Full Issue

Archive

object(Publication)#697 (6) { ["_data"]=> array(27) { ["id"]=> int(2481) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:14" ["sectionId"]=> int(38) ["seq"]=> int(1) ["submissionId"]=> int(2362) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(4) "1-16" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.1.1" ["abstract"]=> array(2) { ["en_US"]=> string(1200) "

Detection of targets at low altitudes with a low Radar Cross Section (RCS) such as drones and stealth could challenge Air Surveillance systems and this situation must be addressed in a cost–effective way. This paper summarizes the newly emerged technical challenges of the Control and Reporting Centre (CRC) and gives solutions on how to overcome recognized shortcomings. In addition it highlights problems and requirements related to drone maneuvering capabilities and their very low RCS. This article summarizes challenges and gives a synthesized solution to the network centric approach based on the short distance Gaussian bi–static radar concept called twin radar coherent signal fusion. The idea is to explore advantages of the twin radar concept such as doubled detection range, increased, superior angular resolution of the system and increased plot update frequency. Examples for the twin radar performance demonstration are based on VHF radar, which has unique capabilities such as exploitation of multipath and resonance frequency for drones. A few peculiarities of the new signal processing are introduced with the extended air traffic control and monitoring network structure.

" ["hu_HU"]=> string(1200) "

Detection of targets at low altitudes with a low Radar Cross Section (RCS) such as drones and stealth could challenge Air Surveillance systems and this situation must be addressed in a cost–effective way. This paper summarizes the newly emerged technical challenges of the Control and Reporting Centre (CRC) and gives solutions on how to overcome recognized shortcomings. In addition it highlights problems and requirements related to drone maneuvering capabilities and their very low RCS. This article summarizes challenges and gives a synthesized solution to the network centric approach based on the short distance Gaussian bi–static radar concept called twin radar coherent signal fusion. The idea is to explore advantages of the twin radar concept such as doubled detection range, increased, superior angular resolution of the system and increased plot update frequency. Examples for the twin radar performance demonstration are based on VHF radar, which has unique capabilities such as exploitation of multipath and resonance frequency for drones. A few peculiarities of the new signal processing are introduced with the extended air traffic control and monitoring network structure.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(71) "Short Study on Performance of Air Surveillance Augmented by Twin Radars" ["hu_HU"]=> string(71) "Short Study on Performance of Air Surveillance Augmented by Twin Radars" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#732 (6) { ["_data"]=> array(15) { ["id"]=> int(2751) ["email"]=> string(25) "balajti.istvan@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2481) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Balajti" ["hu_HU"]=> string(7) "Balajti" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "István" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(16) "Air Surveillance" [1]=> string(28) "Control and Reporting Centre" [2]=> string(30) "drone maneuvering capabilities" } ["en_US"]=> array(3) { [0]=> string(16) "Air Surveillance" [1]=> string(28) "Control and Reporting Centre" [2]=> string(30) "drone maneuvering capabilities" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#745 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20724) ["id"]=> int(1632) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2481) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#121 (6) { ["_data"]=> array(27) { ["id"]=> int(2483) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:14" ["sectionId"]=> int(38) ["seq"]=> int(2) ["submissionId"]=> int(2364) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "17-29" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.1.2" ["abstract"]=> array(2) { ["en_US"]=> string(1416) "

For thousands of years Medicine was practiced in empiric and authoritarian ways. Physicians and other medical personnel always treated sick people with the principle of “nil nocere”, meaning “do no harm”, but the procedures sometimes either were not effective or did cause harm. Modern scientific methods in medicine enabled the scientists to provide firm results and evidence of a particular treatment or procedure in health care provisions. In a controlled clinical  environment the prospective, double blinded, multi– centric, randomized trial became the golden standard  of research, because this method provided  the most solid basis of testing a hypothesis. In  Military Medicine the operational environment and  battle rhythm define the framework for the practice.  It is impossible to design a trial with all the  aforementioned requirements in battlefield settings,  however small scope prospective trauma care studies  are now getting approval and some of them have  been already published. The tools for this research  are the national Military Trauma Registry Systems,  which are available now in a few countries. The NATO  Trauma Registry Initiative is a multinational effort for  the exchange of operational trauma care data among  the NATO Military Medical Services, to foster the  improvement of Military Medicine and to provide  more solid evidence for treatment. 

" ["hu_HU"]=> string(1389) "

For thousands of years Medicine was practiced in empiric and authoritarian ways. Physicians and other medical personnel always treated sick people with the principle of “nil nocere”, meaning “do no harm”, but the procedures sometimes either were not effective or did cause harm. Modern scientific methods in medicine enabled the scientists to provide firm results and evidence of a particular treatment or procedure in health care provisions.
In a controlled clinical environment the prospective, double blinded, multi–centric, randomized trial became the golden standard of research, because this method provided the most solid basis of testing a hypothesis.
In Military Medicine the operational environment and battle rhythm define the framework for the practice. It is impossible to design a trial with all the aforementioned requirements in battlefield settings, however small scope prospective trauma care studies are now getting approval and some of them have been already published. The tools for this research are the national Military Trauma Registry Systems, which are available now in a few countries. The NATO Trauma Registry Initiative is a multinational effort for the exchange of operational trauma care data among the NATO Military Medical Services, to foster the improvement of Military Medicine and to provide more solid evidence for treatment.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(72) "Evidence Based Military Medicine – The NATO Trauma Registry Initiative" ["hu_HU"]=> string(72) "Evidence Based Military Medicine – The NATO Trauma Registry Initiative" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#741 (6) { ["_data"]=> array(15) { ["id"]=> int(2753) ["email"]=> string(27) "robert.balazs@nspa.nato.int" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2483) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Balázs" ["hu_HU"]=> string(7) "Balázs" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Róbert" ["hu_HU"]=> string(7) "Róbert" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(2754) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2483) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Kopcsó" ["hu_HU"]=> string(7) "Kopcsó" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "István" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(17) "Military Medicine" [1]=> string(32) "Military Trauma Registry Systems" [2]=> string(31) "NATO Trauma Registry Initiative" } ["en_US"]=> array(3) { [0]=> string(17) "Military Medicine" [1]=> string(32) "Military Trauma Registry Systems" [2]=> string(31) "NATO Trauma Registry Initiative" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#761 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20725) ["id"]=> int(1634) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2483) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(27) { ["id"]=> int(2485) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:14" ["sectionId"]=> int(38) ["seq"]=> int(3) ["submissionId"]=> int(2366) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "31-46" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.1.3" ["abstract"]=> array(2) { ["en_US"]=> string(901) "

In our days the range of information activities supported by IT equipment, and the volume of information stored in IT systems is continually growing. So cooperation among different organizations is practically impossible without extensive, meaning preserving information exchange between their IT systems. Practically all today’s interoperability solutions are based on a previously agreed intermediary representation (formatted message standard, or standard data elements), but these solutions have a number of limitations. This paper outlines the foundations of a novel, component based realization of IT interoperability solutions. For this reason it summarizes the foundations of IT interoperability, analyses the goals, and possibilities of component based solutions outlines an architecture of component based interoperability solutions, and finally determines basics of its components.

" ["hu_HU"]=> string(901) "

In our days the range of information activities supported by IT equipment, and the volume of information stored in IT systems is continually growing. So cooperation among different organizations is practically impossible without extensive, meaning preserving information exchange between their IT systems. Practically all today’s interoperability solutions are based on a previously agreed intermediary representation (formatted message standard, or standard data elements), but these solutions have a number of limitations. This paper outlines the foundations of a novel, component based realization of IT interoperability solutions. For this reason it summarizes the foundations of IT interoperability, analyses the goals, and possibilities of component based solutions outlines an architecture of component based interoperability solutions, and finally determines basics of its components.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(63) "Component Based IT Interoperability Solutions, a Novel Approach" ["hu_HU"]=> string(63) "Component Based IT Interoperability Solutions, a Novel Approach" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#743 (6) { ["_data"]=> array(15) { ["id"]=> int(2755) ["email"]=> string(22) "munk.sandor@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2485) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Munk" ["hu_HU"]=> string(4) "Munk" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Sándor" ["hu_HU"]=> string(7) "Sándor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(2) { [0]=> string(19) "IT interoperability" [1]=> string(25) "component based solutions" } ["en_US"]=> array(2) { [0]=> string(19) "IT interoperability" [1]=> string(25) "component based solutions" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#767 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20726) ["id"]=> int(1636) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2485) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#189 (6) { ["_data"]=> array(29) { ["id"]=> int(3806) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:10" ["sectionId"]=> int(38) ["seq"]=> int(4) ["submissionId"]=> int(3685) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "47-52" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.1.4" ["abstract"]=> array(2) { ["en_US"]=> string(594) "

During this research a specific partial data set of the UN database was analyzed from different aspects and evaluated in order to create an image about the prevalence and probable reasons of upper respiratory tract infections among soldiers serving in the operation area.
The research indicates that the prevalence of upper respiratory tract infections (URTIs), and the previously performed tonsillectomies, was the highest in one contingent. The statistical data demonstrates that the tonsillectomies may influence the frequency of upper respiratory infections within the contingent.

" ["hu_HU"]=> string(0) "" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(71) "Analysis of Upper Respiratory Tract Infections In Mission Circumstances" ["hu_HU"]=> string(71) "Analysis of Upper Respiratory Tract Infections In Mission Circumstances" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#735 (6) { ["_data"]=> array(15) { ["id"]=> int(4328) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3806) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Fejes" ["hu_HU"]=> string(5) "Fejes" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Zsolt" ["hu_HU"]=> string(5) "Zsolt" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#770 (6) { ["_data"]=> array(15) { ["id"]=> int(4329) ["email"]=> string(23) "korodi.gyula@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3806) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Kóródi" ["hu_HU"]=> string(8) "Kóródi" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Gyula" ["hu_HU"]=> string(5) "Gyula" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(42) "upper respiratory tract infections (URTIs)" [1]=> string(15) "tonsillectomies" [2]=> string(14) "operation area" [3]=> string(16) "serving soldiers" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#746 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20727) ["id"]=> int(2966) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(3806) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#118 (6) { ["_data"]=> array(29) { ["id"]=> int(2488) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:14" ["sectionId"]=> int(38) ["seq"]=> int(5) ["submissionId"]=> int(2369) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "53-57" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.1.5" ["abstract"]=> array(2) { ["en_US"]=> string(251) "

This article describes the starting points for implementing goal–oriented budgeting (management by objectives) into the Ministry of Defence of the Czech Republic. It also focuses on the principles and factors that affect implementation. 

" ["hu_HU"]=> string(251) "

This article describes the starting points for implementing goal–oriented budgeting (management by objectives) into the Ministry of Defence of the Czech Republic. It also focuses on the principles and factors that affect implementation. 

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(65) "Implementation of Goal–Oriented Budgeting in the Defence Sector" ["hu_HU"]=> string(65) "Implementation of Goal–Oriented Budgeting in the Defence Sector" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#774 (6) { ["_data"]=> array(15) { ["id"]=> int(2759) ["email"]=> string(14) "musil2@unob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2488) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Musil" ["hu_HU"]=> string(5) "Musil" } ["givenName"]=> array(2) { ["en_US"]=> string(4) "Petr" ["hu_HU"]=> string(4) "Petr" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(8) "planning" [1]=> string(9) "budgeting" [2]=> string(31) "goal–oriented budgeting (MBO)" [3]=> string(4) "goal" } ["en_US"]=> array(4) { [0]=> string(8) "planning" [1]=> string(9) "budgeting" [2]=> string(31) "goal–oriented budgeting (MBO)" [3]=> string(4) "goal" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#776 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20728) ["id"]=> int(1640) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2488) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#765 (6) { ["_data"]=> array(27) { ["id"]=> int(2489) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:14" ["sectionId"]=> int(38) ["seq"]=> int(6) ["submissionId"]=> int(2370) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "59-70" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.1.6" ["abstract"]=> array(2) { ["en_US"]=> string(633) "

The purpose of the authors of this article is to present the abilities and the requirements of the infocommunication sub–system of a sampling group which supports the professional activity of a deployable rapid diagnostic laboratory. In addtion, the article determines the infocommunication demands and the contact system of the group. Considering the above, the authors of the article investigate the applicable technologies, the possible technical devices and give suggestions for their implementation.
This article is made possible with the support of the project TGYDGL09 “Deployable Rapid Diagnostic Laboratory”.

" ["hu_HU"]=> string(633) "

The purpose of the authors of this article is to present the abilities and the requirements of the infocommunication sub–system of a sampling group which supports the professional activity of a deployable rapid diagnostic laboratory. In addtion, the article determines the infocommunication demands and the contact system of the group. Considering the above, the authors of the article investigate the applicable technologies, the possible technical devices and give suggestions for their implementation.
This article is made possible with the support of the project TGYDGL09 “Deployable Rapid Diagnostic Laboratory”.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(119) "The Infocommunication System Requirements of the Deployable Rapid Diagnostic Laboratory Support “Sampling Group” I." ["hu_HU"]=> string(119) "The Infocommunication System Requirements of the Deployable Rapid Diagnostic Laboratory Support “Sampling Group” I." } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#779 (6) { ["_data"]=> array(15) { ["id"]=> int(2760) ["email"]=> string(23) "farkas.tibor@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2489) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Farkas" ["hu_HU"]=> string(6) "Farkas" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Tibor" ["hu_HU"]=> string(5) "Tibor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#742 (6) { ["_data"]=> array(15) { ["id"]=> int(2761) ["email"]=> string(24) "hronyecz.erika@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2489) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Hronyecz" ["hu_HU"]=> string(8) "Hronyecz" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Erika" ["hu_HU"]=> string(5) "Erika" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(2) { [0]=> string(38) "deployable rapid diagnostic laboratory" [1]=> string(70) "requirements of the infocommunication sub–system of a sampling group" } ["en_US"]=> array(2) { [0]=> string(38) "deployable rapid diagnostic laboratory" [1]=> string(70) "requirements of the infocommunication sub–system of a sampling group" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#772 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20729) ["id"]=> int(1641) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2489) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#762 (6) { ["_data"]=> array(29) { ["id"]=> int(2491) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:13" ["sectionId"]=> int(38) ["seq"]=> int(7) ["submissionId"]=> int(2372) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "71-87" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.1.7" ["abstract"]=> array(2) { ["en_US"]=> string(758) "

War graves, or war heroes’ graves, are burial places for soldiers who fell in battle while serving their homeland, or as a result of fighting for their country. War graves around the world are, from time to time, excavated — either by chance or by design — and the earthly remains of the warriors resting within may be exhumed. The following study primarily seeks answers to the questions of who should, in such cases, carry out the excavation of a war grave? Which areas of science may be affected by the excavation? What types of experts can be involved in such instances? And what methods exist for this purpose? A further objective of the study is to make recommendations on the optimal methodology that may be applied by experts in Hungary.

" ["hu_HU"]=> string(758) "

War graves, or war heroes’ graves, are burial places for soldiers who fell in battle while serving their homeland, or as a result of fighting for their country. War graves around the world are, from time to time, excavated — either by chance or by design — and the earthly remains of the warriors resting within may be exhumed. The following study primarily seeks answers to the questions of who should, in such cases, carry out the excavation of a war grave? Which areas of science may be affected by the excavation? What types of experts can be involved in such instances? And what methods exist for this purpose? A further objective of the study is to make recommendations on the optimal methodology that may be applied by experts in Hungary.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(61) "War Grave Excavation Methods: Survey, Results and Suggestions" ["hu_HU"]=> string(61) "War Grave Excavation Methods: Survey, Results and Suggestions" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#783 (6) { ["_data"]=> array(15) { ["id"]=> int(2763) ["email"]=> string(20) "zsolt.t@citromail.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2491) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Tóth" ["hu_HU"]=> string(5) "Tóth" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Zsolt" ["hu_HU"]=> string(5) "Zsolt" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(2) { [0]=> string(10) "war graves" [1]=> string(18) "excavation methods" } ["en_US"]=> array(2) { [0]=> string(10) "war graves" [1]=> string(18) "excavation methods" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#785 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20730) ["id"]=> int(1643) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2491) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#763 (6) { ["_data"]=> array(27) { ["id"]=> int(2528) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:13" ["sectionId"]=> int(38) ["seq"]=> int(8) ["submissionId"]=> int(2409) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(6) "89-101" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.1.8" ["abstract"]=> array(2) { ["en_US"]=> string(726) "

Operational command is to be implemented always in the area of operations, or area of responsibility, using command assets that have a direct effect on the operational activities, and are able to quickly and operatively react to changes in the situation, and to make available the necessary forces and equipment in due time corresponding to the current situation in order to support the combat activity. These requirements are met by field command systems.
This study is aimed at presenting the development results, capabilities, and application possibilities of the computer–aided intelligence planning and command and data processing functional sub–system operating on a geospatial information systems basis.

" ["hu_HU"]=> string(726) "

Operational command is to be implemented always in the area of operations, or area of responsibility, using command assets that have a direct effect on the operational activities, and are able to quickly and operatively react to changes in the situation, and to make available the necessary forces and equipment in due time corresponding to the current situation in order to support the combat activity. These requirements are met by field command systems.
This study is aimed at presenting the development results, capabilities, and application possibilities of the computer–aided intelligence planning and command and data processing functional sub–system operating on a geospatial information systems basis.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(189) "Capabilities and Application Possibilities of the Intelligence Functional Sub–system of “HUTOPCCIS” Computer–aided Command System Operating on a Geospatial Information Systems Basis" ["hu_HU"]=> string(189) "Capabilities and Application Possibilities of the Intelligence Functional Sub–system of “HUTOPCCIS” Computer–aided Command System Operating on a Geospatial Information Systems Basis" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#788 (6) { ["_data"]=> array(15) { ["id"]=> int(2804) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2528) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Furján" ["hu_HU"]=> string(7) "Furján" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Attila" ["hu_HU"]=> string(6) "Attila" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(11) { [0]=> string(30) "“HUTOPCCIS” command system" [1]=> string(19) "target intelligence" [2]=> string(16) "target reporting" [3]=> string(15) "target analysis" [4]=> string(22) "target data processing" [5]=> string(11) "digital map" [6]=> string(30) "geospatial information systems" [7]=> string(37) "intelligence planning on digital maps" [8]=> string(22) "visibility examination" [9]=> string(16) "detected targets" [10]=> string(33) "monitoring of the fire for effect" } ["en_US"]=> array(11) { [0]=> string(30) "“HUTOPCCIS” command system" [1]=> string(19) "target intelligence" [2]=> string(16) "target reporting" [3]=> string(15) "target analysis" [4]=> string(22) "target data processing" [5]=> string(11) "digital map" [6]=> string(30) "geospatial information systems" [7]=> string(37) "intelligence planning on digital maps" [8]=> string(22) "visibility examination" [9]=> string(16) "detected targets" [10]=> string(33) "monitoring of the fire for effect" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#781 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20731) ["id"]=> int(1680) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2528) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#768 (6) { ["_data"]=> array(27) { ["id"]=> int(2535) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:13" ["sectionId"]=> int(38) ["seq"]=> int(9) ["submissionId"]=> int(2416) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "103-111" ["pub-id::doi"]=> string(23) "10.32565/aarms.2014.1.9" ["abstract"]=> array(2) { ["en_US"]=> string(1140) "

In the past few years many conflicts have intensified in Africa, one of which have caused a new peacekeeping mission to be deployed to Mali, and already existing operations to be strengthened. Mali was the first victim of the chaos caused by the Arab Spring and the international intervention in Libya. The heavily armed Tuareg returned to Mali after the Libyan intervention, and their separatist aspirations caused an interior conflict that escalated when terrorist groups got involved. A democratically functioning country collapsed from one day to another. The crisis in Mali is a difficult challenge for the international community because it has to organize a multidimensional peacekeeping mission, while having to fight against terrorism. Moreover, the global economic crisis forced these nations to reduce their military spending without compromising effectiveness. The present paper deals with the complexity of the conflict in Mali and examines whether the United Nations Multidimensional Integrated Stabilization Mission in Mali (MINUSMA), the peacekeeping mission in Mali, is able to comply with the expected requirements.

" ["hu_HU"]=> string(1140) "

In the past few years many conflicts have intensified in Africa, one of which have caused a new peacekeeping mission to be deployed to Mali, and already existing operations to be strengthened. Mali was the first victim of the chaos caused by the Arab Spring and the international intervention in Libya. The heavily armed Tuareg returned to Mali after the Libyan intervention, and their separatist aspirations caused an interior conflict that escalated when terrorist groups got involved. A democratically functioning country collapsed from one day to another. The crisis in Mali is a difficult challenge for the international community because it has to organize a multidimensional peacekeeping mission, while having to fight against terrorism. Moreover, the global economic crisis forced these nations to reduce their military spending without compromising effectiveness. The present paper deals with the complexity of the conflict in Mali and examines whether the United Nations Multidimensional Integrated Stabilization Mission in Mali (MINUSMA), the peacekeeping mission in Mali, is able to comply with the expected requirements.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(38) "Mali: A New Challenge for Peacekeeping" ["hu_HU"]=> string(38) "Mali: A New Challenge for Peacekeeping" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#792 (6) { ["_data"]=> array(15) { ["id"]=> int(2816) ["email"]=> string(24) "ritter.noemi@hotmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2535) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Ritter" ["hu_HU"]=> string(6) "Ritter" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Noémi" ["hu_HU"]=> string(6) "Noémi" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(4) "Mali" [1]=> string(9) "terrorism" [2]=> string(26) "international intervention" [3]=> string(20) "peacekeeping mission" [4]=> string(11) "cooperation" } ["en_US"]=> array(5) { [0]=> string(4) "Mali" [1]=> string(9) "terrorism" [2]=> string(26) "international intervention" [3]=> string(20) "peacekeeping mission" [4]=> string(11) "cooperation" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#786 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20732) ["id"]=> int(1690) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2535) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#775 (6) { ["_data"]=> array(29) { ["id"]=> int(2541) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:13" ["sectionId"]=> int(38) ["seq"]=> int(10) ["submissionId"]=> int(2422) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "113-116" ["pub-id::doi"]=> string(24) "10.32565/aarms.2014.1.10" ["abstract"]=> array(2) { ["en_US"]=> string(502) "

Action–anthropology is one branch of cultural anthropology that as an interdiscipline can promote the more effective functioning of the system of the Hungarian Defence Force’s mission operations planning, training, and task implementation. Cultural anthropology — and the sub–discipline action–anthropology — is a branch of social science utilizing methods of theory and knowledge to solve prac- tical social problems; therefore, it is suitable for special research in mission areas.

" ["hu_HU"]=> string(502) "

Action–anthropology is one branch of cultural anthropology that as an interdiscipline can promote the more effective functioning of the system of the Hungarian Defence Force’s mission operations planning, training, and task implementation. Cultural anthropology — and the sub–discipline action–anthropology — is a branch of social science utilizing methods of theory and knowledge to solve prac- tical social problems; therefore, it is suitable for special research in mission areas.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(55) "Place and Role of Cultural Anthropology in the Military" ["hu_HU"]=> string(55) "Place and Role of Cultural Anthropology in the Military" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#796 (6) { ["_data"]=> array(15) { ["id"]=> int(2819) ["email"]=> string(20) "k.sztankai@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2541) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Sztankai" ["hu_HU"]=> string(8) "Sztankai" } ["givenName"]=> array(2) { ["en_US"]=> string(10) "Krisztián" ["hu_HU"]=> string(10) "Krisztián" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(12) "anthropology" [1]=> string(19) "action anthropology" [2]=> string(11) "cooperation" [3]=> string(30) "Hungarian Defence Forces (HDF)" } ["en_US"]=> array(4) { [0]=> string(12) "anthropology" [1]=> string(19) "action anthropology" [2]=> string(11) "cooperation" [3]=> string(30) "Hungarian Defence Forces (HDF)" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#790 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20733) ["id"]=> int(1694) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2541) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#769 (6) { ["_data"]=> array(27) { ["id"]=> int(2544) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:12" ["sectionId"]=> int(38) ["seq"]=> int(11) ["submissionId"]=> int(2425) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "117-130" ["pub-id::doi"]=> string(24) "10.32565/aarms.2014.1.11" ["abstract"]=> array(2) { ["en_US"]=> string(882) "

The Tactical Operational Command and Control Information System shall have sub–systems that are capable of covering, ensuring, and servicing — in summary supporting — the battlefield systems operated by the combat (manoeuvre) forces and combat support units and sub–units during planning and commanding, on the land forces, brigade, battalion and company level.
One of the most important such sub–systems is the intelligence planning, command and data processing functional sub–system. It allows for a quick and professional processing of target intelligence data, displaying them with the standard symbols on digital maps, and promptly grouping them by priority; thereby it greatly facilitates the manoeuvre commander’s foresight, provides assistance for decision–making, and provides accurate target data to the fire support groups for target planning.

" ["hu_HU"]=> string(882) "

The Tactical Operational Command and Control Information System shall have sub–systems that are capable of covering, ensuring, and servicing — in summary supporting — the battlefield systems operated by the combat (manoeuvre) forces and combat support units and sub–units during planning and commanding, on the land forces, brigade, battalion and company level.
One of the most important such sub–systems is the intelligence planning, command and data processing functional sub–system. It allows for a quick and professional processing of target intelligence data, displaying them with the standard symbols on digital maps, and promptly grouping them by priority; thereby it greatly facilitates the manoeuvre commander’s foresight, provides assistance for decision–making, and provides accurate target data to the fire support groups for target planning.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(96) "Analysis and Assessment of Targets on a Digital Map and Computer Processing of Intelligence Data" ["hu_HU"]=> string(96) "Analysis and Assessment of Targets on a Digital Map and Computer Processing of Intelligence Data" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#789 (6) { ["_data"]=> array(15) { ["id"]=> int(2822) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2544) ["seq"]=> int(11) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Furján" ["hu_HU"]=> string(7) "Furján" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Attila" ["hu_HU"]=> string(6) "Attila" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(11) { [0]=> string(30) "“HUTOPCCIS” command system" [1]=> string(19) "target intelligence" [2]=> string(16) "target reporting" [3]=> string(15) "target analysis" [4]=> string(22) "target data processing" [5]=> string(11) "digital map" [6]=> string(30) "geospatial information systems" [7]=> string(37) "intelligence planning on digital maps" [8]=> string(22) "visibility examination" [9]=> string(16) "detected targets" [10]=> string(29) "monitoring of fire for effect" } ["en_US"]=> array(11) { [0]=> string(30) "“HUTOPCCIS” command system" [1]=> string(19) "target intelligence" [2]=> string(16) "target reporting" [3]=> string(15) "target analysis" [4]=> string(22) "target data processing" [5]=> string(11) "digital map" [6]=> string(30) "geospatial information systems" [7]=> string(37) "intelligence planning on digital maps" [8]=> string(22) "visibility examination" [9]=> string(16) "detected targets" [10]=> string(29) "monitoring of fire for effect" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#794 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20734) ["id"]=> int(1696) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2544) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#784 (6) { ["_data"]=> array(29) { ["id"]=> int(2546) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:12" ["sectionId"]=> int(38) ["seq"]=> int(12) ["submissionId"]=> int(2427) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "131-139" ["pub-id::doi"]=> string(24) "10.32565/aarms.2014.1.12" ["abstract"]=> array(2) { ["en_US"]=> string(677) "

The aim of the paper is to show how the thoughts of military Keynesianism have been developed and to define the role of military Keynesianism. First, the term ‘military Keynesianism’ will be introduced and its birth in the history of economic development will be dated and explained. Second, the development of the thoughts of military Keynesianism and also the development of the military–industrial complex will be described and the main different views on the application of military Keynesianism policy will be included. Finally, the authors will try to interpret opinions on the application of military Keynesianism during the economic recession, 2008–2012.

" ["hu_HU"]=> string(677) "

The aim of the paper is to show how the thoughts of military Keynesianism have been developed and to define the role of military Keynesianism. First, the term ‘military Keynesianism’ will be introduced and its birth in the history of economic development will be dated and explained. Second, the development of the thoughts of military Keynesianism and also the development of the military–industrial complex will be described and the main different views on the application of military Keynesianism policy will be included. Finally, the authors will try to interpret opinions on the application of military Keynesianism during the economic recession, 2008–2012.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(82) "Origin and Development of the Thoughts on Military Keynesianism During 1936–2012" ["hu_HU"]=> string(82) "Origin and Development of the Thoughts on Military Keynesianism During 1936–2012" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#799 (6) { ["_data"]=> array(15) { ["id"]=> int(2827) ["email"]=> string(20) "lubos.stancl@unob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2546) ["seq"]=> int(12) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Štancl" ["hu_HU"]=> string(7) "Štancl" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Luboš" ["hu_HU"]=> string(6) "Luboš" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#804 (6) { ["_data"]=> array(15) { ["id"]=> int(2828) ["email"]=> string(23) "vendula.hynkova@unob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2546) ["seq"]=> int(12) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Hynková" ["hu_HU"]=> string(8) "Hynková" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Vendula" ["hu_HU"]=> string(7) "Vendula" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(21) "military Keynesianism" [1]=> string(14) "militarization" [2]=> string(28) "military Keynesianism policy" [3]=> string(60) "military–industrial complex JEL classification: E6, B5, H5" } ["en_US"]=> array(4) { [0]=> string(21) "military Keynesianism" [1]=> string(14) "militarization" [2]=> string(28) "military Keynesianism policy" [3]=> string(60) "military–industrial complex JEL classification: E6, B5, H5" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#798 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20735) ["id"]=> int(1701) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2546) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#782 (6) { ["_data"]=> array(29) { ["id"]=> int(2551) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:12" ["sectionId"]=> int(38) ["seq"]=> int(13) ["submissionId"]=> int(2432) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "141-154" ["pub-id::doi"]=> string(24) "10.32565/aarms.2014.1.13" ["abstract"]=> array(2) { ["en_US"]=> string(482) "

Storage, processing and use of dangerous substances which are present in hazardous activities involve the risk of major accidents. The experience of recent history shows that industrial accidents can cause catastrophic effects to the environment of dangerous industrial establishments and citizens living nearby. The aim of the authors of this article is to categories the Hungarian hazardous activities and provide the readers with a general overview of their vulnerability.

" ["hu_HU"]=> string(482) "

Storage, processing and use of dangerous substances which are present in hazardous activities involve the risk of major accidents. The experience of recent history shows that industrial accidents can cause catastrophic effects to the environment of dangerous industrial establishments and citizens living nearby. The aim of the authors of this article is to categories the Hungarian hazardous activities and provide the readers with a general overview of their vulnerability.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(65) "Hazardous Activities in Hungary — in Terms of Industrial Safety" ["hu_HU"]=> string(65) "Hazardous Activities in Hungary — in Terms of Industrial Safety" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#808 (6) { ["_data"]=> array(15) { ["id"]=> int(2831) ["email"]=> string(22) "kataii@tuzoltosagbp.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2551) ["seq"]=> int(13) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(13) "Kátai-Urbán" ["hu_HU"]=> string(13) "Kátai-Urbán" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Irina" ["hu_HU"]=> string(5) "Irina" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#778 (6) { ["_data"]=> array(15) { ["id"]=> int(2832) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2551) ["seq"]=> int(13) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Vass" ["hu_HU"]=> string(4) "Vass" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Gyula" ["hu_HU"]=> string(5) "Gyula" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(19) "disaster management" [1]=> string(17) "industrial safety" [2]=> string(13) "vulnerability" [3]=> string(7) "Hungary" [4]=> string(20) "hazardous activities" } ["en_US"]=> array(5) { [0]=> string(19) "disaster management" [1]=> string(17) "industrial safety" [2]=> string(13) "vulnerability" [3]=> string(7) "Hungary" [4]=> string(20) "hazardous activities" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#810 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20736) ["id"]=> int(1704) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2551) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#795 (6) { ["_data"]=> array(29) { ["id"]=> int(2560) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:12" ["sectionId"]=> int(38) ["seq"]=> int(14) ["submissionId"]=> int(2441) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "155-166" ["pub-id::doi"]=> string(24) "10.32565/aarms.2014.1.14" ["abstract"]=> array(2) { ["en_US"]=> string(806) "

In this paper the author shows that it is conceptually possible to derive from International Public Sector Accounting Standard (IPSAS) 12–Inventories exemplary requirements that can be used as a basis to assess in principle the compliance of military logistics systems with IPSAS 12. However, the utility of isolated requirements for compliance with IPSAS 12 is limited, since these requirements certainly need to be integrated with requirements derived from other IPSASs and with requirements related to the accounting system used to prepare IPSAS annual financial statements. As a result of such a requirement’s integration process it is very likely that noticeable changes and/or augmentations of the proposed exemplary requirements for compliance with IPSAS 12 will turn out to be necessary.

" ["hu_HU"]=> string(806) "

In this paper the author shows that it is conceptually possible to derive from International Public Sector Accounting Standard (IPSAS) 12–Inventories exemplary requirements that can be used as a basis to assess in principle the compliance of military logistics systems with IPSAS 12. However, the utility of isolated requirements for compliance with IPSAS 12 is limited, since these requirements certainly need to be integrated with requirements derived from other IPSASs and with requirements related to the accounting system used to prepare IPSAS annual financial statements. As a result of such a requirement’s integration process it is very likely that noticeable changes and/or augmentations of the proposed exemplary requirements for compliance with IPSAS 12 will turn out to be necessary.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(139) "International Public Sector Accounting Standard (IPSAS) 12–Inventories: Determining Exemplary Requirements for Military Logistics Systems" ["hu_HU"]=> string(139) "International Public Sector Accounting Standard (IPSAS) 12–Inventories: Determining Exemplary Requirements for Military Logistics Systems" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#813 (6) { ["_data"]=> array(15) { ["id"]=> int(2845) ["email"]=> string(27) "Holger.Scheppelmann@gmx.net" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2560) ["seq"]=> int(14) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(12) "Scheppelmann" ["hu_HU"]=> string(12) "Scheppelmann" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Holger" ["hu_HU"]=> string(6) "Holger" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(2) { [0]=> string(55) "International Public Sector Accounting Standard (IPSAS)" [1]=> string(43) "requirements for military logistics systems" } ["en_US"]=> array(2) { [0]=> string(55) "International Public Sector Accounting Standard (IPSAS)" [1]=> string(43) "requirements for military logistics systems" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#815 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20737) ["id"]=> int(1712) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2560) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#793 (6) { ["_data"]=> array(27) { ["id"]=> int(2622) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:12" ["sectionId"]=> int(38) ["seq"]=> int(15) ["submissionId"]=> int(2501) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "167-182" ["pub-id::doi"]=> string(24) "10.32565/aarms.2014.1.15" ["abstract"]=> array(2) { ["en_US"]=> string(1011) "

Following a disaster in the affected area secondary impacts also prevail besides primary ones. It is important to know these impacts because rescue operations should be based on them. The implementation of the activities with the aim of managing the consequences is commanded and controlled by the onsite commander in all cases. As a leader, he makes decisions based on assessment. This method is appropriate if it is built on the reconnaissance information and data of the affected zone. Depending on the features of disasters, the most frequent reconnaissance methods of the disaster area are the technical and medical reconnaissance. In this article, the authors review the purposes, functions and correlations of these scopes of tasks with the decisions of the onsite commander. On the other hand, they systematize the types of technical reconnaissance and the applicable reconnaissance methods and tools. Furthermore, they examine the main tasks, requirements and elements of medical reconnaissance.

" ["hu_HU"]=> string(1011) "

Following a disaster in the affected area secondary impacts also prevail besides primary ones. It is important to know these impacts because rescue operations should be based on them. The implementation of the activities with the aim of managing the consequences is commanded and controlled by the onsite commander in all cases. As a leader, he makes decisions based on assessment. This method is appropriate if it is built on the reconnaissance information and data of the affected zone. Depending on the features of disasters, the most frequent reconnaissance methods of the disaster area are the technical and medical reconnaissance. In this article, the authors review the purposes, functions and correlations of these scopes of tasks with the decisions of the onsite commander. On the other hand, they systematize the types of technical reconnaissance and the applicable reconnaissance methods and tools. Furthermore, they examine the main tasks, requirements and elements of medical reconnaissance.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(79) "(Specialized) Technical and Medical Reconnaissance of Disaster–affected Areas" ["hu_HU"]=> string(79) "(Specialized) Technical and Medical Reconnaissance of Disaster–affected Areas" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#806 (6) { ["_data"]=> array(15) { ["id"]=> int(2918) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2622) ["seq"]=> int(15) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Hornyacsek" ["hu_HU"]=> string(10) "Hornyacsek" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Júlia" ["hu_HU"]=> string(6) "Júlia" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#818 (6) { ["_data"]=> array(15) { ["id"]=> int(2919) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2622) ["seq"]=> int(15) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Antal" ["hu_HU"]=> string(5) "Antal" } ["givenName"]=> array(2) { ["en_US"]=> string(4) "Örs" ["hu_HU"]=> string(4) "Örs" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(13) "disaster area" [1]=> string(26) "specialized reconnaissance" [2]=> string(20) "building diagnostics" [3]=> string(12) "cable search" [4]=> string(16) "public utilities" [5]=> string(34) "specialized medical reconnaissance" } ["en_US"]=> array(6) { [0]=> string(13) "disaster area" [1]=> string(26) "specialized reconnaissance" [2]=> string(20) "building diagnostics" [3]=> string(12) "cable search" [4]=> string(16) "public utilities" [5]=> string(34) "specialized medical reconnaissance" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#811 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20738) ["id"]=> int(1770) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2622) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#805 (6) { ["_data"]=> array(27) { ["id"]=> int(2623) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:11" ["sectionId"]=> int(38) ["seq"]=> int(16) ["submissionId"]=> int(2502) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "183-197" ["pub-id::doi"]=> string(24) "10.32565/aarms.2014.1.16" ["abstract"]=> array(2) { ["en_US"]=> string(1211) "

Since the end of the 20th Century the role and ultimate power of states have been diminishing. Once, states were considered untouchable no matter what happened within their borders and no matter who ruled them, but nowadays, international intervention into intra–state affairs has become quite common. Ungoverned, undergoverned, misgoverned and contested areas offer fertile ground for insurgents, extremists, organized crime and warlords to flourish and consequently endanger not only local civilian populations but also the political, security, economic or ideological interests of western powers. Consequently, two separate approaches to intra–state interventions have been developed: backing the government in their fight against the insurgency, such as in Afghanistan, and backing the insurgents in their fight against the government such as in Libya.
First, this article will analyze the changed role of the states in the New World Order and define parameters that guide international interventions into the intra–state affairs. Secondly, it will analyze western approaches to insurgency and counter insurgency operations through a case study of NATO operations in Afghanistan and Libya.

" ["hu_HU"]=> string(1211) "

Since the end of the 20th Century the role and ultimate power of states have been diminishing. Once, states were considered untouchable no matter what happened within their borders and no matter who ruled them, but nowadays, international intervention into intra–state affairs has become quite common. Ungoverned, undergoverned, misgoverned and contested areas offer fertile ground for insurgents, extremists, organized crime and warlords to flourish and consequently endanger not only local civilian populations but also the political, security, economic or ideological interests of western powers. Consequently, two separate approaches to intra–state interventions have been developed: backing the government in their fight against the insurgency, such as in Afghanistan, and backing the insurgents in their fight against the government such as in Libya.
First, this article will analyze the changed role of the states in the New World Order and define parameters that guide international interventions into the intra–state affairs. Secondly, it will analyze western approaches to insurgency and counter insurgency operations through a case study of NATO operations in Afghanistan and Libya.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(55) "Support to Insurgency and Counter Insurgency Operations" ["hu_HU"]=> string(55) "Support to Insurgency and Counter Insurgency Operations" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#819 (6) { ["_data"]=> array(15) { ["id"]=> int(2923) ["email"]=> string(16) "vzekulic@morh.hr" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2623) ["seq"]=> int(16) ["userGroupId"]=> int(82) ["country"]=> string(2) "HR" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Zekulić" ["hu_HU"]=> string(8) "Zekulić" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Vlasta" ["hu_HU"]=> string(6) "Vlasta" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(15) "New World Order" [1]=> string(21) "intra–state affairs" [2]=> string(10) "insurgency" [3]=> string(29) "counter insurgency operations" } ["en_US"]=> array(4) { [0]=> string(15) "New World Order" [1]=> string(21) "intra–state affairs" [2]=> string(10) "insurgency" [3]=> string(29) "counter insurgency operations" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#824 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20739) ["id"]=> int(1772) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2623) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#797 (6) { ["_data"]=> array(27) { ["id"]=> int(2637) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:11" ["sectionId"]=> int(38) ["seq"]=> int(17) ["submissionId"]=> int(2516) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "199-208" ["pub-id::doi"]=> string(24) "10.32565/aarms.2014.1.17" ["abstract"]=> array(2) { ["en_US"]=> string(1696) "

This paper deals with the use of military symbology in accordance with the current standard of the North Atlantic Treaty Organization (NATO) APP–6C from 2012. It analyses the current state of the topic, especially the available resources dedicated to military symbology and schemes of tactical activities of units. The paper defines the procedures and principles in creating tactical symbols and principles for their use in tactical situations. One of the annexes of is an overview of the most common tactical symbols, which provides a standardized, structured set of graphic symbols identifying the most common units, equipment, lines, areas and maneuvers with respect to the current state of the Army of the Czech Republic. This examination also provides the user, through the presentation of MS Office, a comprehensive overview of tactical symbols, as well as short instructions for their use. These symbols can also be removed from the presentation and can be used by the user as the necessary basis for creating one’s own diagrams of tactical situations. The next part of this thesis deals with the design of new variants of schemes selected for use in tactical operations of a battalion task force. This schema set is available to the user as well in a presentation of MS Office. Individual schemes are drawn to ensure the required clarity and so this presentation can be used for teaching and by students. This work is a learning tool which can be used by students of The University of Defense especially in subjects like Tactics of Units and Tactics of Formations and, other fields of study as well as in military practices of the units of the Army of the Czech Republic (ACR).

" ["hu_HU"]=> string(1696) "

This paper deals with the use of military symbology in accordance with the current standard of the North Atlantic Treaty Organization (NATO) APP–6C from 2012. It analyses the current state of the topic, especially the available resources dedicated to military symbology and schemes of tactical activities of units. The paper defines the procedures and principles in creating tactical symbols and principles for their use in tactical situations. One of the annexes of is an overview of the most common tactical symbols, which provides a standardized, structured set of graphic symbols identifying the most common units, equipment, lines, areas and maneuvers with respect to the current state of the Army of the Czech Republic. This examination also provides the user, through the presentation of MS Office, a comprehensive overview of tactical symbols, as well as short instructions for their use. These symbols can also be removed from the presentation and can be used by the user as the necessary basis for creating one’s own diagrams of tactical situations. The next part of this thesis deals with the design of new variants of schemes selected for use in tactical operations of a battalion task force. This schema set is available to the user as well in a presentation of MS Office. Individual schemes are drawn to ensure the required clarity and so this presentation can be used for teaching and by students. This work is a learning tool which can be used by students of The University of Defense especially in subjects like Tactics of Units and Tactics of Formations and, other fields of study as well as in military practices of the units of the Army of the Czech Republic (ACR).

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(102) "Military Symbology and Schemes of Battalion Task Force in Selected Tactical Activities (Learning Tool)" ["hu_HU"]=> string(102) "Military Symbology and Schemes of Battalion Task Force in Selected Tactical Activities (Learning Tool)" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#827 (6) { ["_data"]=> array(15) { ["id"]=> int(2947) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2637) ["seq"]=> int(17) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Panák" ["hu_HU"]=> string(6) "Panák" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Marek" ["hu_HU"]=> string(5) "Marek" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#812 (6) { ["_data"]=> array(15) { ["id"]=> int(2948) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2637) ["seq"]=> int(17) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Černý" ["hu_HU"]=> string(7) "Černý" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Jiří" ["hu_HU"]=> string(6) "Jiří" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(9) { [0]=> string(18) "Military symbology" [1]=> string(7) "schemes" [2]=> string(20) "battalion task force" [3]=> string(10) "schema set" [4]=> string(39) "principles in creating tactical symbols" [5]=> string(23) "use of tactical symbols" [6]=> string(20) "NATO joint symbology" [7]=> string(8) "APP–6C" [8]=> string(13) "learning tool" } ["en_US"]=> array(9) { [0]=> string(18) "Military symbology" [1]=> string(7) "schemes" [2]=> string(20) "battalion task force" [3]=> string(10) "schema set" [4]=> string(39) "principles in creating tactical symbols" [5]=> string(23) "use of tactical symbols" [6]=> string(20) "NATO joint symbology" [7]=> string(8) "APP–6C" [8]=> string(13) "learning tool" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#820 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20740) ["id"]=> int(1785) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2637) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF

Military Captcha

Sztuka Jiří, Hagara Ladislav
doi: 10.32565/aarms.2014.1.18
209-220.
object(Publication)#803 (6) { ["_data"]=> array(26) { ["id"]=> int(2638) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:11" ["sectionId"]=> int(38) ["seq"]=> int(18) ["submissionId"]=> int(2517) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "209-220" ["pub-id::doi"]=> string(24) "10.32565/aarms.2014.1.18" ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(16) "Military Captcha" ["hu_HU"]=> string(16) "Military Captcha" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#821 (6) { ["_data"]=> array(15) { ["id"]=> int(2949) ["email"]=> string(19) "jiri.sztuka@unob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2638) ["seq"]=> int(18) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Sztuka" ["hu_HU"]=> string(6) "Sztuka" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Jiří" ["hu_HU"]=> string(6) "Jiří" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#817 (6) { ["_data"]=> array(15) { ["id"]=> int(2950) ["email"]=> string(23) "ladislav.hagara@unob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2638) ["seq"]=> int(18) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Hagara" ["hu_HU"]=> string(6) "Hagara" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Ladislav" ["hu_HU"]=> string(8) "Ladislav" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(0) { } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#833 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20741) ["id"]=> int(1786) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2638) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#822 (6) { ["_data"]=> array(27) { ["id"]=> int(2639) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:11" ["sectionId"]=> int(38) ["seq"]=> int(19) ["submissionId"]=> int(2518) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "221-227" ["pub-id::doi"]=> string(24) "10.32565/aarms.2014.1.19" ["abstract"]=> array(2) { ["en_US"]=> string(1485) "

The analysis examines the governmental decisions that tried to provide alternatives and offer a realistic response to the current U.S. debt crisis, severely undermining those defense budget provisions that had previously been planned. First, the impact of the 2011 Budget Control Act and the ‘sequestration’ process will be examined within the context of U.S. defense planning, giving a comprehensive overview of the U.S. budget debate with regard to U.S defense policy. Then the analysis compares and contrasts the current 2013 financial year data to the 2014 financial plan proposal based on President Obama’s statement in the White House on April 10, 2013, in which he presented the key points of the 2014 financial year budget. There the President put an emphasis on his sustained effort to improve the situation of American people through social benefit programs. These will have a determining effect to the United States armed forces in the future, which operate under heavy pressure and at times financial austerity. Expenses of social welfare and medical care are important for our analysis, as these belong to more steady mandatory items of the federal budget, while the defense budget relies mostly on discretionary funding, and is subject to major fluctuations. Finally the assessment will reflect on the Obama administration’s FY 2014 proposals with regard to the US defense policy review process in order to highlight the practical effects of sequestration.

" ["hu_HU"]=> string(1485) "

The analysis examines the governmental decisions that tried to provide alternatives and offer a realistic response to the current U.S. debt crisis, severely undermining those defense budget provisions that had previously been planned. First, the impact of the 2011 Budget Control Act and the ‘sequestration’ process will be examined within the context of U.S. defense planning, giving a comprehensive overview of the U.S. budget debate with regard to U.S defense policy. Then the analysis compares and contrasts the current 2013 financial year data to the 2014 financial plan proposal based on President Obama’s statement in the White House on April 10, 2013, in which he presented the key points of the 2014 financial year budget. There the President put an emphasis on his sustained effort to improve the situation of American people through social benefit programs. These will have a determining effect to the United States armed forces in the future, which operate under heavy pressure and at times financial austerity. Expenses of social welfare and medical care are important for our analysis, as these belong to more steady mandatory items of the federal budget, while the defense budget relies mostly on discretionary funding, and is subject to major fluctuations. Finally the assessment will reflect on the Obama administration’s FY 2014 proposals with regard to the US defense policy review process in order to highlight the practical effects of sequestration.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(64) "The Analysis of the U.S. Financial Year (FY) 2014 Defense Budget" ["hu_HU"]=> string(64) "The Analysis of the U.S. Financial Year (FY) 2014 Defense Budget" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#823 (6) { ["_data"]=> array(15) { ["id"]=> int(2951) ["email"]=> string(24) "monakoi.albert@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2639) ["seq"]=> int(19) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Szabó" ["hu_HU"]=> string(6) "Szabó" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Albert" ["hu_HU"]=> string(6) "Albert" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(13) "United States" [1]=> string(8) "strategy" [2]=> string(14) "defense policy" [3]=> string(13) "sequestration" [4]=> string(9) "financing" } ["en_US"]=> array(5) { [0]=> string(13) "United States" [1]=> string(8) "strategy" [2]=> string(14) "defense policy" [3]=> string(13) "sequestration" [4]=> string(9) "financing" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#829 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20742) ["id"]=> int(1787) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2639) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#120 (6) { ["_data"]=> array(29) { ["id"]=> int(2640) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2014-03-31" ["lastModified"]=> string(19) "2021-12-03 13:44:11" ["sectionId"]=> int(38) ["seq"]=> int(20) ["submissionId"]=> int(2519) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(189) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "229-233" ["pub-id::doi"]=> string(24) "10.32565/aarms.2014.1.20" ["abstract"]=> array(2) { ["en_US"]=> string(361) "

In 2013 December, the SOMOS Environmental Protection Ltd. and the ELTE Eötvös Publishing Company published a new book dedicated to the safety of nuclear reactors and having analogous title (“Nuclear reactor safety”). For the readers of Academic and Applied Research in Military Science we want to present some considerations for reviewing the book.

" ["hu_HU"]=> string(361) "

In 2013 December, the SOMOS Environmental Protection Ltd. and the ELTE Eötvös Publishing Company published a new book dedicated to the safety of nuclear reactors and having analogous title (“Nuclear reactor safety”). For the readers of Academic and Applied Research in Military Science we want to present some considerations for reviewing the book.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(43) "Thoughts on the Book Nuclear Reactor Safety" ["hu_HU"]=> string(43) "Thoughts on the Book Nuclear Reactor Safety" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#842 (6) { ["_data"]=> array(15) { ["id"]=> int(2952) ["email"]=> string(25) "csurgai.jozsef@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2640) ["seq"]=> int(20) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Csurgai" ["hu_HU"]=> string(7) "Csurgai" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "József" ["hu_HU"]=> string(7) "József" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#838 (6) { ["_data"]=> array(15) { ["id"]=> int(2953) ["email"]=> string(22) "mate.solymosi@somos.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2640) ["seq"]=> int(20) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Solymosi" ["hu_HU"]=> string(8) "Solymosi" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Máté" ["hu_HU"]=> string(6) "Máté" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(22) "nuclear reactor safety" [1]=> string(46) "operation and construction of nuclear reactors" [2]=> string(14) "safe operation" [3]=> string(17) "safety assessment" [4]=> string(38) "legal regulation of the reactor safety" } ["en_US"]=> array(5) { [0]=> string(22) "nuclear reactor safety" [1]=> string(46) "operation and construction of nuclear reactors" [2]=> string(14) "safe operation" [3]=> string(17) "safety assessment" [4]=> string(38) "legal regulation of the reactor safety" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#839 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20743) ["id"]=> int(1788) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2640) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF