Full Issue

Archive

object(Publication)#697 (6) { ["_data"]=> array(29) { ["id"]=> int(2176) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-06-30" ["lastModified"]=> string(19) "2021-11-22 11:42:57" ["sectionId"]=> int(38) ["seq"]=> int(0) ["submissionId"]=> int(2057) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(158) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "133-147" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.2.1" ["abstract"]=> array(2) { ["en_US"]=> string(527) "

Anti-tank is defined as combat against the enemy’s tanks and other armoured equipment and vehicles. Its associated tasks include the closing of endangered directions, flanks, and junctions. Anti-tank is the part of combined arms combat which is directed against the tanks grouped for attack or already directly attacking, and the armoured equipment detached to their battle formation. For successful combat, the organization of a solid anti-armour system is required, which includes anti-tank units as a basic element.

" ["hu_HU"]=> string(527) "

Anti-tank is defined as combat against the enemy’s tanks and other armoured equipment and vehicles. Its associated tasks include the closing of endangered directions, flanks, and junctions. Anti-tank is the part of combined arms combat which is directed against the tanks grouped for attack or already directly attacking, and the armoured equipment detached to their battle formation. For successful combat, the organization of a solid anti-armour system is required, which includes anti-tank units as a basic element.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(76) "The Application and Tasks of the Anti-tank Artillery in Combined Arms Combat" ["hu_HU"]=> string(76) "The Application and Tasks of the Anti-tank Artillery in Combined Arms Combat" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#732 (6) { ["_data"]=> array(15) { ["id"]=> int(2382) ["email"]=> string(24) "furjan.attila@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2176) ["seq"]=> int(0) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Furján" ["hu_HU"]=> string(7) "Furján" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Attila" ["hu_HU"]=> string(6) "Attila" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(7) { [0]=> string(19) "anti-tank artillery" [1]=> string(11) "anti-armour" [2]=> string(13) "fire capacity" [3]=> string(22) "tactical assembly area" [4]=> string(15) "deployment area" [5]=> string(9) "manoeuvre" [6]=> string(16) "battle formation" } ["en_US"]=> array(7) { [0]=> string(19) "anti-tank artillery" [1]=> string(11) "anti-armour" [2]=> string(13) "fire capacity" [3]=> string(22) "tactical assembly area" [4]=> string(15) "deployment area" [5]=> string(9) "manoeuvre" [6]=> string(16) "battle formation" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#745 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20388) ["id"]=> int(1337) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2176) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#121 (6) { ["_data"]=> array(27) { ["id"]=> int(2178) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-06-30" ["lastModified"]=> string(19) "2021-11-22 11:43:45" ["sectionId"]=> int(38) ["seq"]=> int(1) ["submissionId"]=> int(2059) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(158) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "149-159" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.2.2" ["abstract"]=> array(2) { ["en_US"]=> string(1237) "

Digital documents play an increasingly important role in our lives. Reliable digital storage of these documents is complicated and we have to deal with other problems if we would like to store these documents for a long time. Some documents, especially the most important documents are electronically signed. The long-term storage of electronically signed documents is more difficult, because we have to ensure the long-term validity as well. Electronic invoices (e-invoices) are also electronically signed documents and their role is becoming more important. The proposal of the European Committee on e-invoicing aims to facilitate the use of e-invoices. By 2020 e-invoicing will be general usage in the EU. This paper describes the problems in connection with long-term storage of digitally signed documents. Possible solutions are also presented. In connection to this, the regulation of preserving electronically signed documents is also examined from the point of view of Hungarian legislation. Finally it is shown how ETSI’s (European Telecommunication Standards Institute) PAdES (PDF Advanced Electronic Signature) might support the long-term validity of e-documents, using the widely used portable document format (PDF).

" ["hu_HU"]=> string(1237) "

Digital documents play an increasingly important role in our lives. Reliable digital storage of these documents is complicated and we have to deal with other problems if we would like to store these documents for a long time. Some documents, especially the most important documents are electronically signed. The long-term storage of electronically signed documents is more difficult, because we have to ensure the long-term validity as well. Electronic invoices (e-invoices) are also electronically signed documents and their role is becoming more important. The proposal of the European Committee on e-invoicing aims to facilitate the use of e-invoices. By 2020 e-invoicing will be general usage in the EU. This paper describes the problems in connection with long-term storage of digitally signed documents. Possible solutions are also presented. In connection to this, the regulation of preserving electronically signed documents is also examined from the point of view of Hungarian legislation. Finally it is shown how ETSI’s (European Telecommunication Standards Institute) PAdES (PDF Advanced Electronic Signature) might support the long-term validity of e-documents, using the widely used portable document format (PDF).

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(47) "Long-Term Storage of Digitally Signed Documents" ["hu_HU"]=> string(47) "Long-Term Storage of Digitally Signed Documents" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(2385) ["email"]=> string(15) "gabor@gyurak.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2178) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Gyurák" ["hu_HU"]=> string(7) "Gyurák" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Gábor" ["hu_HU"]=> string(6) "Gábor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(17) "long-term storage" [1]=> string(17) "digital signature" [2]=> string(5) "PAdES" [3]=> string(3) "pdf" } ["en_US"]=> array(4) { [0]=> string(17) "long-term storage" [1]=> string(17) "digital signature" [2]=> string(5) "PAdES" [3]=> string(3) "pdf" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#761 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20389) ["id"]=> int(1339) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2178) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(29) { ["id"]=> int(2179) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-06-30" ["lastModified"]=> string(19) "2021-11-22 11:48:42" ["sectionId"]=> int(38) ["seq"]=> int(2) ["submissionId"]=> int(2060) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(158) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "161-171" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.2.3" ["abstract"]=> array(2) { ["en_US"]=> string(547) "

Safety issues in power plants and their direct proportional impact on the safety regulations are increasing significantly nowadays. As a result, fire cases on the way from delivery on the conveyor belt to the final usage in the plant, education of the human resources and improvement of safety regulations are basic key issues. Therefore, in this research I examined the distribution of fire cases and the role of human responsibility through the example of a Hungarian lignite firing power plant by using foreign publications and research.

" ["hu_HU"]=> string(547) "

Safety issues in power plants and their direct proportional impact on the safety regulations are increasing significantly nowadays. As a result, fire cases on the way from delivery on the conveyor belt to the final usage in the plant, education of the human resources and improvement of safety regulations are basic key issues. Therefore, in this research I examined the distribution of fire cases and the role of human responsibility through the example of a Hungarian lignite firing power plant by using foreign publications and research.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(131) "Distribution of Fire Cases and the Role of Human Factors in Coal-Firing Power Plants in Fuel-Supply Fields and Distribution Systems" ["hu_HU"]=> string(131) "Distribution of Fire Cases and the Role of Human Factors in Coal-Firing Power Plants in Fuel-Supply Fields and Distribution Systems" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#115 (6) { ["_data"]=> array(15) { ["id"]=> int(2386) ["email"]=> string(20) "zelebalazs@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2179) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Zele" ["hu_HU"]=> string(4) "Zele" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Balázs" ["hu_HU"]=> string(7) "Balázs" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(30) "power plant safety regulations" [1]=> string(18) "fuel supply fields" [2]=> string(20) "human responsibility" [3]=> string(41) "distribution of fire cases in power plant" } ["en_US"]=> array(4) { [0]=> string(30) "power plant safety regulations" [1]=> string(18) "fuel supply fields" [2]=> string(20) "human responsibility" [3]=> string(41) "distribution of fire cases in power plant" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#737 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20390) ["id"]=> int(1340) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2179) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#189 (6) { ["_data"]=> array(29) { ["id"]=> int(2180) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-06-30" ["lastModified"]=> string(19) "2022-01-07 14:37:10" ["sectionId"]=> int(38) ["seq"]=> int(3) ["submissionId"]=> int(2061) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(158) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "173-185" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.2.4" ["abstract"]=> array(2) { ["en_US"]=> string(645) "

These days, one of the most significant issue is maritime piracy and armed robbery; it poses a high threat against international peace and security. These crimes can occur anywhere on the high seas, but the most infected areas are the western basin of the Indian Ocean, the Gulf of Aden, Southeast Asia, or the Gulf of Guinea, where piracy causes many troubles to world trade. The crime of piracy calls for a strong and substantive answer. In this paper, the author tries to look for legal and non-legal devices against piracy and tries to give an answer to the question whether we can take a failed state to account in international law?

" ["hu_HU"]=> string(645) "

These days, one of the most significant issue is maritime piracy and armed robbery; it poses a high threat against international peace and security. These crimes can occur anywhere on the high seas, but the most infected areas are the western basin of the Indian Ocean, the Gulf of Aden, Southeast Asia, or the Gulf of Guinea, where piracy causes many troubles to world trade. The crime of piracy calls for a strong and substantive answer. In this paper, the author tries to look for legal and non-legal devices against piracy and tries to give an answer to the question whether we can take a failed state to account in international law?

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(98) "The Questions of Piracy in the Light of International Law and the Responsibility of a Failed State" ["hu_HU"]=> string(98) "The Questions of Piracy in the Light of International Law and the Responsibility of a Failed State" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#762 (6) { ["_data"]=> array(15) { ["id"]=> int(2387) ["email"]=> string(25) "harkai.istvan89@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2180) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Harkai" ["hu_HU"]=> string(6) "Harkai" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "István" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(7) "Somalia" [1]=> string(6) "piracy" [2]=> string(12) "jurisdiction" [3]=> string(14) "responsibility" [4]=> string(12) "failed state" } ["en_US"]=> array(5) { [0]=> string(7) "Somalia" [1]=> string(6) "piracy" [2]=> string(12) "jurisdiction" [3]=> string(14) "responsibility" [4]=> string(12) "failed state" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#746 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21249) ["id"]=> int(1341) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2180) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#118 (6) { ["_data"]=> array(28) { ["id"]=> int(2194) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-06-30" ["lastModified"]=> string(19) "2022-01-07 14:39:47" ["sectionId"]=> int(38) ["seq"]=> int(4) ["submissionId"]=> int(2075) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(158) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "187-200" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.2.5" ["abstract"]=> array(2) { ["en_US"]=> string(1103) "

The actuality of the topic indicated in the title comes from more and more events where the verification of identity might be required. Health-care is an important part of the critical national infrastructures. A primary task of the protection of critical information infrastructures consists in the access control of data managed by IT system where the identity-authentication forms an important part. For this reason, the technologies considered suitable for use and their supporting means are listed.
After examining and comparing the relevant parameters, the optimum solution for the authentication procedures in the Hungarian health care system is specified. First of all, the modern and efficient biometric identification processes are examined; however, the possession-based Radio Frequency Identification (RFID), as an additional system, is also studied. Due to the well-known problems of passwords and chip cards, they were deliberately omitted during the system planning and efforts were made to exclude the human factors from the planned authentication system as much as possible.

" ["hu_HU"]=> string(1103) "

The actuality of the topic indicated in the title comes from more and more events where the verification of identity might be required. Health-care is an important part of the critical national infrastructures. A primary task of the protection of critical information infrastructures consists in the access control of data managed by IT system where the identity-authentication forms an important part. For this reason, the technologies considered suitable for use and their supporting means are listed.
After examining and comparing the relevant parameters, the optimum solution for the authentication procedures in the Hungarian health care system is specified. First of all, the modern and efficient biometric identification processes are examined; however, the possession-based Radio Frequency Identification (RFID), as an additional system, is also studied. Due to the well-known problems of passwords and chip cards, they were deliberately omitted during the system planning and efforts were made to exclude the human factors from the planned authentication system as much as possible.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(21) "The Biometric Systems" ["hu_HU"]=> string(21) "The Biometric Systems" } ["title"]=> array(2) { ["en_US"]=> string(99) "Selection of Authentication Systems for Hungarian Health Care, Based on Physiological Study Part I." ["hu_HU"]=> string(99) "Selection of Authentication Systems for Hungarian Health Care, Based on Physiological Study Part I." } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#773 (6) { ["_data"]=> array(15) { ["id"]=> int(2401) ["email"]=> string(19) "magicman@mailbox.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2194) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Baráth" ["hu_HU"]=> string(7) "Baráth" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Artur" ["hu_HU"]=> string(5) "Artur" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(14) "authentication" [1]=> string(8) "biometry" [2]=> string(4) "RFID" [3]=> string(11) "health care" [4]=> string(13) "human factors" } ["en_US"]=> array(5) { [0]=> string(14) "authentication" [1]=> string(8) "biometry" [2]=> string(4) "RFID" [3]=> string(11) "health care" [4]=> string(13) "human factors" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#767 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21250) ["id"]=> int(1354) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2194) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#742 (6) { ["_data"]=> array(28) { ["id"]=> int(2206) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-06-30" ["lastModified"]=> string(19) "2022-01-07 14:41:34" ["sectionId"]=> int(38) ["seq"]=> int(5) ["submissionId"]=> int(2087) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(158) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "201-207" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.2.6" ["abstract"]=> array(2) { ["en_US"]=> string(1092) "

The actuality of the topic indicated in the title comes from more and more events where the verification of identity might be required. Health-care is an important part of critical national infrastructures. A primary task of the protection of critical information infrastructures consists in the access control of data managed by IT system where the identity-authentication forms an important part. For this reason, the technologies considered suitable for use and their supporting means are listed. After examining and comparing the relevant parameters, the optimum solution for the authentication procedures in the Hungarian health care system is specified. First of all, the modern and efficient biometric identification processes are examined; however, the possession-based Radio Frequency Identification (RFID) as an additional system is also studied. Due to the well-known problems of passwords and chip cards. They were deliberately omitted during the system planning and efforts were made to exclude the human factors from the planned authentication system as much as possible.

" ["hu_HU"]=> string(1092) "

The actuality of the topic indicated in the title comes from more and more events where the verification of identity might be required. Health-care is an important part of critical national infrastructures. A primary task of the protection of critical information infrastructures consists in the access control of data managed by IT system where the identity-authentication forms an important part. For this reason, the technologies considered suitable for use and their supporting means are listed. After examining and comparing the relevant parameters, the optimum solution for the authentication procedures in the Hungarian health care system is specified. First of all, the modern and efficient biometric identification processes are examined; however, the possession-based Radio Frequency Identification (RFID) as an additional system is also studied. Due to the well-known problems of passwords and chip cards. They were deliberately omitted during the system planning and efforts were made to exclude the human factors from the planned authentication system as much as possible.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(16) "The RFID Systems" ["hu_HU"]=> string(16) "The RFID Systems" } ["title"]=> array(2) { ["en_US"]=> string(100) "Selection of Authentication Systems for Hungarian Health Care, Based on Physiological Study Part II." ["hu_HU"]=> string(100) "Selection of Authentication Systems for Hungarian Health Care, Based on Physiological Study Part II." } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#777 (6) { ["_data"]=> array(15) { ["id"]=> int(2413) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2206) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Baráth" ["hu_HU"]=> string(7) "Baráth" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Artur" ["hu_HU"]=> string(5) "Artur" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(14) "authentication" [1]=> string(8) "biometry" [2]=> string(4) "RFID" [3]=> string(11) "health care" [4]=> string(13) "human factors" } ["en_US"]=> array(5) { [0]=> string(14) "authentication" [1]=> string(8) "biometry" [2]=> string(4) "RFID" [3]=> string(11) "health care" [4]=> string(13) "human factors" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#771 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21251) ["id"]=> int(1364) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2206) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#763 (6) { ["_data"]=> array(27) { ["id"]=> int(2210) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-06-30" ["lastModified"]=> string(19) "2022-01-07 14:43:10" ["sectionId"]=> int(38) ["seq"]=> int(6) ["submissionId"]=> int(2091) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(158) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "209-218" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.2.7" ["abstract"]=> array(2) { ["en_US"]=> string(602) "

During the combined transport of dangerous goods, in the territory of combiterminals, transport takes place from one type of transport to another means of transport. During the trans-shipment and the temporary storage of hazardous materials accidents resulting in smaller or larger consequences may occur (and in recent times have occurred as well). Experience has shown that reducing the consequences of such accidents requires the use of some special tools. In our article we present these tools in order to reduce such consequences as well as the technical foundations of their applicability.

" ["hu_HU"]=> string(602) "

During the combined transport of dangerous goods, in the territory of combiterminals, transport takes place from one type of transport to another means of transport. During the trans-shipment and the temporary storage of hazardous materials accidents resulting in smaller or larger consequences may occur (and in recent times have occurred as well). Experience has shown that reducing the consequences of such accidents requires the use of some special tools. In our article we present these tools in order to reduce such consequences as well as the technical foundations of their applicability.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(95) "Application of Special Risk Reduction Protective Measures in Combiterminals for Dangerous Goods" ["hu_HU"]=> string(95) "Application of Special Risk Reduction Protective Measures in Combiterminals for Dangerous Goods" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#776 (6) { ["_data"]=> array(15) { ["id"]=> int(2419) ["email"]=> string(23) "cimer.zsolt@ybl.szie.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2210) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Cimer" ["hu_HU"]=> string(5) "Cimer" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Zsolt" ["hu_HU"]=> string(5) "Zsolt" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#781 (6) { ["_data"]=> array(15) { ["id"]=> int(2420) ["email"]=> string(26) "ferenc.varga@katved.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2210) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Varga" ["hu_HU"]=> string(5) "Varga" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Ferenc" ["hu_HU"]=> string(6) "Ferenc" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(14) "combiterminals" [1]=> string(19) "disaster management" [2]=> string(46) "major accidents involving dangerous substances" [3]=> string(13) "device system" [4]=> string(15) "technical tools" } ["en_US"]=> array(5) { [0]=> string(14) "combiterminals" [1]=> string(19) "disaster management" [2]=> string(46) "major accidents involving dangerous substances" [3]=> string(13) "device system" [4]=> string(15) "technical tools" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#775 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21252) ["id"]=> int(1368) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2210) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#764 (6) { ["_data"]=> array(27) { ["id"]=> int(2211) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-06-30" ["lastModified"]=> string(19) "2022-01-07 14:44:06" ["sectionId"]=> int(38) ["seq"]=> int(7) ["submissionId"]=> int(2092) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(158) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "219-236" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.2.8" ["abstract"]=> array(2) { ["en_US"]=> string(915) "

Light Detection and Ranging (LiDAR) technology has become one of the major remote sensing methods in the last few years. There are several areas, where the scanned 3D point-clouds can be used very efficiently. In our study we review the potential applications of LiDAR data in military historical reconstruction. Previously we defined the major steps of the entire reconstruction process and the – mostly archive – useful data sources. Obviously the base of this kind of investigations must be archive data, but it is an interesting challenge to integrate a cutting edge method into such tasks. LiDAR technology can be very useful, especially in vegetation covered areas, where the conventional remote sensing technologies are mostly inefficient. We shall summarize how laser scanned data can support the different parts of reconstruction work and define the technological steps of LiDAR data processing.

" ["hu_HU"]=> string(915) "

Light Detection and Ranging (LiDAR) technology has become one of the major remote sensing methods in the last few years. There are several areas, where the scanned 3D point-clouds can be used very efficiently. In our study we review the potential applications of LiDAR data in military historical reconstruction. Previously we defined the major steps of the entire reconstruction process and the – mostly archive – useful data sources. Obviously the base of this kind of investigations must be archive data, but it is an interesting challenge to integrate a cutting edge method into such tasks. LiDAR technology can be very useful, especially in vegetation covered areas, where the conventional remote sensing technologies are mostly inefficient. We shall summarize how laser scanned data can support the different parts of reconstruction work and define the technological steps of LiDAR data processing.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(51) "Detecting Military Historical Objects by LiDAR Data" ["hu_HU"]=> string(51) "Detecting Military Historical Objects by LiDAR Data" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#782 (6) { ["_data"]=> array(15) { ["id"]=> int(2421) ["email"]=> string(26) "juhasz.attila@epito.bme.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2211) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Juhász" ["hu_HU"]=> string(7) "Juhász" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Attila" ["hu_HU"]=> string(6) "Attila" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#785 (6) { ["_data"]=> array(15) { ["id"]=> int(2422) ["email"]=> string(31) "neuberger.hajnalka@epito.bme.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2211) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Neuberger" ["hu_HU"]=> string(9) "Neuberger" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Hajnalka" ["hu_HU"]=> string(8) "Hajnalka" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(5) "LiDAR" [1]=> string(14) "geoinformatics" [2]=> string(16) "military history" [3]=> string(14) "remote sensing" } ["en_US"]=> array(4) { [0]=> string(5) "LiDAR" [1]=> string(14) "geoinformatics" [2]=> string(16) "military history" [3]=> string(14) "remote sensing" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#787 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21253) ["id"]=> int(1370) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2211) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF

With Renewables for Energy Security

Hauber György, Honvári Patrícia
doi: 10.32565/aarms.2015.2.9
237-247.
object(Publication)#766 (6) { ["_data"]=> array(29) { ["id"]=> int(2236) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-06-30" ["lastModified"]=> string(19) "2021-11-22 11:58:57" ["sectionId"]=> int(38) ["seq"]=> int(8) ["submissionId"]=> int(2117) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(158) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "237-247" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.2.9" ["abstract"]=> array(2) { ["en_US"]=> string(856) "

Taking into account the possible future exhaustion of fossil energy sources, the actual and near danger of climate change, the drastic increase of the greenhouse gases in the last 200 years, as well as the growing need for sustainable development, consumption and liveable environment, the increasing necessity of renewable energy sources becomes clear. Utilization of these energy sources have to acquire a bigger role in the field of energy supply, in order to enhance the energy security of Hungary, to decline the energy import dependence, to reduce the negative environmental impacts, and to recover the economy. The world’s hunger for energy is growing exponentially; this is why it is crucial to establish feasibility scenarios in the next decades, which are able to meet these expectations, and to increase the safety of the energy supply.

" ["hu_HU"]=> string(856) "

Taking into account the possible future exhaustion of fossil energy sources, the actual and near danger of climate change, the drastic increase of the greenhouse gases in the last 200 years, as well as the growing need for sustainable development, consumption and liveable environment, the increasing necessity of renewable energy sources becomes clear. Utilization of these energy sources have to acquire a bigger role in the field of energy supply, in order to enhance the energy security of Hungary, to decline the energy import dependence, to reduce the negative environmental impacts, and to recover the economy. The world’s hunger for energy is growing exponentially; this is why it is crucial to establish feasibility scenarios in the next decades, which are able to meet these expectations, and to increase the safety of the energy supply.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(35) "With Renewables for Energy Security" ["hu_HU"]=> string(35) "With Renewables for Energy Security" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#790 (6) { ["_data"]=> array(15) { ["id"]=> int(2446) ["email"]=> string(24) "hauber.gyorgy@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2236) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Hauber" ["hu_HU"]=> string(6) "Hauber" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "György" ["hu_HU"]=> string(7) "György" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#778 (6) { ["_data"]=> array(15) { ["id"]=> int(2447) ["email"]=> string(23) "honvari.patricia@rkk.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2236) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Honvári" ["hu_HU"]=> string(8) "Honvári" } ["givenName"]=> array(2) { ["en_US"]=> string(9) "Patrícia" ["hu_HU"]=> string(9) "Patrícia" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(15) "energy security" [1]=> string(12) "fossil fuels" [2]=> string(21) "global climate change" [3]=> string(18) "security of supply" [4]=> string(16) "renewable energy" [5]=> string(15) "logistic system" } ["en_US"]=> array(6) { [0]=> string(15) "energy security" [1]=> string(12) "fossil fuels" [2]=> string(21) "global climate change" [3]=> string(18) "security of supply" [4]=> string(16) "renewable energy" [5]=> string(15) "logistic system" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#792 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20398) ["id"]=> int(1392) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2236) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#743 (6) { ["_data"]=> array(29) { ["id"]=> int(2238) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-06-30" ["lastModified"]=> string(19) "2021-11-22 12:00:13" ["sectionId"]=> int(38) ["seq"]=> int(9) ["submissionId"]=> int(2119) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(158) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "249-258" ["pub-id::doi"]=> string(24) "10.32565/aarms.2015.2.10" ["abstract"]=> array(2) { ["en_US"]=> string(578) "

The author presents in this study the near and more distant future environment of air defence missions. He tries to find adequate answers to three questions in order to avoid prospective developments causing disadvantages for air defence experts and troops realising air defence. These are proliferation, the quick development of air warfare vehicles, and the widening airspace threats represented by civilian vehicles. In brief, air defence as defence activity is always at a disadvantage against the threats arriving from the air, but we must do our best to compensate.

" ["hu_HU"]=> string(578) "

The author presents in this study the near and more distant future environment of air defence missions. He tries to find adequate answers to three questions in order to avoid prospective developments causing disadvantages for air defence experts and troops realising air defence. These are proliferation, the quick development of air warfare vehicles, and the widening airspace threats represented by civilian vehicles. In brief, air defence as defence activity is always at a disadvantage against the threats arriving from the air, but we must do our best to compensate.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(68) "The Near and More Distant Future Environment of Air Defence Missions" ["hu_HU"]=> string(68) "The Near and More Distant Future Environment of Air Defence Missions" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#791 (6) { ["_data"]=> array(15) { ["id"]=> int(2449) ["email"]=> string(23) "zoltan.krajnc@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2238) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Krajnc" ["hu_HU"]=> string(6) "Krajnc" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Zoltán" ["hu_HU"]=> string(7) "Zoltán" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(11) "air defence" [1]=> string(13) "future threat" [2]=> string(43) "asymmetrical threats arriving from airspace" [3]=> string(50) "determinants of the future operational environment" } ["en_US"]=> array(4) { [0]=> string(11) "air defence" [1]=> string(13) "future threat" [2]=> string(43) "asymmetrical threats arriving from airspace" [3]=> string(50) "determinants of the future operational environment" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#797 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20399) ["id"]=> int(1394) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2238) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#795 (6) { ["_data"]=> array(27) { ["id"]=> int(2239) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-06-30" ["lastModified"]=> string(19) "2021-11-22 12:01:40" ["sectionId"]=> int(38) ["seq"]=> int(10) ["submissionId"]=> int(2120) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(158) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "259-264" ["pub-id::doi"]=> string(24) "10.32565/aarms.2015.2.11" ["abstract"]=> array(2) { ["en_US"]=> string(1078) "

Due to the consequences of global climate change and complex impacts of civilization, the Earth’s drinking water reserves have started to decrease or become so seriously contaminated in some areas that it is inadequate for human consumption. International research groups and organizations are calling the countries to greater environmental and security awareness. Severity of environmental protection regulations made the usage of environmental friendly fire-fighting materials (water, among others) more important again. In Hungary, fire brigades use drinking water in approximately 90% of their fire-fighting operations. Some recently developed water fog fire extinguisher apparatuses have made special utilization of water available, as their use is friendly to the environment, effective and economical and in comparison with the conventional fire-fighting techniques consume a considerably less amount of water. In my paper I am going to demonstrate and summarize the advantages of water fog fire extinction based on the physical and chemical properties of water.

" ["hu_HU"]=> string(1078) "

Due to the consequences of global climate change and complex impacts of civilization, the Earth’s drinking water reserves have started to decrease or become so seriously contaminated in some areas that it is inadequate for human consumption. International research groups and organizations are calling the countries to greater environmental and security awareness. Severity of environmental protection regulations made the usage of environmental friendly fire-fighting materials (water, among others) more important again. In Hungary, fire brigades use drinking water in approximately 90% of their fire-fighting operations. Some recently developed water fog fire extinguisher apparatuses have made special utilization of water available, as their use is friendly to the environment, effective and economical and in comparison with the conventional fire-fighting techniques consume a considerably less amount of water. In my paper I am going to demonstrate and summarize the advantages of water fog fire extinction based on the physical and chemical properties of water.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(50) "Advantages of Water Fog Use as a Fire Extinguisher" ["hu_HU"]=> string(50) "Advantages of Water Fog Use as a Fire Extinguisher" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#794 (6) { ["_data"]=> array(15) { ["id"]=> int(2450) ["email"]=> string(17) "kutir@mtk.nyme.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2239) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Kuti" ["hu_HU"]=> string(4) "Kuti" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Rajmund" ["hu_HU"]=> string(7) "Rajmund" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(5) "water" [1]=> string(9) "water fog" [2]=> string(26) "fire extinguishing effects" [3]=> string(13) "effectiveness" [4]=> string(7) "economy" [5]=> string(24) "environmental protection" } ["en_US"]=> array(6) { [0]=> string(5) "water" [1]=> string(9) "water fog" [2]=> string(26) "fire extinguishing effects" [3]=> string(13) "effectiveness" [4]=> string(7) "economy" [5]=> string(24) "environmental protection" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#798 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20400) ["id"]=> int(1395) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2239) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF