus, the sovereignty of indonesia's airspace is not easily threatened and violated by foreign parties and is protected from enemy attacks if at any time there is a war between indonesia and other countries. 3.6 transfer of technology (tot) transfer of technology is one way to eliminate the limitations that hinder mastery of technology and towards increasing mastery of technology. the policy is a strategy in developing the capacity of human resources so that their productivity will increase even more. increased human productivity will produce quality and competitive products. [9] in the contract for the purchase of 42 rafale aircraft made by dassault, a memorandum of understanding (mou) of the offset and tot program cooperation between dassault and pt di was also made. the dassault rafale aircraft procurement contract agreement should emphasize the transfer of technology (tot) by sending human resources to study and do internships in the development industry. in addition to hr offsets, there is also a need for an offset scheme for the production of aircraft components in indonesia by the national industry, namely pt dirgantara indonesia (pt di). as a strategic national asset, pt di requires continuity between human resources and facilities that are recognized by authority globally. pt di's business portfolio consists of aircraft (airplane and helicopter), aircraft services (maintenance, overhaul, repair and alteration), aerostructure (parts and sub assemblies, assemblies tools and equipment), engineering services (communication technology, simulator technology, information technology). solution, design center) should focus on optimizing the national aviation system as a provider and supporter of commuter aircraft and tni defense equipment. the development strategy must prioritize the importance of the independence of the nation and the mastery of technology by the nation's own children. for this reason, the government needs to include elements of science and technology for human resource development in the defense equipment spending agreement. it must be admitted that the human resources we currently have are still limited, both in terms of quality and quantity. hr is the main component in determining the success of r&d work. the limited quality and quantity of technology experts will only shackle the r&d function. r&d is a bridge that connects science and technology with human interests. therefore, r&d agencies must be supported by qualified technology experts and in sufficient numbers. every effort and effort must be made to increase the number of transfer of technology (including transfer of technology/tot) of a general nature, or military, in accordance with the demands of the required disciplines. [10] the development of the defense technology industry does require a strong commitment from the government. this commitment is certainly related to the development of the defense industry, including the offset policy in it, as an effort towards indonesia's defense independence. the government holds the main control in the development and implementation of offset policies because the support of funds, human resources, and political will is very much needed. however, if this policy is carried out optimally, we will see an independent indonesia and talk a lot on the international stage. [11] in addition, the role of academics can help maximize the absorption and dissemination of knowledge that can help smooth the transfer of knowledge needed to support technology transfer. in addition, influential factors in technology transfer include production facilities, managerial capabilities of human resources, and government commitment in transfer projects. technology. in technology transfer, a large investment is needed to prepare the required production support facilities. investment is needed to support the success of the technology transfer process. the success dss vol. 3, january 2022, pp.50-57 56 of technology management in a country depends on the political commitment of the government to be able to increase mastery of certain technologies, such as making regulations that support the achievement of mastery of technology, and other supports such as financial support aimed at the success of technology management in the context of mastering certain technologies. [12] defense minister prabowo's military diplomacy, which has been active for the past year, must be able to produce concrete results. it must no longer run aground, such as the planned acquisition of the su-35 and the development of kfx/ifx, where almost a decade has been wasted, swallowing the bitter pill of defense equipment politics and the complexities of aerospace technology. the issue of the balance of power in asean and the potential conflict between the south china sea and china are definitely part of indonesia's ammunition, in lobbying for defense equipment needs to other strong democratic countries, such as the us and its allies. the successive governments must also faithfully guard this vision and commitment. [6] 4. conclusions based on the results of the analysis, conclusions can be drawn in this study as follows. the existence of indonesia, which is in the southeast asian region as well as bordering the pacific ocean, makes the country characterized by the archipelago must have a military force that is capable of dealing with various external threats. especially in the southeast asia region. so that the strength of military weapons for a country is very important to anticipate various threats that have the potential to come to disturb the security and peace of a country. fighter aircraft dassault rafale that has been carried out by the ministry of defense so that its existence becomes effective in formulating defense postures, the usaf approach (united states air force) the definitive combination of "high-low" can be adopted according to the advantages of each type of aircraft that can be acquired. in fulfilling its defense equipment, indonesia must also be realistic in responding to the balance of regional power, namely asean. the realization of the mef towards ief must adapt, for example, to the air power of three strong neighboring countries, such as vietnam, thailand and singapore. thus, the sovereignty of indonesia's airspace is not easily threatened and violated by foreign parties and is protected from enemy attacks if at any time there is a war between indonesia and other countries. the dassault rafale aircraft procurement contract agreement should emphasize the transfer of technology (tot) by sending human resources to study and do internships in the development industry. in addition to hr offsets, there is also a need for an offset scheme for the production of aircraft components in indonesia by the national industry. this policy does require a strong commitment from the government. the government holds the main control in the development and implementation of offset policies because the support of funds, human resources, and political will is very much needed. if this policy is carried out optimally, we will see an independent indonesia and speak a lot on the international stage. declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. references [1] m. a. wibowo, "eksistensi tni dalam menghadapi ancaman militer dan nir militer multidimensional di era milenial". kemhan ri : edisi khusus (wira), 2019. [2] t. p. sorongan, "prabowo borong 42 jet tempur rafale", cnbc indonesia, 2022. [3] f. c. farisa, "deretan alutsista yang di beli prabowo". kompas, indonesia, 2022. [4] a. fitri, p. dalam n. kepakaran, s. pertahanan, p.penelitian b.keahlian sekjen, dpr ri, 2022. dss vol. 3, january 2022, pp.50-57 57 [5] mujiburrahman, "menakar kekuatan tni au pasca kontrak pembelian rafale", politik dan keamanan budget issue brief vol 02, ed 3, maret 2022. [6] d. toruan, "menanti kombinasi maut jet tempur indonesia", armory reborn 6, 2021. [7] f. setiawan, "menuju ideal essential force (ief), indonesia perlu menambah 348 unit pesawat untuk tni au, air space riview, 2018. [8] b. santosa, "pembelian pesawat rafale," kompas, indonesia , 2022. [9] m. waluyo, "transfer teknologi dan keberlanjutan industri", lipi, 2018 [10] i.samego, s. pertahanan-keamanan negara, "analisis potensi dan problem", (jakarta: the habibie center, pp. 227-228, 2001. [11] r. m. j. indrawan, "kebijakan ofset dalam membangun kemandirian pertahanan negara", 2016. [12] r. l. muchtiwibowo, "transfer of technology," jurnal industri pertahanan, volume 1, no 1 , 2019. microsoft word 29-35_231.docx issn 2744-1741 defense and security studies original research vol. 4, january 2023, pp.29-35 https://doi.org/10.37868/dss.v4.id231 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 29 implementing elements of national security by fulfilling the rights of indigenous people of laman kinipan in central kalimantan (indonesia) khairul umam manik1*, i gede sumertha2, pujo widodo3 1,2,3 faculty of national security, republic of indonesia defense university, indonesia *corresponding author e-mail: khairulmanik26@gmail.com received 25.1.2023. revised 22.2.2023. accepted 23.2.2023 abstract the laman kinipan indigenous people have been in an agrarian conflict with pt sawit mandiri lestari for years; they claim that pt sml has taken their indigenous territory, mainly consisting of customary forest, with a permit issued by the indonesian government. pt sml cleared thousands of hectares of kalimantan forest, which sparked protests from indigenous peoples. the landclearing act affected indigenous peoples in several aspects, such as massive floods that had never happened before, to violent conflicts that befell indigenous peoples. this study aims to find out how the fulfillment of the rights of the laman kinipan, indigenous people, towards the realization of indonesia's national security. this research was conducted using interviews and literature studies with an analysis process using the theory of national security with subtheories of environmental security and human security. the results of this study indicate that the government's failure to fulfill the demands and rights of indigenous peoples affects national security, namely environmental security and human security. the researchers conclude that this conflict is a threat to national security, especially from environmental and human security elements. the government can accelerate the realization of national security if it fulfills the rights and demands of the laman kinipan indigenous people. © the author 2023. published by arda. keywords: national security, environmental security, human security, laman kinipan, pt sawit mandiri lestari, agrarian conflict 1. introduction national security is a function inherent in a country to guarantee security. national security aims to ensure that the state is free from threats that could affect state sovereignty. buzan divides the types of security into five areas: military, economic, social, political, and environmental. in the post-cold war era, national security is no longer focused on protection from military threats but on several other areas [1]. in realizing comprehensive national security, the government must carry out several ideal functions, such as national defense, state security, public security, and human security [2]. when several functions, such as public security and human security, are not fulfilled, that is when conflicts can arise. conflicts have become part of various aspects of life. various elements of life, such as the economy, socioculture, politics, and resources, can trigger conflict. dahrendorf argues that conflicts and clashes will always occur in social life, where people are obedient to changes [3]. one type of conflict that still frequently occurs in indonesia is the agrarian conflict. agrarian conflicts occur for the following reasons: 1. granting of permits/rights/concessions by public officials such as the minister of forestry, minister of dss vol. 4, january 2023, pp.29-35 30 energy and mineral resources, head of the national land agency, and regional heads such as governors and regents who classify land/managed areas/natural resources owned by a group of people into concessions of giant business entities in production, extraction, and conservation. 2. violence, manipulation, and deception being committed to acquiring large-scale land for large development projects in production, extraction, or conservation. 3. attempts or actions to expel rural people from the land/area under management/natural resources/which are included in the concession areas of significant business entities. 4. the emergence of resistance from the group [4]. the plantation sector is the sector with the most significant number of agrarian conflicts, with conflicts occurring within it, followed by the forestry, infrastructure, property, mining, military facilities, coastal marine, and agribusiness sectors. the agrarian conflicts claimed victims from the community who fought for their rights in agrarian conflicts. during 2020, the agrarian conflicts that occurred resulted in 169 victims from the community who experienced persecution, criminalization, and even casualties [5]. one of the agrarian conflicts still occurring since 2020 is the agrarian conflict involving the laman kinipan indigenous community. the laman kinipan indigenous community is one of the various indigenous communities registered by the indigenous territory registration agency. the laman kinipan indigenous community is located in kinipan, batang kawa district, lamandau regency, central kalimantan province. sourced to the website of the indigenous territory registration agency (brwa), the laman kinipan, indigenous people have an area of 16,132 hectares of indigenous territory with geographical conditions in the form of hills. the area includes the area of the village of kinipan and indigenous forests. most of the laman kinipan indigenous people have a source of income from gardening [6]. the agrarian conflict involves private company pt sawit mandiri lestari (sml) that produces palm oil. the background to this conflict was a permit granted by the ministry of environment and forestry to release a forest area of 19,091 hectares through a letter on march 19, 2015. in addition, there is also a decree of the minister of agrarian and spatial planning/head of the national land agency number 82/hgu/kematr/bpn/2017 concerning the granting of cultivation rights in the name of pt sml covering an area of 9,435.2214 hectares which became the legal basis for pt sml to take over several areas, including areas of laman kinipan indigenous community. the permits from the ministry of environment and forestry and the letter for granting business use rights (hgu) for pt sml were deemed legally flawed because they were issued without any discussion and without the consent of the laman kinipan indigenous people who live in the area and as the owner of the indigenous territory [7]. until 2019, based on the mapping of the hgu area by the ministry of agrarian affairs and spatial planning/national land agency, the indigenous area in the form of the laman kinipan indigenous forest had been evicted for the benefit of pt sml's capitalism [7]. it is per law number 5 of 1960 concerning basic agrarian regulations and regulation of the minister of agrarian affairs and spatial planning/national land agency number 10 of 2016, explaining that in the process from the beginning, there were communal rights over indigenous territories until the issuance of communal rights certificates. accordingly, indigenous territories, including indigenous forests, will remain in the name of indigenous peoples. communal rights are certificates from the national land agency given to indigenous peoples who have lived in the indigenous territory for many years and obtain approval from regional heads such as the governor or regent/mayor. based on these legal regulations, it can be stated that land included in these indigenous territories can no longer be classified as state land but as indigenous land controlled by indigenous peoples. so that if the government wants to grant usufructuary rights over indigenous community communal land, this must be based on the approval of indigenous peoples [8]. this flawed legal basis created a conflict between the laman kinipan indigenous community and pt sml. the conflict started when there was a disagreement between the lamandau regency government and the laman kinipan indigenous people regarding the boundaries of the area between kinipan village and karang taba village, which border each other. pt sml insists that the land being worked on then was the laman kinipan indigenous people assessed as indigenous territory, and the area of kinipan village entered the karang taba village area [9]. meanwhile, according to the indigenous territory registration agency dss vol. 4, january 2023, pp.29-35 31 (brwa), there is already a detailed map of the boundaries of kinipan and other villages, which is made in detail to show the locations of certain trees, certain places in the area of the village of kinipan. the map has also been approved by the villages bordering kinipan, except for batang kawa village, which is also part of the area where pt sml's land clearing plan is planned. then in january 2019, the regent of lamandau determined the border between kinipan village and batang kawa village, which drew protests from the residents of kinipan village because it did not match the map made by them and at the same time, aborted agreements with other villages which had approved the map of the kinipan village border. this conflict escalated into violent conflict when the police arrested efendi buhing, the head of the laman kinipan indigenous community, on charges of stealing a chainsaw used by pt sml. this incident stems from the guard being carried out by the indigenous kinipan youths in the forest area where pt sml employees cleared the land. the failure of the negotiation process between pt sml employees and indigenous youths led to the laman kinipan indigenous youths confiscating the tools used to clear the land. pt sml then reported this to the police, which forced efendi buhing and indigenous youths to be detained, becoming a form of violent conflict. 2. research method this research uses qualitative methods. the use of qualitative methods is one of the choice for researchers because they want to get a comprehensive picture of the implementation of elements of national security through fulfilling the rights of the laman kinipan indigenous people. according to taylor et al. (2016), qualitative research refers in a broad sense to research that produces descriptive data of people's own written or spoken words and observable behavior. the data needed to complete this research was obtained from interviews conducted with various parties, such as the alliance of indigenous peoples of the archipelago (aman), the indigenous territory registration agency (brwa), and the indonesian forum for the environment (walhi). in addition, this research topic is analyzed using several theories, which are described below. 2.1. environmental security environmental security studies according to the united states environmental protection agency (epa), environmental security is a process in which solutions to environmental problems contribute to national security goals [10]. the issue of environmental security has begun to experience an increase in its discussion since world war ii ended and the start of the cold war. when the two big blocks of countries at that time were competing to increase capabilities in the field of technology, the drastic increase in the number of industries could be marked by the increasing intensity of various kinds of pollution from the industrial sector [11]. environmental damage and climate change have been proven to be one of the causes of violent conflict within and between countries. in addition, environmental damage and environmental change issues are among the leading causes of a decline in the level of the economy, which directly or indirectly has a significant impact on the capacity of military forces and resources for a country's defense [12]. in some developed and developing countries, natural resources and environmental services are essential drivers of economic growth and employment levels. income and employment in primary sectors, such as agriculture, forestry, fishing, and mining, and services that depend on the environment, such as tourism, can be negatively affected by environmental changes. as an economy's natural capital base erodes, so does the long-term effectiveness of its military. environmental security is a process in which solutions to environmental problems contribute to national security goals. the issue of environmental security has begun to experience an increase in its discussion since world war ii ended and the start of the cold war. when the two big blocks of countries at that time were competing to increase capabilities in the field of technology, the drastic increase in the number of industries could be marked by the increasing intensity of various kinds of pollution from the industrial sector [11]. environmental damage and climate change have been proven to be one of the causes of violent conflict within and between countries [13]. in addition, environmental damage and environmental change issues are among the leading causes of a decline in the level of the economy, which directly or indirectly has a significant impact on the capacity of military forces and resources for a country's defense [12]. dss vol. 4, january 2023, pp.29-35 32 2.2. human security united nations development program (undp) broadens the conceptualization of security by defining human security as security from chronic threats such as hunger, disease, and oppression and protection from sudden and painful disturbances in the pattern of daily life [14]. according to undp, some of the components of human security are individual-centered components, such as economic security, food security, health security, environmental security, personal security, community security, and political security [14]. one of the efforts by the un in human security was establishing the human security commission in 2001. in responding to this issue, the human security strategy was made proactive by emphasizing conflict prevention and peacebuilding rather than in the form of humanitarian response assistance [15]. in achieving human security goals, the human security commission proposes two main strategies: protection of empowerment. protection strategies refer to the norms, processes, and institutions that protect people from critical and widespread threats [16]. this strategy is top-down in its implementation, where the state must show its responsibility to form a protective human security structur [15]. the implementation of national security, which is comprehensive and includes a combination of territorial security (defense) and human security, must involve all elements of society by cooperating with all state institutions. this comprehensive nature of national security raises the implication that one or only a few institutions cannot handle the concept of national security because it has become a standard security, so there must be a form of cooperative security between all components, both military and civilian [17]. 3. results and discussion 3.1. environmental security and laman kinipan agrarian conflict environmental security is one of the elements of national security because of the importance of environmental issues in the current era as the earth ages and human innovation progresses at the expense of many aspects of the environment, such as deforestation, the disposal of carbon gas emissions by companies and government elements, motorized vehicles, burning fossil fuels for electricity generation, and others. deforestation has a significant influence on the issue of national security. deforestation has several significant effects, such as global warming, which results in rising sea levels, the loss of millions of species of flora and fauna in forest areas, and various threats of major disasters and becomes a threat to national security if it continues to be maintained [18]. in addition, according to the ministry of defense of the republic of indonesia (2015), the indirect impact of climate change on national security is that basic human needs will be disrupted and cause disruptive impacts on national security. it will be difficult for humans to readjust themselves to manage stress. it will eliminate political stability, a weakened economy, a crisis of basic human needs such as water, food, and various diseases to both vertical and horizontal conflicts. in addition, the impact of climate change due to deforestation on the laman kinipan indigenous forest has caused a major flood disaster that had never happened before. natural disasters ultimately affect national security [19]. today, the impact of climate change is starting to be felt, such as increasing temperatures due to global warming and rising sea levels due to melting ice at the poles, which will threaten national security for countries which makes the issue of environmental security one of the vital security issues to be discussed. long term deforestation to clear land has been scientifically proven to exacerbate environmental damage. some of the impacts of deforestation on environmental damage are a decrease in the quality of the atmosphere layer, contributing to an increase in greenhouse gasses which leads to an increase in global temperatures [20]. bruhl and simonis revealed that three things accelerate environmental degradation/damage, namely: 1. the attitude of humans who over-exploit resources, both non-renewable resources and renewable resources. 2. the burden on the earth exceeds its limits and carrying capacity. 3. human activity often destroys ecosystems [21] in the laman kinipan indigenous area itself, environmental issues are important because the indigenous forest area has many functions, namely as a producer of oxygen, as ecological wealth in it, as a place for indigenous peoples to find a source of livelihood, and so on [22]. in addition, the geographical location of the village of kinipan, which is downstream of the batang kawa river watershed, makes kinipan the last place of defense dss vol. 4, january 2023, pp.29-35 33 for the batang kawa watershed. suppose deforestation in the kinipan affects the watershed area in the kinipan. in that case, the upstream part of the river and along the batang kawa watershed will be damaged, affecting the villages around the batang kawa watershed [23]. in another source, the impact of the deforestation of the laman kinipan indigenous forest, which was replaced by an oil palm plantation owned by pt sml itself, had an ecological impact in the form of the presence of an unprecedented big flood disaster in the village of kinipan due to the loss of forest areas that function as rainwater catchment areas [24]. environmental degradation is a threat to national security in indonesia. the laman kinipan agrarian conflict is based on the fact that pt sml carried out deforestation of indigenous forest areas, which have been well guarded and managed by the laman kinipan indigenous people. massive deforestation of forest areas to be planted with oil palm and lasting for decades will threaten environmental security. another impact of deforestation that the residents of kinipan directly felt was a natural disaster in the form of a massive flood that inundated the area around the batang kawa river, including the residential area of the laman kinipan indigenous people. this unprecedented big flood is the impact of deforestation, which has been functioning as a rainwater catchment area. when the soil cannot absorb water, the nearest destination for water is the batang kawa river which causes the river to overflow. natural disasters threaten national security because they can disrupt the stability of various fields, such as the economy, society, and politics, and cause damage to public facilities and infrastructure. environmental security ultimately significantly influences national security because if environmental security is threatened, many negative impacts will be generated and felt by various parties. 3.2. human security and laman kinipan agrarian conflict in terms of elements of human security/human security/social security, the conflict that occurs is a threat to human security. the agrarian conflict of the laman kinipan indigenous community, in addition to causing violent conflict between indigenous peoples and the indonesian national police who received pt sml's complaint in 2020, also caused horizontal conflict between indigenous peoples who had different opinions about the takeover of pt sml's indigenous forest [23]. in the white paper by the ministry of defense of the republic of indonesia (2015), conflicts are part of a social disaster threatening national security that the government of indonesia must anticipate. the state must guarantee human security because security is an essential element of national security. threats to human security ultimately lead to national security itself. one of the theories of human security established by the united nations development program is security from fear. the human security approach to protecting individuals from violent conflict while recognizing that the threat of violence is closely related to poverty, lack of state capacity, and other forms of injustice. this approach argues that a limited focus on violence is a realistic and manageable approach to human security. this approach's main concerns are emergency relief, conflict prevention and resolution, and peacebuilding [25]. the laman kinipan agrarian conflict affected the human security of the laman kinipan indigenous people. related to the impact of environmental security, natural disasters in the form of floods threaten the human security of indigenous peoples because they cause health problems, potential casualties, loss or damage to their homes, and difficulties in earning income. human security is threatened due to the destruction of nature and the environment for the benefit of a few people who expect material gain. apart from that, this conflict also threatens the human security of the laman kinipan indigenous people, as evidenced by the excessive detention of the head of the laman kinipan indigenous community effendi buhing by law enforcement officers. effendi buhing, who was detained by coercion which led to violent conflict, violated a person's human rights. in addition, the impact of this conflict on threats to human security is acts of violence, intimidation, land clearing, and the arrest of members of the indigenous community who are not proven to have committed a crime [26]. we can see that this is a form of violation of a person's right to maintain human security. if this conflict becomes a protracted conflict, then the potential for conflict escalation and the scope of the conflict can become more significant and threaten the stability of national security because one form of threat to national security is a social disaster which includes conflict. dss vol. 4, january 2023, pp.29-35 34 4. conclusions the goal of the state to guarantee national security must be realized not only from one or several elements of security but includes all elements of national security. national security will be threatened if one or several elements of national security are threatened. in this study, the case of agrarian conflict involving the laman kinipan indigenous community and pt sawit mandiri lestari can pose a threat to national security if it is studied using the theory of national security with two examples of elements of national security, namely environmental security and human security. this conflict has become a threat to environmental security because of the environmental destruction carried out by pt sawit mandiri lestari through a large-scale deforestation program in kalimantan forests which also seized the laman kinipan customary forest area. deforestation has been proven as one of the causes of threatening environmental degradation. forest management by the laman kinipan indigenous community which is carried out sustainably and does not damage the environment will ensure environmental safety from major forms of deforestation for the benefit of capitalism. conflicts that have reached violent conflicts have demonstrated threats to human security. conflict as a form of the social disaster becomes an obstacle to the realization of national security. in addition, environmental security threats are related to social security due to natural disasters that have occurred and have had an impact on the basic rights of the kinipan people who are victims of flood disasters, such as health problems, building damage, and food shortages. the form of criminalization against the residents of kinipan who fight for their rights is a form of threat to social security and a violation of human rights. by resolving conflicts and fulfilling the rights and demands of the laman kinipan indigenous community, two elements of national security, namely environmental security, will be realized and can accelerate the realization of national security. acknowledgements gratitude are addressed to major general tni (ret.) dr. i gede sumertha ky, psc, m.sc and major general tni dr. ir. pujo widodo, s.e., s.h., s.t., m.a., m.si., m.d.s., m.si. (han) as the research supervisors during the study time of the corresponding author at the peace and conflict resolution studies, faculty of national security, republic of indonesia defense university. declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. references [1] b. buzan, people, state, and fear: an agenda for international security studies in the post cold era, 2nd edition, london: harvester whatseaf, 1991. [2] j. sudarsono, lemhannas seminar in cikeas bogor, interview, 2007. [3] g. ritzer, d. j. goodman, modern sociological theory, jakarta: kencana, 2010. [4] n. f. rachman, "the explanatory chain of chronic agrarian conflicts", bhumi jurnal agraria dan pertanahan, no. 37, pp. 1-14, 2013. [5] agrarian reform connsortium, "notes on the end of year 2020", 2020. [6] indigenous territory registration agency, "laman kinipan indigenous territory", [online]. available: https://www.brwa.or.id/wa/view/vdlinvdlwxixd2m. [7] indonesian forum for the environment, "stop the confiscation of indigenous territories and criminalization of indigenous peoples of laman kinipan!", 27 august 2020. [online]. available: https://www.walhi.or.id/hentikan-perampasan-wilayah-adat-dan-kriminalisasi-masyarakat-adat-laman dss vol. 4, january 2023, pp.29-35 35 kinipan. [8] n. k. krismanika, i. p. g. seputra, l. p. suryani, "the granting of cultivation rights on communal land according to land law in indonesia", jurnal interpretasi hukum, vol. 1, no. 1, pp. 161-166, 2020. [9] b. baskoro, "sml denies allegations of land acquisition, here's the response of the kinipan traditional elders," 11 novmber 2018. [online]. available: https://www.mongabay.co.id/2018/11/11/sml-bantah-tudingan-caplok-lahan-begini-jawaban-tetua-adatkinipan/. [10] us environmental protection agency, "environmental security: strengthening national security through environmental protection", september 1999. [online]. available: https://nepis.epa.gov/exe/zypurl.cgi?dockey=91018n4s.txt. [11] b. r. allenby, "environmental security: concept and implementation", international political review, vol. 21, no. 1, 2000. [12] i. gülenç, "climate action failure and its implications on military security", beyond the horizon, 12 september 2022. [online]. available: https://behorizon.org/climate-action-failure-and-its-implicationson-military-security/. [13] j. pugh, "challenges and opportunities of human conflict and environmental transformation in ecuadorian highlands", pirineos, no. 163, 2008. [14] r. jolly, d. b. ray, "the human security framework and national human development reports: a review of experiences and current debates", may 2006. [online]. available: https://hdr.undp.org/system/files/documents/human-security.human-security. [15] c. c. muguruza, "human security as the link between humanitarian action and peacebuilding", in the humanitarian challenge, springer, 2015, pp. 41-46. [16] united nations, "human security now: protecting and empowering people / commission on human security", 2003. [online]. available: https://digitallibrary.un.org/record/503749?ln=en. [17] e. fitrah, "the idea of human security and indonesian national security policy", jurnal insignia, vol. 2, no. 1, pp. 27-41, april 2015. [18] g. singh, b. singh, "deforestation and its impact on environment", international journal of advance research in science and engineering, vol. 06, no. 03, pp. 262-268, 2017. [19] republic of indonesia ministry of defense, "republic indonesian defense white paper", 2015. [online]. [20] b. d. siswoko, "development, deforestation and climate change," jurnal manajemen hutan tropika, vol. xiv, no. 2, pp. 88-96, 2008. [21] t. brühl, u. e. simonis, "world ecology and global environmental governance", discussion papers, research professorship environmental policy, 2001. [22] b. herinata, interviewee, eecutive director of walhi central kalimantan. [interview]. 28 april 2022. [23] f. kurnianto, head of aman central kalimantan, interview, 21 june 2022. [24] save our borneo, "accepting the ecological impact, kinipan experienced a major flood", 9 july 2020. [online]. available: https://saveourborneo.org/terima-dampak-ekologi-kinipan-banjir-besar/. [25] united nations development programme, "human development report 1994", undp, 1994. [26] cnn indonesia, "the head of the kinipan indigenus community was released after being arrested by the police", 27 august 2020. [online]. available: https://www.cnnindonesia.com/nasional/2020082717405012-540047/ketua-adat-kinipan-dilepas-usai-ditangkap-polisi. microsoft word 22-31_187.docx issn 2744-1741 defense and security studies original research vol. 3, august 2022, pp.22-31 https://doi.org/10.37868/dss.v3.id187 this work is licensed under a creative commons attribution license (https://creativecommons.org/licenses/by/4.0/) that allows others to share and adapt the material for any purpose (even commercially), in any medium with an acknowledgement of the work's authorship and initial publication in this journal. 22 minimum viable product: a robot solution to eod operations hamza bećirspahić1*, haris basarić2, tarik namas3, benjamin duraković4 1 mechanical engineering department, international university of sarajevo, bosnia 2,3 electrical and electronics engineering department, international university of sarajevo, bosnia 4 faculty of engineering and natural sciences, international university of sarajevo, bosnia *corresponding author e-mail: hamzabecirspahic@gmail.com received feb. 27, 2022 revised jun. 19, 2022 accepted jun. 28, 2022 abstract this paper presents design and development of eod robot, with mvp characteristics. the design is based on a solid base structure with arm manipulator attached to the base. the overall dimensions of the robot are 590x860x340 mm and it weighs 55 kg. the robot is capable of towing heavy objects as well as lifting sensitive objects. the robot has a maximum horizontal reach of 1400 mm and a vertical of 1200 mm. the robot is tested according to guidelines developed in the usa, as much as the conditions allowed. briefly, the results can be summarized as follows: the setup time for the robot is 10 minutes, it can reach speeds up to 8 km/h, it has a towing capacity of 40 kg and the maximum communication reach is 20 m. among successful tests, the weaknesses were also found which act as a guide for future designs and developments. these weaknesses are what mvp concepts are actually developed for. © the author 2022. published by arda. keywords: explosive ordnance disposal, eod robot, ordnance, robot testing, minimum viable product, mvp 1. introduction landmine and cluster munition monitor reported that around 26 states and 3 other areas are contaminated by cluster munition remnants, as of august 2021 [1]. cluster munition remnants are defined, by the convention on cluster munition, as conventional munition designed to disperse explosive submunitions, weighing less than 20 kg and including that submunition, that failed to detonate [2]. it is very easy to conclude that the impact is still widely present and it is being addressed by many organizations, international as well as national. in bosnia and herzegovina, among the countries most hit by cluster munition and landmine contamination, the problem is still being addressed, as the country asked for the extension of the deadline for clearance in 2021 and expects clearance to be completed by late 2022 [1]. there is one more problem authors found. the defense industry companies, locally, are testing explosives at their premises and after an unsuccessful testing usually the human operator dismantles the explosive by hand which can lead to severe injuries, not uncommon to occur in these companies. this and the facts mentioned in the first paragraph, are what inspired and motivated the authors to try to contribute to a solution. the solution, as seen by the authors, is a remotely controlled robot that is equipped with a manipulator and a gripper and capable of handling operations that are required in an explosive ordnance disposal (eod). since eod robots are readily available on the market, some of the most popular are presented in table 1. dss vol. 3, august 2022, pp.22-31 23 table 1. eod robots available on the market company model max. lift capacity weight reach (forward) speed reference 1. telerob, germany teodor evo 100 kg 383 kg 1860 mm 3 km/h [3] 2. northrop grumman, u.s.a. andros f6a 61 kg 220 kg 1440 mm 4.8 km/h [4] 3. qinetiq inc., u.s.a. talon 68 kg 81 kg 1570 mm n/a [5] 4. l3harris technologies, u.s.a. t7 113+ kg 322 kg 2200 mm 8+ km/h [6] 5. superdroid robots, u.s.a. lt2-f “bulldog” 7+ kg full extension 40 kg 1220 mm 2 km/h [7] 6. superdroid robots, u.s.a. hd2-s “mastiff” 9+ kg full extension 68 kg heaviest configuration 890 mm 2 km/h [8] 7. nic instruments ltd., united kingdom zeus 15 kg 51.7 kg 1460 mm 3 km/h [9] teodor evo is an eod robot developed by telerob company. the robot is capable of performing not just eod operations but also cbrn operations, which stands for chemical, biological, radiological and nuclear threats. it is equipped with a 6 degrees-of-freedom manipulator and an onboard tool magazine for convenient remote tool change. it has intuitive control handling and it is very popular with military and law enforcement agencies [3]. andros f6a is an eod robot developed by a subsidiary company of northrop grumman, remotec inc. it is distinguished by the capability to pneumatically release its wheels for width reduction when applications demand it. it is equipped with a 7 degrees-of-freedom manipulator and capable of 3-4 hours on mission operations [4]. talon robots are eod robots developed by qinetiq inc. they are in active service since 2000s when they were used in bosnia and herzegovina for the disposal of live explosives. talon robots are also one of the lightest robots on the market that are equipped with multiple degrees-of-freedom manipulators. it can also be equipped with multiple cameras with the option to be mounted with thermal cameras as well. the advantage of talon certainly is the number of options that the controller comes with, for example, it comes as lcu, meaning laptop control unit, as well as trc, tactical robot controller [5]. t7 is a heavy-duty robot developed by l3harris technologies in the united states. it is designed to assist not exclusively eod operations but also hazmat, meaning hazardous materials cleanup, intelligence and surveillance operations as well. it can be mounted with many different tools such as a disruptor, which blasts pressurized water to neutralize the threat on-site, a forklift and many different sensors such as the sensors for cbrn operations. one of the most significant characteristics of this robot is certainly the haptics control it utilizes. haptics provide the operator with the sense of touch and proximity, almost as good as a bare hand can provide [6]. superdroid robots company manufactures the model lt2-f, commonly known by the name “bulldog”. this model comes in many different configurations. it can be equipped with a 4-axis or a 6-axis arm manipulator, that can be equipped with wire cutters, different sensors for different applications. the arm manipulator can dss vol. 3, august 2022, pp.22-31 24 be shortened or removed as well to aid in low clearance areas. as previously listed models it can be applied in many different scenarios, ranging from eod to remote surveillance and building cleanups [7]. hd2-s also known as the “mastiff” is another model manufactured by superdroid robots. this model is a bit bulkier model compared to lt2-f model. it as well comes in different configurations and can be equipped with wire cutters and application dependent sensors. capable of staying operational up to 8 hours [8]. zeus eod robot is developed by nic instruments ltd. it is a very reliable product that utilizes a very effective communication type, an fsk, meaning frequency shifting keying, which is a communication type that employs alternating frequencies used in communication to avoid any noise disturbances. it is equipped with a battery capable of operating from 2-4 hours, mission dependent. it comes in different configuration with different arm sections, meaning different degrees-of-freedom manipulators [9]. the preferred communication in unmanned vehicles utilizes the ems (electromagnetic spectrum), between operator unit and robot, because it ensures a long range of operation. the waveforms of the communication are encrypted, especially when used in military applications [10]. sometimes ems is not applicable, because of strong interferences or large pieces of metal, which disrupt the signal. in those instances, some manufacturers provide a cable connection, which can reach up to 200 m, ideally a fiber optic cable [9]. the pricing of these robots is not readily available on the official websites of the companies. an interesting article, which presents cost-wise accessible eod solutions, states that the range of prices for commercial robots, such as the ones presented in table 1., is from $40 000 to $150 000 [11]. the purpose of this paper is to design a minimum viable product for eod operations. an iterative designbuild-test cycle is performed with the aim of developing a low-cost optimal physical platform for eod robot in the category. the configuration test purpose is to quantitatively evaluate the packaging and setup tools used to start up the robot. the goal is to come up with metrics about the weight of packaging, setup time from configuration to deployment, weights of the control unit and the tools needed for repair. particularly, the following objectives are achieved: physical design and development, mobility test on a flat paved terrain, mobility test with towing capacity, radio communications test by establishing a line of sight, manipulation test grasping dexterity and robot configuration for logistics tests. 2. methods the design of an eod robot proposed by the authors was inspired by the robots readily available on the market. the base structure of the robot is made from steel bars, roughly 25 cm2 in cross-section area. the bars are welded together to form a structure that consists of two rectangles connected by bars with an angle, as seen from the side. the rectangle closer to ground level is reinforced by bars welded to form a cross like symbol. four dc motors are used to power mobility and they are welded on to the lower rectangle, with steel axels welded on them and to the wheels. the wheels are standard inflatable rubber wheels that come from small garden carts. the manipulator is made of three steel bar segments. the first segment is welded to the bottom of the base structure at its middle and extends some 50 cm from the weld. the second segment is welded to a door hinge which is welded to the first segment and the same procedure is applied to the third segment as well. the gripper is positioned at the end of the third segment and is made from aluminum. it is manufactured on a cnc machine and coated in plastics on the inside to secure maximum gripping. the manipulation of the arm is made possible by three linear electrical actuators which can lift weights up to 100 kg, respectively. the actuators are fastened to the segments of the arm manipulator by screws and nuts. the whole base structure is enclosed by plywood pieces and inside is the „brain“ of the robot. electronically, the robot is manipulated by simple relays which are powered through a car battery of 12 v. the opening and closing of switches, depending on the operation that needs to be applied, and the relays is controlled by raspberry pi which is powered by a power bank. the underlying circuit is called an h bridge. the communication with the robot is established through the wireless network connection that raspberry pi emits. the final design elaborated is presented in figure 1. followed by table 2. where the components used in the manufacturing are briefly presented. dss vol. 3, august 2022, pp.22-31 25 as the title of this paper suggests, the authors presents a minimum viable product (mvp), described as: “a version of a new product that allows a team to collect the maximum amount of validated learning about the customers with the least amount of effort “, by eric ries, founder of lean startup methodology [12]. figure 1. design of the robot table 2. list of components built in physical steel platform number. component specifications quantity 1. motor 12v high torque motors 4 2. wheel 20 cm diameter wheel 4 3. relay 5v 8 channel output relay board, maximum current 10a 2 4. raspberry pi raspberry pi model 4 1 5. battery 12v car battery 1 6. actuator linear electric actuator 12v, maximum load capacity 100 kg 3 7. power bank 5v dc power bank 1 it is important to emphasize the viable part of the name as well as the minimum part and not fall into the trap of favoring one over another [13]. in other words, the product has to satisfy the functionality requirements. the authors do emphasize that their design is not fully functional as compared to the robots listed in table 1. in the introduction. the department of homeland security of u.s.a. alongside with the national institute of standards and technology wrote a guide on the topic of testing and validating performance indicators of response robots, which include robots applied in dismantling explosive devices, searching for survivors in collapsed structures, investigating of illicit border tunnels and many more fields of application [14]. under the sponsorship of department of homeland security, the response robots undergo real-life scenarios which can include navigating through the test site and execution of different tasks such as: climbing stairs, handling of objects with manipulators, testing of communication range and many more [14]. the tests performed in this research are: logistics robot test configuration, mobility on a flat paved terrain, mobility with towing capacity, radio communications establishing a line of sight, manipulationgrasping dexterity [14]. the mobility on a flat paved surface evaluates the speed of the robot. it is done by navigating the robot between two pylons 50 m apart. average time is calculated from 10 repetitions. mobility with towing capacity evaluates the maximum capacity the robot can tow on a flat paved surface. average time for 10 repetitions is used as a metric. radio communications test method establishes a line of sight which is the maximum downrange distance at which the robot completes the tasks to verify the functionality of control, video, audio dss vol. 3, august 2022, pp.22-31 26 and sensing mechanisms. manipulation evaluates the grasping dexterity of the arm manipulator. it is measured by the number of pick-and-place operations a robot can complete in as little time possible. in addition to tests elaborated above, energy consumption of the robot is also measured. it is evaluated using a multimeter, which measures how much current is drawn by actuators under specified load application. 3. results and discussion as a result of the methods used in the construction of the robot, the basic specifications of the robot are presented next. the robot`s base structure is roughly 590 mm in width, measurement which includes wheels, 820 mm in depth, measured from the center of the wheels and 340 mm in height, measured from the ground up. the arm manipulator has a maximum reach of roughly 1400 mm in horizontal direction and a maximum reach of 1200 mm in the vertical direction. the overall weight of the robot is roughly 55 kg, which includes all inside components. the dimensions are displayed in figure 2. figure 2. dimensional sketch of the robot the robot`s functionality is measured according to the guidelines presented in the methods section. the guideline was written by the department of homeland security with its associates. the authors specifically chose applicable tests from the guideline such as setup time, speed test, mobility with towing capacity, radio communication test, object manipulation and lifting capacity. the test results are briefly presented in table 3. table 3. test results setup time speed mobility with towing capacity flat paved surface mobility radio communication test manipulation of objects lifting capacity 10 min up to 8km/h 40 kg 10 repetitions in 10 min 20 m line-ofsight 3 objects per 10 min at full extension 15 kg the first test conducted is the robot test configuration which measures the setup time of the robot and its equipment. the authors also took into consideration the transport of the robot using an automobile. since the height of the arm, when all the actuators are in the fully retracted position, prevents the robot to fit into an average size automobile, a necessary measure is to dismantle the actuator, stemming from the base of the robot to the arm, to be able to fit the robot into the automobile. this increases the setup time which amounts to 10 minutes and includes: extracting the robot from the car, connecting the actuator that was dismantled previously, connecting the power wires to the car battery, connecting the power bank to the raspberry pi and finally connecting the laptop to the wi-fi connection of the raspberry pi. the most time-consuming setup dss vol. 3, august 2022, pp.22-31 27 process is surely the connection of the actuator which requires the use of ordinary plyers and a size 13 wrench. to conclude the results, setup time amounts to 10 minutes, with the weight of the equipment of 4 kg (laptop as the control unit, plyers and a wrench, additional wiring for repair). the second test conducted is the „speed test“. according to authors measuring, the robot can achieve speeds up to 8 km/h, which is competitive enough. the authors note that the robot does not possess speed control, since the dc motors are taken form windshield car wipers and are programmed to utilize one speed of motion. on the bright side, these dc motors can generate around 30 nm of torque, well enough to power the robot. mobility with towing capacity is the test that the authors conducted inside the laboratory where the robot is constructed. the maximum tow value tested is 40 kg. the robot`s capability of towing motion was also successfully tested with the towing of a wheeled chair with a person sitting on the chair. although the chair is wheeled, this test proves that the robot has substantial towing capacity. radio communications test, testes the capability of the robot to continue working and receiving signals from the control unit far away from it. this test is probably the weakest point of the robot, since the communication with the robot is achieved through wi-fi signal of the raspberry pi. the furthest distance away from the control unit, at which the communication still operates without interferences is roughly around 20 m. this distance is further lowered with the introduction of obstacles such as walls. this weak point is surely something the authors are working to improve. manipulation of objects is a test which measures the capability of the robot to pick-and-place as many objects in as little time possible. the authors do mention here that the gripper is designed in a such a way, that the objects need to be gripped with the very tip of the gripper in order to lift them. this especially applies to thin objects such as bottles, which would otherwise fall through the gripper because of the width of the gripper at its middle. the authors manipulated objects such as bottles, desk chairs, bricks, metal objects etc. one of the disadvantages of the gripping of the robot is the fact that the whole robot needs to be moved in order to place the end of the gripper in the position to grab an object. this is due to the fact that the arm can only be manipulated in the vertical direction. to conclude, due to the limitations in the mobility of the arm, the robot can pick-and-place only 3 objects in the time span of 10 minutes. in addition to these tests, a diagram of the lifting capacity of the robot is presented in figure 3. below. the outer circle presents the lifting capacity at maximum extension and the inner circle represents the lifting capacity at full retraction. these values can be narrowed down to a single value because the lifting is executed only using one actuator at a time. here the values differ only because of the fact that the arm is loosely constructed and is not capable of handling higher loads at full extension. figure 3. lifting capacity in relation to reach dss vol. 3, august 2022, pp.22-31 28 further tests are related to energy consumption also related to the lifting capacity. the relationship between current consumption and lifting capacity is shown in figure 4. figure 4. current consumption vs. load values figure 4. shows current consumption on different loads expressed in kg that is needed for actuator. it can be seen that the relationship is almost linear. also considering manufacturer’s datasheets it should be indeed linear. peak current consumption is 2.3 2.5 a for the 20 kg load with 12 v source configuration. for loads less than 6 kg energy consumption is 1 a or less. power-vise 30 w of power is used at peak. measurement is done by using a multimeter device (also can be done using amperemeter or oscilloscope). actuators are connected in series and tested for various loads with constant 12 v voltage supply. figure 5. below shows how speed of the motor is slowly decreasing when the load is increased. the relationship is also linear. figure 5. speed vs. load values value drops slightly from 28 mm/s for load <2 kg to around 25.6 mm/s for the 20 kg load. first measurement experiment is done using timer and measuring tape. time is measured for 5 seconds with exact starting point after which distance is measured after timer is stopped. this measurement was repeated several times. second technique was directly programming actuators to be switched for exact amount of time controlled by main controller. this gives exact and more precise time of 5 s. dss vol. 3, august 2022, pp.22-31 29 based on the test result obtained in this research, a comparative analysis is done and the results are listed in table 4. table 4 in this research briefly presents the comparative advantages and disadvantages of authors eod robot to the robots availaible from table 1. in the introduction section. in a nutshell, authors robot is lower in performance features compared to models teodor evo and model t7, which mainly reflects in lower weight and lifting capabilities. on the other hand, lower cost presents an important advantage compared to these two models. competitive performances can also be observed compared to models zeus, hd2-s, lt2-f, andros f6a. these are mainly in regards to reach and lifting capacity. a significant advantage in lifting capacity, speed and reach potential performances are achieved compared to models hd2-s, lt2-f and andros f6a. to summarize, authors eod robot has a high potential to compete against the models already available on the market. table 4. comparative results model specification this eod robot this eod robot max. lift capacity: 20 kg weight: 55 kg reach (forward): 1400 mm speed: up to 8 km/h  competitive in category teodor evo [3] max. lift capacity: 100 kg weight: 383 kg reach (forward): 1860 mm speed: 3 km/h  lower category  lower performances  lower cost as an advantage andros f6a [4] max. lift capacity: 61 kg weight: 220 kg reach (forward): 1440 mm speed: 4.8 km/h  same category  competitive reach potential  higher speed of mobility  lower overall weight talon [5] max. lift capacity: 68 kg weight: 81 kg reach (forward): 1570 mm speed:  same category  lower lifting capacity t7 [6] max. lift capacity: 113+ kg weight: 322 kg reach (forward): 2200 mm speed: 8+ km/h  lower category  significantly lower lifting capacity  lower reach lt2-f “bulldog” [7] max. lift capacity: 7+ kg full extension weight: 40 kg reach (forward): 1220 mm speed: 2 km/h  same category  significantly higher lift capacity  competitive performances per each parameter  lower cost as an advantage hd2-s “mastiff” [8] max. lift capacity: 9+ kg full extension weight: 68 kg, with the heaviest configuration reach (forward): 890 mm speed: 2 km/h  significantly higher reach potential  higher speed of mobility  competitive overall weight  higher lifting capacity at full extension zeus [9] max. lift capacity: 15 kg weight: 51.7 kg reach (forward): 1460 mm speed: 3 km/h  same category  higher overall weight  competitive reach potential  competitive lift capacity dss vol. 3, august 2022, pp.22-31 30 4. conclusion this paper presents the design and development of an mvp eod robot, specifically designed to operate with explosive devices in their removal, disposal and neutralization. this mvp design is functionality-wise limited, due to budget limitations, but nevertheless, presents a solid opportunity for testing and presentation purposes. the final design is 590x820x340 mm in dimensions, weighs 55 kg with a maximum manipulator reach of 1400 mm. the vertical reach is 1200 mm. the setup time of the robot with all of its configurations is 10 minutes, and the equipment weighs 4 kg which includes a laptop, as a control unit, plyers, a wrench and some additional wiring for repairs. compared to models from table 1. authors robot lacks a control unit which is highly durable and easily carried. other equipment is carried independently and also lacks a custom-made bag. the setup time is mostly slowed because of the fact that the manipulator must be partially dismantled to fit into an average size car. models from table 1. usually come with a modular manipulator and other accessories which are easily mounted on the robot. slower setup time is also due to the fact that the raspberry pi needs to be manually turned on with a power cable and the program needs to be compiled each time the session is ended. fortunately, these specifications are easily made easier and improved. the robot can reach a speed of 8 km/h due to its high torque dc motors. the towing capacity is roughly 40 kg, which highly depends on the surface of the motion. the weakest point in the design is the communication reach, which is limited by wi-fi signal, to 20 m. the second weakest point is the gripping, which needs to be very precise, especially for thin, narrow objects, such as bottles. compared to the robots from table 1, this low-cost eod robot platform represents a solid foundation into further design and development endeavors, which will hopefully take place in the near future. the plan for future work is to upgrade the existing physical platform to an autonomous eod robot with the ability to detect explosive devices and mark them or safely dispose of them. declaration of competing interest the authors declare that they have no any known financial or non-financial competing interests in any material discussed in this paper. funding information no funding was received from any financial organization to conduct this research. references [1] “cluster munition monitor 2021”, reports, http://www.the-monitor.org/en-gb/reports/2021/clustermunition-monitor-2021.aspx (accessed apr. 10, 2022). [2] o. english and f. spanish, “diplomatic conference for the adoption of a convention on cluster munitions convention on cluster munitions,” 2008. [3] “teodor evo.” https://www.telerob.com/en/products/teodor-evo (accessed apr. 11, 2022). [4] “home northrop grumman.” https://www.northropgrumman.com/ (accessed apr. 11, 2022). [5] “bomb disposal robot qinetiq.” https://www.qinetiq.com/en-us/capabilities/robotics-andautonomy/talon-medium-sized-tactical-robot (accessed apr. 11, 2022). [6] h. technologies, “ruggedized robot for military, police and hazardous missions,” 2020. [7] “lt2-f bulldog lightweight tactical support robot by superdroid robots.” https://www.sdrtactical.com/robots/sdrt_bulldog.php (accessed apr. 18, 2022). [8] “hd2-s mastiff heavy-duty support robot by superdroid robots.” https://www.sdrtactical.com/robots/sdrt_mastiff.php (accessed apr. 18, 2022). [9] “zeus bomb disposal robot manufacture & supply | nic instruments.” https://www.nicltd.co.uk/zeus-ultimate-modular-unmanned-ground-vehicle/ (accessed apr. 18, 2022). [10] “unmanned systems integrated roadmap unt digital library.” https://digital.library.unt.edu/ark:/67531/metadc949794/ (accessed apr. 18, 2022). [11] t. andrew czop, k. hacker, j. murphy, t. zimmerman, a. czop, and t. zimmerman titan, “lowcost explosive ordnance disposal robot using off-the-shelf parts,” https://doi.org/10.1117/12.602526, vol. 5804, no. 27, pp. 130–140, may 2005, doi: 10.1117/12.602526. [12] “minimum viable product what is a mvp and why is it important?” https://www.productplan.com/glossary/minimum-viable-product/ (accessed may 08, 2022). dss vol. 3, august 2022, pp.22-31 31 [13] “what is a minimum viable product (mvp)?”, agile alliance. https://www.agilealliance.org/glossary/mvp/#q=~(infinite~false~filters~(tags~(~’mvp))~searchterm~ ’~sort~false~sortdirection~’asc~page~1) (accessed may 08, 2022). [14] “department of homeland security response robot performance standards”, nist, https://www.nist.gov/programs-projects/department-homeland-security-response-robot-performancestandards (accessed may 08, 2022). microsoft word 16-25_72.docx defense and vol. 1, no. 1, https://doi.org this work is lic others to share a authorship and in an over fragmen alan catov 1 defense tech *catovic@m © the auth 2020. published by arda. 1. introdu in the analy velocity of experimenta warheads de mechanical c fig. 1 show the mechan the primary explosive is rapid chemi amounts of detonation i products can thousand de reactions is expansion of fig d security s , december 20 g/10.37868/ds censed under a c and adapt the mat nitial publication rview of nts for hi ic1* hnology departm mef.unsa.ba hor y uction ysis of high e the fragmen al research h epends on th characteristic ws a schemat nism of fragm explosive ch s transformed ical reaction gaseous pr s so high th n significantl egrees celsiu very high (s f the detonat gure 1. schem studies 020, pp.16-25 ss.v1i1.72 creative commo terial for any pur in this journal. f gurney igh expl ment, mechani abstract the litera ammunitio that can be we perform keywords: explosive (h nts, which i has shown t he ratio of ex cs of warhea tic represent mentation is c harge and pro d very quick s in the mat roducts expa hat the chem ly expand in us, and the p several hund tion products matic represe ns attribution l rpose (even comm y method osive mu cal engineering ture survey on is presente e used for di med using the fragment ve he) warhead s very impo that the init xplosive cha ad body mate ation of the complex. th oceeds with kly from a p tter are char anding at hi mical reaction to the enviro ressure of th dred thousan s occurs, whi entation of th license (https://cr mercially), in any 16 d for es unition g faculty, univ y, related to ed. the basi ifferent mun e gurney me elocity; gurn ds with fragm ortant param tial velocity arge mass c erial, type of he warhea he process of the detonatio potential for racterized by igh speed. t ns inside the onment. the he detonation nd bars). due ich causes th he he warhe reativecommons. y medium with an timating versity of saraje o the initial ic gurney m nition configu ethod for a di ney constant; mentation, it meter of the of fragmen and mass o f explosive ch ad detonation f projectile ex on of the ma rm into mec y the release the formatio e explosives temperature n products a e to such a s he projectile b ead detonatio org/licenses/by/4 n acknowledgem g the ini evo, bosnia and l velocity o model for fra uration, is pr ifferent proje warhead det is necessary terminal ba nts formed b of warhead b harge, and its n process (co xpansion beg ain charge, w hanical work e of heat and on rate of g are complet e of the deton t the time of state of gas, body to expa n process [ad issn origi 4.0/ ) that allows ment of the work's itial velo d herzegovina of fragment agment initia resented. th ectile types i etonation; y to determi allistics. the by fragment body m meta s detonation ontrolled fra gins with the whereby the e k. explosion d the forma gaseous pro ted before th nation produ f completion a process o and and to fra dopted from n 2744-1741 inal research s s ocities of ts for he al velocity, he research s given. ne the initia eoretical and tation of he al, as well a parameters. agmentation) e initiation o energy of the ns caused by ation of large ducts during he detonation ucts is severa n of chemica of the sudden agment. 12] 1 f al d e s ). f e y e g n al al n dss vol. 1, no. 1, december 2020, pp.16-25 17 data on the initial velocity of the fragments are needed to be able to estimate the elements of the trajectory of the fragments, and thus their kinetic energy at a given moment (during movement through the atmosphere). the measure of the explosive power is mainly expressed in the literature using the strength of the shock wave generated by that explosive, or on the total chemical energy that the explosive contains. in this way, the velocity of the shock wave, the detonation pressure, and the heat generated by the detonation of explosives can be expressed. although this way of understanding and assuming the properties of explosives is accurate, it does not provide information on the initial velocity that an explosive can communicate during detonation of munition to fragments [1]. during world war ii, physicist ronald w. gurney published several scientific papers explaining how the initial velocity of fragments could be calculated with relatively high accuracy. his scientific works thus created a method that is still used today to calculate the initial velocity of fragments. this method was developed to suit different systems and configurations of metal-explosive systems. although the shock wave plays a very large role in the transfer of energy from explosives during detonation to metal, gurney in his method does not take into account the properties of the shock wave itself. in his research, gurney assumed [1] that during detonation, a final amount of energy is released by the explosives, which is converted into kinetic energy of fragments and kinetic energy of detonation gases. he also assumed that detonation gases have a uniform density and a linear one-dimensional velocity profile. the gurney method can be used for all one-dimensional metal-explosive systems. the gurney constant, which appears in his method, can be estimated experimentally (explosive cylinder expansion test), computer programs (in hydrocodes), and analytical models. henry (1967), jones (1980) and kennedy (1970) reported gurney’s constant values for certain explosives while dobratz (1982) made the greatest contribution [2]. some researchers (kennedy, randers-pehrson, lloyd, odinstov) have proposed certain modifications of the gurney model, and other authors (hirsch, chanteret, chou-flis, kleinhanss, hennequin) have applied the gurney method to imploding configurations (configurations where the explosive is on the outside and the body on the inside; i.e. liner and explosive in heat warheads). modifications of the gurney base model mainly consisted of deriving formulas for geometric configurations of systems not covered by the original gurney model, and for a larger range of m/c ratios. henry (1967), jones (1980), and kennedy (1970) also used gurney’s method for different metal-explosive configurations. hirsch (1986) modified the basic gurney formulas for exploding cylinders and spheres to extend their use to lower metal to explosive mass ratios m/c [2]. another extension of the gurney method was given by chanteret (1983) who developed an analytical model for symmetric geometric configurations. fucke et all. (1986) and bol and honcia (1977) measured fragment velocities for large m/c ratios [2]. karpp and predeborn (1974, 1975) showed that the assumptions about the initial velocity of the fragments obtained by the gurney method are adequate for cases when the flow is one-dimensional and for practical c/m relations that can be encountered in reality (0,1