Full Issue

Archive

object(Publication)#697 (6) { ["_data"]=> array(29) { ["id"]=> int(2286) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-12-31" ["lastModified"]=> string(19) "2021-11-23 15:54:28" ["sectionId"]=> int(38) ["seq"]=> int(0) ["submissionId"]=> int(2167) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(169) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "507-518" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.4.1" ["abstract"]=> array(2) { ["en_US"]=> string(343) "

This essay introduces the most important historical facts about the Central African Republic (CAR) to the reader. It researches the roots of the current situation. The essay reviews the first six months of the international intervention. It also describes the changes of the planned European Union (EU) mission, and the role of Hungary.

" ["hu_HU"]=> string(343) "

This essay introduces the most important historical facts about the Central African Republic (CAR) to the reader. It researches the roots of the current situation. The essay reviews the first six months of the international intervention. It also describes the changes of the planned European Union (EU) mission, and the role of Hungary.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(90) "The Struggles of the Central African Republic and Hungary’s Role in Solving the Problems" ["hu_HU"]=> string(90) "The Struggles of the Central African Republic and Hungary’s Role in Solving the Problems" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#732 (6) { ["_data"]=> array(15) { ["id"]=> int(2501) ["email"]=> string(23) "matyasmariann@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2286) ["seq"]=> int(0) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Vecsey" ["hu_HU"]=> string(6) "Vecsey" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Mariann" ["hu_HU"]=> string(7) "Mariann" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(14) "Central Africa" [1]=> string(6) "Seleka" [2]=> string(2) "EU" [3]=> string(13) "anti–balaka" [4]=> string(18) "Operation Sangaris" } ["en_US"]=> array(5) { [0]=> string(14) "Central Africa" [1]=> string(6) "Seleka" [2]=> string(2) "EU" [3]=> string(13) "anti–balaka" [4]=> string(18) "Operation Sangaris" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#745 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20459) ["id"]=> int(1436) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2286) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#121 (6) { ["_data"]=> array(29) { ["id"]=> int(2290) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-12-31" ["lastModified"]=> string(19) "2021-11-23 15:56:04" ["sectionId"]=> int(38) ["seq"]=> int(1) ["submissionId"]=> int(2171) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(169) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "519-525" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.4.2" ["abstract"]=> array(2) { ["en_US"]=> string(1000) "

One of the most particular priorities is to make available and operate systems and services, which guarantee the continuity of everyday life in the 21st Century. In order to ensure the efficiency of protection it is necessary to give effect to several physical, human and IT measures, which have integrated a complex framework through the legislation of critical infrastructure.
After the legal harmonization in the European Union, Hungary has begun to create its own system for critical infrastructure protection, within the first concrete step was when the Act 165th of 2012 on the identification, designation and protection of critical infrastructures and its Government Decree on the implementation came into effect. This study aims to summarize the main steps of the public proceedings related to identifying and designating critical infrastructures. In connection with the legislation I will present the function and prime assignments of the professional body for disaster management.

" ["hu_HU"]=> string(1000) "

One of the most particular priorities is to make available and operate systems and services, which guarantee the continuity of everyday life in the 21st Century. In order to ensure the efficiency of protection it is necessary to give effect to several physical, human and IT measures, which have integrated a complex framework through the legislation of critical infrastructure.
After the legal harmonization in the European Union, Hungary has begun to create its own system for critical infrastructure protection, within the first concrete step was when the Act 165th of 2012 on the identification, designation and protection of critical infrastructures and its Government Decree on the implementation came into effect. This study aims to summarize the main steps of the public proceedings related to identifying and designating critical infrastructures. In connection with the legislation I will present the function and prime assignments of the professional body for disaster management.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(154) "Special Tasks for Professional Disaster Management Bodies Related to the Identification, Designation and Protection of Critical Infrastructures in Hungary" ["hu_HU"]=> string(154) "Special Tasks for Professional Disaster Management Bodies Related to the Identification, Designation and Protection of Critical Infrastructures in Hungary" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(2506) ["email"]=> string(23) "bonnyai.tunde@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2290) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Bonnyai" ["hu_HU"]=> string(7) "Bonnyai" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Tünde" ["hu_HU"]=> string(6) "Tünde" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(34) "critical infrastructure protection" [1]=> string(22) "legislation in Hungary" [2]=> string(18) "sector authorities" [3]=> string(19) "disaster management" } ["en_US"]=> array(4) { [0]=> string(34) "critical infrastructure protection" [1]=> string(22) "legislation in Hungary" [2]=> string(18) "sector authorities" [3]=> string(19) "disaster management" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#761 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20460) ["id"]=> int(1440) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2290) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(27) { ["id"]=> int(2299) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-12-31" ["lastModified"]=> string(19) "2021-11-23 15:57:07" ["sectionId"]=> int(38) ["seq"]=> int(2) ["submissionId"]=> int(2180) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(169) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "527-537" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.4.3" ["abstract"]=> array(2) { ["en_US"]=> string(1387) "

The unsustainability of the traditional, force – and coercion–based strategies and tactics used in public assembly management has been recognized in many European countries. This paradigm shift has been confirmed by the events that occurred in Kiev, in the period of November 2013 and January 2014. The improperly chosen public assembly management strategies and procedures applied during the Maidan square events have not only shook public order fundamentally, but also led to consequences which may hurt the state sovereignty and territorial integrity itself. The democratic rule of law, the pressure of the mass media — complete with the modern theories of social psychology developed in relation to the behaviour of the crowd — force giving up the practice previously used by the law enforcement organizations implementing public assembly management. As the first–line defender of the freedom of assembly and freedom of speech, European law enforcement organizations recently had to look for new methods, and had to organize their practice used in public assembly management along entirely new concepts. Backed up by the results of social science, the police strategies and tactics based on communication, dialogue, and facilitation gather ground in Europe more and more. In my study I would like to introduce these new principles used in public assembly management.

" ["hu_HU"]=> string(1387) "

The unsustainability of the traditional, force – and coercion–based strategies and tactics used in public assembly management has been recognized in many European countries. This paradigm shift has been confirmed by the events that occurred in Kiev, in the period of November 2013 and January 2014. The improperly chosen public assembly management strategies and procedures applied during the Maidan square events have not only shook public order fundamentally, but also led to consequences which may hurt the state sovereignty and territorial integrity itself. The democratic rule of law, the pressure of the mass media — complete with the modern theories of social psychology developed in relation to the behaviour of the crowd — force giving up the practice previously used by the law enforcement organizations implementing public assembly management. As the first–line defender of the freedom of assembly and freedom of speech, European law enforcement organizations recently had to look for new methods, and had to organize their practice used in public assembly management along entirely new concepts. Backed up by the results of social science, the police strategies and tactics based on communication, dialogue, and facilitation gather ground in Europe more and more. In my study I would like to introduce these new principles used in public assembly management.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(171) "New Approaches for Maintaining the Peace at Political Demonstrations — Communication and Dialogue as Important Strategic and Tactical Tools of Public Assembly Management" ["hu_HU"]=> string(171) "New Approaches for Maintaining the Peace at Political Demonstrations — Communication and Dialogue as Important Strategic and Tactical Tools of Public Assembly Management" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#115 (6) { ["_data"]=> array(15) { ["id"]=> int(2514) ["email"]=> string(20) "lessferenc@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2299) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Less" ["hu_HU"]=> string(4) "Less" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Ferenc" ["hu_HU"]=> string(6) "Ferenc" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(15) "Dialogue Police" [1]=> string(46) "communication based public assembly management" [2]=> string(25) "dynamic–risk assessment" } ["en_US"]=> array(3) { [0]=> string(15) "Dialogue Police" [1]=> string(46) "communication based public assembly management" [2]=> string(25) "dynamic–risk assessment" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#740 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20461) ["id"]=> int(1448) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2299) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#189 (6) { ["_data"]=> array(27) { ["id"]=> int(2323) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-12-31" ["lastModified"]=> string(19) "2021-11-23 15:58:27" ["sectionId"]=> int(38) ["seq"]=> int(3) ["submissionId"]=> int(2204) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(169) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "539-556" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.4.4" ["abstract"]=> array(2) { ["en_US"]=> string(1186) "

Slavery, a term once used only for the past, has re–emerged in new era of globalization and transnational movement of persons across borders. Migrant domestic workers (MDWs) are immensely dependent upon the employer, which consequently creates “slavery–like” conditions for many migrant domestic workers. Using the United Kingdom as an example of migrant’s rights in a developed country, we are able to view the stringent separation of migrant domestic workers’ right’s both nationally and internationally. Legal impediments, specifically the overseas domestic worker visa “no–change” of employer visa, thoroughly impedes the domestic workers right to change employer and thus keeps them in fear, resulting in silence. On an international basis, the United Kingdom has also not ratified the International Labour Organization Domestic Workers Convention No.189. Therefore domestic workers are not covered by its protective regulations. From analysis of data gathered during a research trip to London, this paper presents the concluding evidence of working condition problems of migrant domestic workers and provides applicable solutions for future improvement.

" ["hu_HU"]=> string(1186) "

Slavery, a term once used only for the past, has re–emerged in new era of globalization and transnational movement of persons across borders. Migrant domestic workers (MDWs) are immensely dependent upon the employer, which consequently creates “slavery–like” conditions for many migrant domestic workers. Using the United Kingdom as an example of migrant’s rights in a developed country, we are able to view the stringent separation of migrant domestic workers’ right’s both nationally and internationally. Legal impediments, specifically the overseas domestic worker visa “no–change” of employer visa, thoroughly impedes the domestic workers right to change employer and thus keeps them in fear, resulting in silence. On an international basis, the United Kingdom has also not ratified the International Labour Organization Domestic Workers Convention No.189. Therefore domestic workers are not covered by its protective regulations. From analysis of data gathered during a research trip to London, this paper presents the concluding evidence of working condition problems of migrant domestic workers and provides applicable solutions for future improvement.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(158) "Modern Slavery in the UK: Hidden Behind Silence Migrant Domestic Workers in the United Kingdom Contemporary Bearings, Legal Impediments and Feasible Solutions" ["hu_HU"]=> string(158) "Modern Slavery in the UK: Hidden Behind Silence Migrant Domestic Workers in the United Kingdom Contemporary Bearings, Legal Impediments and Feasible Solutions" } ["locale"]=> string(5) "en_US" ["authors"]=> array(3) { [0]=> object(Author)#762 (6) { ["_data"]=> array(15) { ["id"]=> int(5788) ["email"]=> string(26) "bogardi.brigitta@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2323) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Bogárdi" ["hu_HU"]=> string(8) "Bogárdi" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Brigitta" ["hu_HU"]=> string(8) "Brigitta" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#743 (6) { ["_data"]=> array(15) { ["id"]=> int(5789) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2323) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Fawcett" ["hu_HU"]=> string(7) "Fawcett" } ["givenName"]=> array(2) { ["en_US"]=> string(12) "Alicia Marie" ["hu_HU"]=> string(12) "Alicia Marie" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#763 (6) { ["_data"]=> array(15) { ["id"]=> int(5790) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2323) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Kriz" ["hu_HU"]=> string(4) "Kriz" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Jakob" ["hu_HU"]=> string(5) "Jakob" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(24) "migrant domestic workers" [1]=> string(14) "United Kingdom" [2]=> string(14) "modern slavery" } ["en_US"]=> array(3) { [0]=> string(24) "migrant domestic workers" [1]=> string(14) "United Kingdom" [2]=> string(14) "modern slavery" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#746 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20462) ["id"]=> int(1471) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2323) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#118 (6) { ["_data"]=> array(29) { ["id"]=> int(2327) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-12-31" ["lastModified"]=> string(19) "2021-11-23 15:59:28" ["sectionId"]=> int(38) ["seq"]=> int(4) ["submissionId"]=> int(2208) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(169) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "557-570" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.4.5" ["abstract"]=> array(2) { ["en_US"]=> string(779) "

This article will show an application of photon counting using an experiment with a Second Harmonic Generation (SHG) to take a look at the basics of single photon communication. This will be an opportunity to open the way for long distance single photon laser communication between unmanned robotic vehicles. This article also gives an insight into a similar, but smaller setup towards the application on unmanned robotic vehicles. In this work measurements by SHG from Si (111) sample have been done with all polarization configurations with the help of a MIRA 900 type Ti: Sapphire laser. The other part of the experiment was carried out with an SR 400 photon counter device which was used for counting the impacting pulses with the help of a photomultiplier tube (PMT).

" ["hu_HU"]=> string(779) "

This article will show an application of photon counting using an experiment with a Second Harmonic Generation (SHG) to take a look at the basics of single photon communication. This will be an opportunity to open the way for long distance single photon laser communication between unmanned robotic vehicles. This article also gives an insight into a similar, but smaller setup towards the application on unmanned robotic vehicles. In this work measurements by SHG from Si (111) sample have been done with all polarization configurations with the help of a MIRA 900 type Ti: Sapphire laser. The other part of the experiment was carried out with an SR 400 photon counter device which was used for counting the impacting pulses with the help of a photomultiplier tube (PMT).

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(63) "Second Harmonic Generation in the Background of Photon Counting" ["hu_HU"]=> string(63) "Second Harmonic Generation in the Background of Photon Counting" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#774 (6) { ["_data"]=> array(15) { ["id"]=> int(2550) ["email"]=> string(27) "kurilla.boldizsar@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2327) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Kurilla" ["hu_HU"]=> string(7) "Kurilla" } ["givenName"]=> array(2) { ["en_US"]=> string(10) "Boldizsár" ["hu_HU"]=> string(10) "Boldizsár" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(26) "Second Harmonic Generation" [1]=> string(15) "photon counting" [2]=> string(19) "laser communication" [3]=> string(20) "photomultiplier tube" } ["en_US"]=> array(4) { [0]=> string(26) "Second Harmonic Generation" [1]=> string(15) "photon counting" [2]=> string(19) "laser communication" [3]=> string(20) "photomultiplier tube" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#772 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20463) ["id"]=> int(1474) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2327) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#768 (6) { ["_data"]=> array(27) { ["id"]=> int(2329) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-12-31" ["lastModified"]=> string(19) "2021-11-23 16:00:35" ["sectionId"]=> int(38) ["seq"]=> int(5) ["submissionId"]=> int(2210) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(169) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "571-591" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.4.6" ["abstract"]=> array(2) { ["en_US"]=> string(1181) "

The study sheds light on the current tendencies and examines if the international law on warfare can successfully be applied in practical reality in the progress of counterinsurgency and counterterrorism efforts. There have been two phenomena identified recently in warfare which endanger the public security and public safety of the democratic states of the world: terrorism and insurgency. Both of them mean a threat and attack on the population and the government authorities. It has been queried in military literature whether these new forms of warfare should be handled by military engagements or law enforcement. This is, nevertheless, not just a dilemma concerning the strategy on how to combat against them, but should be, at the same time, all done in accordance with the international legal regulations. This study is going to outline how the international law based on the principles of traditional warfare can be applied to insurgent or terrorist groups. Special emphasis will be given to see if the relevant laws have failures in regulating these new forms of warfare, and if so, what changes should be proposed for the recent regulations of international law.

" ["hu_HU"]=> string(1181) "

The study sheds light on the current tendencies and examines if the international law on warfare can successfully be applied in practical reality in the progress of counterinsurgency and counterterrorism efforts. There have been two phenomena identified recently in warfare which endanger the public security and public safety of the democratic states of the world: terrorism and insurgency. Both of them mean a threat and attack on the population and the government authorities. It has been queried in military literature whether these new forms of warfare should be handled by military engagements or law enforcement. This is, nevertheless, not just a dilemma concerning the strategy on how to combat against them, but should be, at the same time, all done in accordance with the international legal regulations. This study is going to outline how the international law based on the principles of traditional warfare can be applied to insurgent or terrorist groups. Special emphasis will be given to see if the relevant laws have failures in regulating these new forms of warfare, and if so, what changes should be proposed for the recent regulations of international law.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(94) "Current Issues of International Law in Regulating Counter–Insurgency and Counter–Terrorism" ["hu_HU"]=> string(94) "Current Issues of International Law in Regulating Counter–Insurgency and Counter–Terrorism" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#776 (6) { ["_data"]=> array(15) { ["id"]=> int(2552) ["email"]=> string(23) "maria.bordas@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2329) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Bordás" ["hu_HU"]=> string(7) "Bordás" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Mária" ["hu_HU"]=> string(6) "Mária" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(10) { [0]=> string(9) "terrorism" [1]=> string(10) "insurgency" [2]=> string(16) "counterterrorism" [3]=> string(17) "counterinsurgency" [4]=> string(17) "international law" [5]=> string(14) "law of warfare" [6]=> string(29) "law of humanitarian treatment" [7]=> string(12) "human rights" [8]=> string(26) "international criminal law" [9]=> string(10) "legitimacy" } ["en_US"]=> array(10) { [0]=> string(9) "terrorism" [1]=> string(10) "insurgency" [2]=> string(16) "counterterrorism" [3]=> string(17) "counterinsurgency" [4]=> string(17) "international law" [5]=> string(14) "law of warfare" [6]=> string(29) "law of humanitarian treatment" [7]=> string(12) "human rights" [8]=> string(26) "international criminal law" [9]=> string(10) "legitimacy" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#777 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20464) ["id"]=> int(1476) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2329) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF