Full Issue

Archive

object(Publication)#697 (6) { ["_data"]=> array(29) { ["id"]=> int(1803) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2016-08-31" ["lastModified"]=> string(19) "2021-11-17 16:06:02" ["sectionId"]=> int(38) ["seq"]=> int(0) ["submissionId"]=> int(1686) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(124) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(6) "93-105" ["pub-id::doi"]=> string(23) "10.32565/aarms.2016.2.1" ["abstract"]=> array(2) { ["en_US"]=> string(977) "

Military operations are very complex undertakings. However, complexity is not a feature unique to military operations. When biologists wanted to understand the properties of gene mutation they also faced complexity. Confronted by a large number of genes featuring different characteristics, a difficult-to-decode interac- tion among those genes, and an environment that could not be excluded as a factor, Sewell Wright introduced the shifting balance theory, also known as the theory of the fitness landscape. The theory allows complexity to be seen as a process that rests on adaptation and mutation. These two processes are also central to military operations as it is imperative to offset the changing conditions coming both from the environment and the interaction with the enemy. In the article the author uses Wright’s theory to help see military operations as a complex optimization problem that includes approximations and estimations regarding optimal values.

" ["hu_HU"]=> string(977) "

Military operations are very complex undertakings. However, complexity is not a feature unique to military operations. When biologists wanted to understand the properties of gene mutation they also faced complexity. Confronted by a large number of genes featuring different characteristics, a difficult-to-decode interac- tion among those genes, and an environment that could not be excluded as a factor, Sewell Wright introduced the shifting balance theory, also known as the theory of the fitness landscape. The theory allows complexity to be seen as a process that rests on adaptation and mutation. These two processes are also central to military operations as it is imperative to offset the changing conditions coming both from the environment and the interaction with the enemy. In the article the author uses Wright’s theory to help see military operations as a complex optimization problem that includes approximations and estimations regarding optimal values.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(73) "Network Centric Warfare as Complex Optimization: An Evolutionary Approach" ["hu_HU"]=> string(73) "Network Centric Warfare as Complex Optimization: An Evolutionary Approach" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#732 (6) { ["_data"]=> array(15) { ["id"]=> int(1943) ["email"]=> string(25) "Jobbagy.Zoltan@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1803) ["seq"]=> int(0) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Jobbágy" ["hu_HU"]=> string(8) "Jobbágy" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Zoltán" ["hu_HU"]=> string(7) "Zoltán" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(23) "network-centric warfare" [1]=> string(20) "complex optimization" [2]=> string(20) "biological evolution" [3]=> string(17) "fitness landscape" [4]=> string(10) "adaptation" } ["en_US"]=> array(5) { [0]=> string(23) "network-centric warfare" [1]=> string(20) "complex optimization" [2]=> string(20) "biological evolution" [3]=> string(17) "fitness landscape" [4]=> string(10) "adaptation" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#745 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19835) ["id"]=> int(990) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1803) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#121 (6) { ["_data"]=> array(29) { ["id"]=> int(1804) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2016-08-31" ["lastModified"]=> string(19) "2021-11-17 16:06:25" ["sectionId"]=> int(38) ["seq"]=> int(1) ["submissionId"]=> int(1687) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(124) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "107-120" ["pub-id::doi"]=> string(23) "10.32565/aarms.2016.2.2" ["abstract"]=> array(2) { ["en_US"]=> string(1028) "

Public health belongs to the “One Health” umbrella. As military veterinary medicine evolved, it became embedded in national security. Many armed forces still have active veterinary services, both regular and reserve components. The military veterinarian can serve as an interface between civilians and civil organizations, can handle complex and interdisciplinary cases. Introducing the “One Health” concept both in practice and education has encountered many difficulties. Over time, “One Health” has been judged to be a “buzz word” in civilian areas; however, it is a weighty concept. Its importance is pronounced in military areas where practicing along One Health principles were present before the appearance of the term itself. Nevertheless, military “One Health” has not penetrated into the overwhelming “One Health” literature. Emphasizing the military aspects of One Health not only reveals an obscure corner but might help to regain the proper importance of the “One Health” concept.

" ["hu_HU"]=> string(1028) "

Public health belongs to the “One Health” umbrella. As military veterinary medicine evolved, it became embedded in national security. Many armed forces still have active veterinary services, both regular and reserve components. The military veterinarian can serve as an interface between civilians and civil organizations, can handle complex and interdisciplinary cases. Introducing the “One Health” concept both in practice and education has encountered many difficulties. Over time, “One Health” has been judged to be a “buzz word” in civilian areas; however, it is a weighty concept. Its importance is pronounced in military areas where practicing along One Health principles were present before the appearance of the term itself. Nevertheless, military “One Health” has not penetrated into the overwhelming “One Health” literature. Emphasizing the military aspects of One Health not only reveals an obscure corner but might help to regain the proper importance of the “One Health” concept.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(101) "A Hidden Corner of the “One Health” Concept: One Health, the Military Veterinarian, and Education" ["hu_HU"]=> string(101) "A Hidden Corner of the “One Health” Concept: One Health, the Military Veterinarian, and Education" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#741 (6) { ["_data"]=> array(15) { ["id"]=> int(1944) ["email"]=> string(22) "GyorffyAn@nebih.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1804) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Győrffy" ["hu_HU"]=> string(8) "Győrffy" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Andrea" ["hu_HU"]=> string(6) "Andrea" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(1945) ["email"]=> string(21) "JozwiakA@nebih.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1804) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Jozwiak" ["hu_HU"]=> string(7) "Jozwiak" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Ákos" ["hu_HU"]=> string(5) "Ákos" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(16) "“One Health”" [1]=> string(13) "public health" [2]=> string(10) "veterinary" [3]=> string(8) "military" [4]=> string(12) "armed forces" } ["en_US"]=> array(5) { [0]=> string(16) "“One Health”" [1]=> string(13) "public health" [2]=> string(10) "veterinary" [3]=> string(8) "military" [4]=> string(12) "armed forces" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#761 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19836) ["id"]=> int(992) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1804) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(27) { ["id"]=> int(1817) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2016-08-31" ["lastModified"]=> string(19) "2021-11-17 16:06:52" ["sectionId"]=> int(38) ["seq"]=> int(2) ["submissionId"]=> int(1700) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(124) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "121-140" ["pub-id::doi"]=> string(23) "10.32565/aarms.2016.2.3" ["abstract"]=> array(2) { ["en_US"]=> string(926) "

If our current way of life is to be kept sustainable, particular attention must be paid to the management of the world around us – including our environmental conditions, natural resources and assets, and particularly the available water resources – and to the protection of natural elements that are, for whatever reason, of crucial importance for all of us. The aims and methods of the necessary protection are, however, not always compatible with farming activities and forms of land use that have been practiced, in some cases, for centuries. This article describes some of the incompatibilities and conflicts between various forms of farming and the relatively new domestic nature conservation activities, with a focus on Hungary’s nature conservation areas and particularly its wetland ecosystems. This is followed by a discussion of problems associated with such conflicts and proposals for resolving them.

" ["hu_HU"]=> string(926) "

If our current way of life is to be kept sustainable, particular attention must be paid to the management of the world around us – including our environmental conditions, natural resources and assets, and particularly the available water resources – and to the protection of natural elements that are, for whatever reason, of crucial importance for all of us. The aims and methods of the necessary protection are, however, not always compatible with farming activities and forms of land use that have been practiced, in some cases, for centuries. This article describes some of the incompatibilities and conflicts between various forms of farming and the relatively new domestic nature conservation activities, with a focus on Hungary’s nature conservation areas and particularly its wetland ecosystems. This is followed by a discussion of problems associated with such conflicts and proposals for resolving them.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(151) "Wetland Ecosystems in Hungary’s Nature Conservation Areas and Problems Relating to their Economic Utilization, from the Aspect of Nature Conservation" ["hu_HU"]=> string(151) "Wetland Ecosystems in Hungary’s Nature Conservation Areas and Problems Relating to their Economic Utilization, from the Aspect of Nature Conservation" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#765 (6) { ["_data"]=> array(15) { ["id"]=> int(1962) ["email"]=> string(27) "hegedus.hajnalka@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1817) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Hegedűs" ["hu_HU"]=> string(8) "Hegedűs" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Hajnalka" ["hu_HU"]=> string(8) "Hajnalka" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(19) "nature conservation" [1]=> string(35) "wetland ecosystems under protection" [2]=> string(40) "problems relating to modes of management" } ["en_US"]=> array(3) { [0]=> string(19) "nature conservation" [1]=> string(35) "wetland ecosystems under protection" [2]=> string(40) "problems relating to modes of management" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#767 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19837) ["id"]=> int(1006) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1817) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#189 (6) { ["_data"]=> array(27) { ["id"]=> int(1818) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2016-08-31" ["lastModified"]=> string(19) "2021-11-17 16:07:19" ["sectionId"]=> int(38) ["seq"]=> int(3) ["submissionId"]=> int(1701) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(124) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "141-162" ["pub-id::doi"]=> string(23) "10.32565/aarms.2016.2.4" ["abstract"]=> array(2) { ["en_US"]=> string(954) "

There are five main chapters of the analysis. The first chapter outlines the unprecedented migration pressure on Europe including political, economic, demographic, social, etc. factors. The second chapter gives an account of both Western and Russian de-radicalization efforts, providing a broad understanding of what de-radicalization is. It starts from crisis zones in the Middle East, North Africa and Afghanistan, followed by Western handling of the migration process itself prior to migrant settlement in Europe. The third chapter provides a list of fundamental questions unasked and unanswered by the European political elites. The fourth chapter will analyze some scenarios depending on European policy changes. The fifth chapter will provide recommendations for European policy makers to handle the migration crisis and minimize the damage already done to the European way of life, where de-radicalization and reintegration play a key role.

" ["hu_HU"]=> string(954) "

There are five main chapters of the analysis. The first chapter outlines the unprecedented migration pressure on Europe including political, economic, demographic, social, etc. factors. The second chapter gives an account of both Western and Russian de-radicalization efforts, providing a broad understanding of what de-radicalization is. It starts from crisis zones in the Middle East, North Africa and Afghanistan, followed by Western handling of the migration process itself prior to migrant settlement in Europe. The third chapter provides a list of fundamental questions unasked and unanswered by the European political elites. The fourth chapter will analyze some scenarios depending on European policy changes. The fifth chapter will provide recommendations for European policy makers to handle the migration crisis and minimize the damage already done to the European way of life, where de-radicalization and reintegration play a key role.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(136) "Unprecedented Migration Crisis Affecting Europe: Will Western or Russian Style De-radicalization save the European Way of Life? (Part 1)" ["hu_HU"]=> string(136) "Unprecedented Migration Crisis Affecting Europe: Will Western or Russian Style De-radicalization save the European Way of Life? (Part 1)" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#740 (6) { ["_data"]=> array(15) { ["id"]=> int(1970) ["email"]=> string(23) "besenyo.janos@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1818) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Besenyő" ["hu_HU"]=> string(8) "Besenyő" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "János" ["hu_HU"]=> string(6) "János" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(16) "migration crisis" [1]=> string(7) "culture" [2]=> string(6) "Europe" [3]=> string(6) "policy" } ["en_US"]=> array(4) { [0]=> string(16) "migration crisis" [1]=> string(7) "culture" [2]=> string(6) "Europe" [3]=> string(6) "policy" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#746 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19838) ["id"]=> int(1010) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1818) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#118 (6) { ["_data"]=> array(26) { ["id"]=> int(1823) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2016-08-31" ["lastModified"]=> string(19) "2021-11-17 16:07:46" ["sectionId"]=> int(38) ["seq"]=> int(4) ["submissionId"]=> int(1706) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(124) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "163-180" ["pub-id::doi"]=> string(23) "10.32565/aarms.2016.2.5" ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(136) "Unprecedented Migration Crisis Affecting Europe: Will Western or Russian Style De-radicalization save the European Way of Life? (Part 2)" ["hu_HU"]=> string(136) "Unprecedented Migration Crisis Affecting Europe: Will Western or Russian Style De-radicalization save the European Way of Life? (Part 2)" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#774 (6) { ["_data"]=> array(15) { ["id"]=> int(1978) ["email"]=> string(23) "besenyo.janos@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1823) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Besenyő" ["hu_HU"]=> string(8) "Besenyő" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "János" ["hu_HU"]=> string(6) "János" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#766 (6) { ["_data"]=> array(15) { ["id"]=> int(1979) ["email"]=> string(23) "szenasi.endre@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1823) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Szénási" ["hu_HU"]=> string(9) "Szénási" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Endre" ["hu_HU"]=> string(5) "Endre" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(0) { } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#768 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19839) ["id"]=> int(1012) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1823) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#115 (6) { ["_data"]=> array(29) { ["id"]=> int(1839) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2016-08-31" ["lastModified"]=> string(19) "2021-11-17 16:09:00" ["sectionId"]=> int(38) ["seq"]=> int(5) ["submissionId"]=> int(1722) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(124) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "181-186" ["pub-id::doi"]=> string(23) "10.32565/aarms.2016.2.6" ["abstract"]=> array(2) { ["en_US"]=> string(563) "

The establishment of armed forces has roots deep in history, times when the proportion in men in arms of any country was higher than that of women. Nowadays in most countries women have equal rights to participate in almost all the working sectors of any nation. However, the participation of women in the Indian Army was initiated in 1992 whereas it was founded in 1895. In the 19th century women got their place in defense forces with a limited quota to serve. This paper will deal with female recruitment issues in the armed forces of India and Hungary.

" ["hu_HU"]=> string(563) "

The establishment of armed forces has roots deep in history, times when the proportion in men in arms of any country was higher than that of women. Nowadays in most countries women have equal rights to participate in almost all the working sectors of any nation. However, the participation of women in the Indian Army was initiated in 1992 whereas it was founded in 1895. In the 19th century women got their place in defense forces with a limited quota to serve. This paper will deal with female recruitment issues in the armed forces of India and Hungary.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(80) "Employment of Women in Indian and Hungarian Armed Forces – A Comparative Study" ["hu_HU"]=> string(80) "Employment of Women in Indian and Hungarian Armed Forces – A Comparative Study" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#771 (6) { ["_data"]=> array(15) { ["id"]=> int(2008) ["email"]=> string(32) "Mukhwinder.Kaur@hallg.uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1839) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Kaur" ["hu_HU"]=> string(4) "Kaur" } ["givenName"]=> array(2) { ["en_US"]=> string(10) "Mukhwinder" ["hu_HU"]=> string(10) "Mukhwinder" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(17) "women in military" [1]=> string(5) "India" [2]=> string(7) "Hungary" [3]=> string(10) "employment" [4]=> string(11) "reservation" [5]=> string(4) "NATO" } ["en_US"]=> array(6) { [0]=> string(17) "women in military" [1]=> string(5) "India" [2]=> string(7) "Hungary" [3]=> string(10) "employment" [4]=> string(11) "reservation" [5]=> string(4) "NATO" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#772 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19840) ["id"]=> int(1028) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1839) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#770 (6) { ["_data"]=> array(29) { ["id"]=> int(1841) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2016-08-31" ["lastModified"]=> string(19) "2021-11-17 16:09:24" ["sectionId"]=> int(38) ["seq"]=> int(6) ["submissionId"]=> int(1724) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(124) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "187-196" ["pub-id::doi"]=> string(23) "10.32565/aarms.2016.2.7" ["abstract"]=> array(2) { ["en_US"]=> string(783) "

The most important features and constraints of the commercial intrusion detection (IDS) and prevention (IPS) systems and the possibility of application of artificial intelligence and neural networks such as IDS or IPS were investigated. A neural network was trained using the Levenberg-Marquardt backpropagation algorithm and applied on the Knowledge Discovery and Data Mining (KDD)’99 [14] reference dataset. A very high (99.9985%) accuracy and rather low (3.006%) false alert rate was achieved, but only at the expense of high memory consumption and low computation speed. To overcome these limitations, the selection of training data size was investigated. Result shows that a neural network trained on ca. 50,000 data is enough to achieve a detection accuracy of 99.82%.

" ["hu_HU"]=> string(783) "

The most important features and constraints of the commercial intrusion detection (IDS) and prevention (IPS) systems and the possibility of application of artificial intelligence and neural networks such as IDS or IPS were investigated. A neural network was trained using the Levenberg-Marquardt backpropagation algorithm and applied on the Knowledge Discovery and Data Mining (KDD)’99 [14] reference dataset. A very high (99.9985%) accuracy and rather low (3.006%) false alert rate was achieved, but only at the expense of high memory consumption and low computation speed. To overcome these limitations, the selection of training data size was investigated. Result shows that a neural network trained on ca. 50,000 data is enough to achieve a detection accuracy of 99.82%.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(80) "Data Mining in Cyber Threat Analysis – Neural Networks for Intrusion Detection" ["hu_HU"]=> string(80) "Data Mining in Cyber Threat Analysis – Neural Networks for Intrusion Detection" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#742 (6) { ["_data"]=> array(15) { ["id"]=> int(2009) ["email"]=> string(17) "bgeszti@email.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1841) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Bognár" ["hu_HU"]=> string(7) "Bognár" } ["givenName"]=> array(2) { ["en_US"]=> string(14) "Eszter Katalin" ["hu_HU"]=> string(14) "Eszter Katalin" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(11) "IT security" [1]=> string(19) "intrusion detection" [2]=> string(15) "neural networks" } ["en_US"]=> array(3) { [0]=> string(11) "IT security" [1]=> string(19) "intrusion detection" [2]=> string(15) "neural networks" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#778 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19841) ["id"]=> int(1029) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1841) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#783 (6) { ["_data"]=> array(29) { ["id"]=> int(1842) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2016-08-31" ["lastModified"]=> string(19) "2021-11-17 16:09:57" ["sectionId"]=> int(38) ["seq"]=> int(7) ["submissionId"]=> int(1725) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(124) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "197-211" ["pub-id::doi"]=> string(23) "10.32565/aarms.2016.2.8" ["abstract"]=> array(2) { ["en_US"]=> string(892) "

The author’s intent is to record his knowledge from 20 years of experience in law enforcement peacekeeping and crisis management, and share them with those interested in the topic.
The elaboration of the theory of law enforcement peacekeeping and civilian crises management as well as its practical implementation have not received the necessary attention in recent years, although there are more than ten thousand law enforcement officials deeply involved in this activity around the world.
The history of the participation of Hungarian law enforcement organizations in peacekeeping and crises management is quite short; in fact, we have been involved in this activity only since 1989. A few books were published covering the individual stories of law enforcement peacekeepers, but a comprehensive study of the area and a written document on practical experiences are missing.

" ["hu_HU"]=> string(892) "

The author’s intent is to record his knowledge from 20 years of experience in law enforcement peacekeeping and crisis management, and share them with those interested in the topic.
The elaboration of the theory of law enforcement peacekeeping and civilian crises management as well as its practical implementation have not received the necessary attention in recent years, although there are more than ten thousand law enforcement officials deeply involved in this activity around the world.
The history of the participation of Hungarian law enforcement organizations in peacekeeping and crises management is quite short; in fact, we have been involved in this activity only since 1989. A few books were published covering the individual stories of law enforcement peacekeepers, but a comprehensive study of the area and a written document on practical experiences are missing.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(85) "Protect Peace and Security – Hungarian Law Enforcement Agencies in Peace Operations" ["hu_HU"]=> string(85) "Protect Peace and Security – Hungarian Law Enforcement Agencies in Peace Operations" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#784 (6) { ["_data"]=> array(15) { ["id"]=> int(2011) ["email"]=> string(22) "boda.jozsef@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1842) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Boda" ["hu_HU"]=> string(4) "Boda" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "József" ["hu_HU"]=> string(7) "József" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(7) { [0]=> string(15) "civilian police" [1]=> string(17) "crises management" [2]=> string(14) "European Union" [3]=> string(15) "law enforcement" [4]=> string(52) "Organization for Security and Co-operation in Europe" [5]=> string(14) "police mission" [6]=> string(14) "United Nations" } ["en_US"]=> array(7) { [0]=> string(15) "civilian police" [1]=> string(17) "crises management" [2]=> string(14) "European Union" [3]=> string(15) "law enforcement" [4]=> string(52) "Organization for Security and Co-operation in Europe" [5]=> string(14) "police mission" [6]=> string(14) "United Nations" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#785 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19842) ["id"]=> int(1030) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1842) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF