Full Issue

Archive

object(Publication)#697 (6) { ["_data"]=> array(27) { ["id"]=> int(258) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2019-11-25" ["lastModified"]=> string(19) "2022-02-08 15:19:26" ["primaryContactId"]=> int(359) ["sectionId"]=> int(38) ["seq"]=> int(1) ["submissionId"]=> int(323) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2019) ["issueId"]=> int(47) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(6) "5–16" ["pub-id::doi"]=> string(23) "10.32565/aarms.2019.2.1" ["abstract"]=> array(2) { ["en_US"]=> string(1054) "

The paper aims to identify the existing state of affairs and relationships between Somalia and Ethiopia in the era of President Mohamed Abdullahi Farmajo, and the multiplicity of other states (Middle East and Turkey) with vested interests in Somalia that might radicalize diplomatic relations following the 2017 election.
Rival foreign countries present in the Horn of Africa that sought hegemonic dominance, including the USA, China, Turkey, Russia, and the Middle East, watched the political changes that took place in Somalia after the election of President Mohamed Abdullahi  Farmajo. However, upon taking the presidential oath, Farmajo’s leadership and foreign policy turned towards Turkey and Qatar as an alternative power to lean against in the event of pursuing his irredentist ambitions as was constantly outlined in his rhetorical speech before the election is now on the making. Nevertheless, the revolving question is, would it cause a brief hiatus or hype in Ethiopia’s regional hegemonic ambition?

" ["hu_HU"]=> string(1028) "

The paper aims to identify the existing state of affairs and relationships between Somalia and Ethiopia in the era of President Mohamed Abdullahi Farmajo, and the multiplicity of other states (Middle East and Turkey) with vested interests in Somalia that might radicalize diplomatic relations following the 2017 election.
Rival foreign countries present in the Horn of Africa that sought hegemonic dominance, including the USA, China, Turkey, Russia, and the Middle East, watched the political changes that took place in Somalia after the election of President Mohamed Abdullahi  Farmajo. However, upon taking the presidential oath, Farmajo’s leadership and foreign policy turned towards Turkey and Qatar as an alternative power to lean against in the event of pursuing his irredentist ambitions as was constantly outlined in his rhetorical speech before the election is now on the making. Nevertheless, the revolving question is, would it cause a brief hiatus or hype in Ethiopia’s regional hegemonic ambition?

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(57) "AARMS - Academic and Applied Research in Military Science" ["hu_HU"]=> string(57) "AARMS - Academic and Applied Research in Military Science" } ["title"]=> array(2) { ["en_US"]=> string(90) "President Farmajo’s Election: A Brief Hiatus in Ethiopia’s Regional Hegemonic Ambition" ["hu_HU"]=> string(98) "President Farmajo’s Election: A Brief Hiatus or Hype in Ethiopia’s Regional Hegemonic Ambition" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#732 (6) { ["_data"]=> array(15) { ["id"]=> int(359) ["email"]=> string(21) "dhagaweyne3@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(258) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "ET" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Sheikh" ["hu_HU"]=> string(6) "Sheikh" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Ali Abdi" ["hu_HU"]=> string(8) "Ali Abdi" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["en_US"]=> array(6) { [0]=> string(8) "Ethiopia" [1]=> string(7) "Somalia" [2]=> string(8) "election" [3]=> string(8) "rhetoric" [4]=> string(8) "relation" [5]=> string(8) "hegemony" } ["hu_HU"]=> array(6) { [0]=> string(8) "Ethiopia" [1]=> string(7) "Somalia" [2]=> string(8) "election" [3]=> string(8) "rhetoric" [4]=> string(8) "relation" [5]=> string(8) "hegemony" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#745 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4605) ["id"]=> int(204) ["isApproved"]=> bool(true) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(258) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#121 (6) { ["_data"]=> array(27) { ["id"]=> int(562) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2019-11-25" ["lastModified"]=> string(19) "2022-02-14 15:45:35" ["primaryContactId"]=> int(805) ["sectionId"]=> int(38) ["seq"]=> int(2) ["submissionId"]=> int(694) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2019) ["issueId"]=> int(47) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "17–29" ["pub-id::doi"]=> string(23) "10.32565/aarms.2019.2.2" ["abstract"]=> array(2) { ["en_US"]=> string(505) "

To achieve integrity requires continuous attention, it is not a coincidence that integrity in Hungarian is often used together in one phrase with “development”. If integrity is regarded identical with the perfection in the quotation above, it gets even more manifested that its realization or at least approaching it—needs continuous actions and studies.
The study presents the appearance of integrity concept and the experience of the integrity management’s implementation in Hungary.

" ["hu_HU"]=> string(505) "

To achieve integrity requires continuous attention, it is not a coincidence that integrity in Hungarian is often used together in one phrase with “development”. If integrity is regarded identical with the perfection in the quotation above, it gets even more manifested that its realization or at least approaching it—needs continuous actions and studies.
The study presents the appearance of integrity concept and the experience of the integrity management’s implementation in Hungary.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(57) "AARMS - Academic and Applied Research in Military Science" ["hu_HU"]=> string(57) "AARMS - Academic and Applied Research in Military Science" } ["title"]=> array(2) { ["en_US"]=> string(82) "The Implementation and Experience of Integrity Management in Public Administration" ["hu_HU"]=> string(82) "The Implementation and Experience of Integrity Management in Public Administration" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(805) ["email"]=> string(20) "dargay.e@hotmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(562) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Dargay" ["hu_HU"]=> string(6) "Dargay" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Eszter" ["hu_HU"]=> string(6) "Eszter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(21) "public administration" [1]=> string(20) "integrity management" [2]=> string(21) "corruption-prevention" [3]=> string(33) "public administration development" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#761 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4614) ["id"]=> int(353) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(562) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(27) { ["id"]=> int(160) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2019-11-25" ["lastModified"]=> string(19) "2022-02-14 15:45:08" ["primaryContactId"]=> int(230) ["sectionId"]=> int(38) ["seq"]=> int(3) ["submissionId"]=> int(210) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2019) ["issueId"]=> int(47) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "31–38" ["pub-id::doi"]=> string(23) "10.32565/aarms.2019.2.3" ["abstract"]=> array(2) { ["en_US"]=> string(858) "

According to Liddell Hart: “He [Mao] progressively developed his guerrillas into regular forces, while exploiting a combination of the two forms of warfare.” [1: 363] Mao Tse-tung is considered to be one of the most determinative of all guerrilla warfare theoreticians, whose works and ideas in the field of military science had a great impact on irregular warfare during the Cold War and they still continue to do so nowadays. One of the most famous followers of the Chinese revolutionary was Vo Nguyen Giap, under whose military leadership the Vietnamese defeated both the French and the Americans. Based on primary resources, this essay summarises the most significant ideas on guerrilla/partisan warfare by the two military theoreticians. This essay was supported by the János Bolyai Research Scholarship of the Hungarian Academy of Sciences.

" ["hu_HU"]=> string(858) "

According to Liddell Hart: “He [Mao] progressively developed his guerrillas into regular forces, while exploiting a combination of the two forms of warfare.” [1: 363] Mao Tse-tung is considered to be one of the most determinative of all guerrilla warfare theoreticians, whose works and ideas in the field of military science had a great impact on irregular warfare during the Cold War and they still continue to do so nowadays. One of the most famous followers of the Chinese revolutionary was Vo Nguyen Giap, under whose military leadership the Vietnamese defeated both the French and the Americans. Based on primary resources, this essay summarises the most significant ideas on guerrilla/partisan warfare by the two military theoreticians. This essay was supported by the János Bolyai Research Scholarship of the Hungarian Academy of Sciences.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(57) "AARMS - Academic and Applied Research in Military Science" ["hu_HU"]=> string(57) "AARMS - Academic and Applied Research in Military Science" } ["title"]=> array(2) { ["en_US"]=> string(36) "Mao and Giap on the Partisan Warfare" ["hu_HU"]=> string(36) "Mao and Giap on the Partisan Warfare" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#765 (6) { ["_data"]=> array(15) { ["id"]=> int(230) ["email"]=> string(25) "forgacs.balazs@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(160) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Forgács" ["hu_HU"]=> string(8) "Forgács" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Balázs" ["hu_HU"]=> string(7) "Balázs" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(11) "Mao Ce-tung" [1]=> string(14) "Vo Nguyen Giap" [2]=> string(17) "guerrilla warfare" } ["en_US"]=> array(3) { [0]=> string(12) "Mao Tse-tung" [1]=> string(14) "Vo Nguyen Giap" [2]=> string(17) "guerrilla warfare" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#735 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4607) ["id"]=> int(349) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(160) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#189 (6) { ["_data"]=> array(27) { ["id"]=> int(1155) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2019-06-30" ["lastModified"]=> string(19) "2022-02-14 15:44:48" ["sectionId"]=> int(38) ["seq"]=> int(4) ["submissionId"]=> int(1039) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(47) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "39–56" ["pub-id::doi"]=> string(23) "10.32565/aarms.2019.2.4" ["abstract"]=> array(2) { ["en_US"]=> string(581) "

The paper discusses a new experimental investigation and analysis method conducted in the field of terminal ballistics based on shooting experiments. The shooting was performed with the aim of determining the geometry of the spall cone caused by the spallation on both sides of the target armour plate when a bullet is penetrating through it. During the measurement, armour plates made of different materials with different thickness were shot through using different bullets. The influence of the armour material type and its thickness on the spall generation was examined.

" ["hu_HU"]=> string(581) "

The paper discusses a new experimental investigation and analysis method conducted in the field of terminal ballistics based on shooting experiments. The shooting was performed with the aim of determining the geometry of the spall cone caused by the spallation on both sides of the target armour plate when a bullet is penetrating through it. During the measurement, armour plates made of different materials with different thickness were shot through using different bullets. The influence of the armour material type and its thickness on the spall generation was examined.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(107) "Experimental Investigation and Statistical Analysis for Spallation Characteristics of Ballistic Penetration" ["hu_HU"]=> string(107) "Experimental Investigation and Statistical Analysis for Spallation Characteristics of Ballistic Penetration" } ["locale"]=> string(5) "en_US" ["authors"]=> array(4) { [0]=> object(Author)#762 (6) { ["_data"]=> array(15) { ["id"]=> int(1184) ["email"]=> string(26) "gyarmati.jozsef@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1155) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-7594-2383" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Gyarmati" ["hu_HU"]=> string(8) "Gyarmati" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "József" ["hu_HU"]=> string(7) "József" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#766 (6) { ["_data"]=> array(15) { ["id"]=> int(1186) ["email"]=> string(23) "gavay.gyorgy@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1155) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-0632-5650" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Gávay" ["hu_HU"]=> string(6) "Gávay" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "György" ["hu_HU"]=> string(7) "György" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#770 (6) { ["_data"]=> array(15) { ["id"]=> int(1187) ["email"]=> string(23) "hajdu.ferenc@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1155) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-0449-7678" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Hajdú" ["hu_HU"]=> string(6) "Hajdú" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Ferenc" ["hu_HU"]=> string(6) "Ferenc" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [3]=> object(Author)#763 (6) { ["_data"]=> array(15) { ["id"]=> int(1185) ["email"]=> string(19) "zentay@manuf.bme.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1155) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Zentay" ["hu_HU"]=> string(6) "Zentay" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Péter" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(18) "armour penetration" [1]=> string(22) "armour piercing bullet" [2]=> string(19) "spall cone geometry" [3]=> string(32) "experimental terminal ballistics" [4]=> string(20) "statistical analysis" } ["en_US"]=> array(5) { [0]=> string(18) "armour penetration" [1]=> string(22) "armour piercing bullet" [2]=> string(19) "spall cone geometry" [3]=> string(32) "experimental terminal ballistics" [4]=> string(20) "statistical analysis" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#746 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4631) ["id"]=> int(362) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1155) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#118 (6) { ["_data"]=> array(27) { ["id"]=> int(182) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2019-11-25" ["lastModified"]=> string(19) "2022-02-14 15:44:12" ["primaryContactId"]=> int(263) ["sectionId"]=> int(38) ["seq"]=> int(5) ["submissionId"]=> int(237) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2019) ["issueId"]=> int(47) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "57–63" ["pub-id::doi"]=> string(23) "10.32565/aarms.2019.2.5" ["abstract"]=> array(2) { ["en_US"]=> string(1061) "

Small size wastewater treatment plants are widely used as a decentralised treatment solution in regions, where the access to the sewer system is not available or the connection to an existing system is not economically sound like in small communities (e.g. schools, hospitals, army camps, etc.). The local treatment of wastewater can be performed by small size units applying activated sludge or attached growth biomass. In this paper the performance and operation of a process unit applying conventional activated sludge is analysed. For this purpose, a simulation tool with mass balance modelling was used. In the model, various influent wastewater qualities were set in order to examine their effect on each process. Operational parameters were fine-tuned to increase the capacity by utilising additional aeration. As a result, it can be stated that the nominal capacity of the treatment unit is overestimated; in the Central European region, due to the wastewater characteristics, the examined treatment unit could handle 40% of the nominal capacity.

" ["hu_HU"]=> string(1061) "

Small size wastewater treatment plants are widely used as a decentralised treatment solution in regions, where the access to the sewer system is not available or the connection to an existing system is not economically sound like in small communities (e.g. schools, hospitals, army camps, etc.). The local treatment of wastewater can be performed by small size units applying activated sludge or attached growth biomass. In this paper the performance and operation of a process unit applying conventional activated sludge is analysed. For this purpose, a simulation tool with mass balance modelling was used. In the model, various influent wastewater qualities were set in order to examine their effect on each process. Operational parameters were fine-tuned to increase the capacity by utilising additional aeration. As a result, it can be stated that the nominal capacity of the treatment unit is overestimated; in the Central European region, due to the wastewater characteristics, the examined treatment unit could handle 40% of the nominal capacity.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(57) "AARMS - Academic and Applied Research in Military Science" ["hu_HU"]=> string(57) "AARMS - Academic and Applied Research in Military Science" } ["title"]=> array(2) { ["en_US"]=> string(109) "Reduction of Environmental Pollution Applying Decentralised Wastewater Treatment Systems in Small Communities" ["hu_HU"]=> string(109) "Reduction of Environmental Pollution Applying Decentralised Wastewater Treatment Systems in Small Communities" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#773 (6) { ["_data"]=> array(15) { ["id"]=> int(263) ["email"]=> string(24) "Karches.Tamas@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(182) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(36) "http://orcid.org/0000-0003-2347-3559" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(37) "National University of Public Service" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(26) "

associate professor

" ["hu_HU"]=> string(24) "

főiskolai docens

" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Karches" ["hu_HU"]=> string(7) "Karches" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Tamás" ["hu_HU"]=> string(6) "Tamás" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["en_US"]=> array(5) { [0]=> string(16) "activated sludge" [1]=> string(20) "decentralized system" [2]=> string(22) "mass balance modelling" [3]=> string(8) "sewerage" [4]=> string(20) "wastewater treatment" } ["hu_HU"]=> array(5) { [0]=> string(16) "activated sludge" [1]=> string(20) "decentralized system" [2]=> string(22) "mass balance modelling" [3]=> string(8) "sewerage" [4]=> string(20) "wastewater treatment" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#776 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4628) ["id"]=> int(360) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(182) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#115 (6) { ["_data"]=> array(27) { ["id"]=> int(1153) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2019-06-30" ["lastModified"]=> string(19) "2022-02-14 15:43:51" ["sectionId"]=> int(38) ["seq"]=> int(6) ["submissionId"]=> int(1037) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(47) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "65–76" ["pub-id::doi"]=> string(23) "10.32565/aarms.2019.2.6" ["abstract"]=> array(2) { ["en_US"]=> string(1153) "

Cyberspace and its services and the digital-based processes affect all segments of our lives. These effects are felt in the economy, politics, culture, but also in individual elements of our private life and in people’s relationships, as well. Accordingly, one of the biggest challenges for cyber security is that we highly depend on these services. Most of the countries have realised that today cyber security is one of the essential parts of their national security. Its reason is twofold. Firstly, the digital ecosystem is vital for a nation and this ecosystem cannot work properly without cyber security, secondly there is no alternatives to avoid the aforementioned dependence. As a result, cyberspace and its security are of decisive importance to countries with advanced information infrastructures. However, national cyber security strategies, whether they are made by big powers or small countries, have different answers to the challenges of cyberspace. At first, this paper focuses on these challenges and then tries to identify some unified elements which could be the main pillars of an effective national cyber security strategy.

" ["hu_HU"]=> string(1153) "

Cyberspace and its services and the digital-based processes affect all segments of our lives. These effects are felt in the economy, politics, culture, but also in individual elements of our private life and in people’s relationships, as well. Accordingly, one of the biggest challenges for cyber security is that we highly depend on these services. Most of the countries have realised that today cyber security is one of the essential parts of their national security. Its reason is twofold. Firstly, the digital ecosystem is vital for a nation and this ecosystem cannot work properly without cyber security, secondly there is no alternatives to avoid the aforementioned dependence. As a result, cyberspace and its security are of decisive importance to countries with advanced information infrastructures. However, national cyber security strategies, whether they are made by big powers or small countries, have different answers to the challenges of cyberspace. At first, this paper focuses on these challenges and then tries to identify some unified elements which could be the main pillars of an effective national cyber security strategy.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(41) "National Cybersecurity Strategy Framework" ["hu_HU"]=> string(41) "National Cybersecurity Strategy Framework" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#780 (6) { ["_data"]=> array(15) { ["id"]=> int(1183) ["email"]=> string(24) "kovacs.laszlo@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1153) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-6403-0650" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Kovács" ["hu_HU"]=> string(7) "Kovács" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "László" ["hu_HU"]=> string(8) "László" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(14) "cyber security" [1]=> string(8) "strategy" [2]=> string(17) "national security" } ["en_US"]=> array(3) { [0]=> string(14) "cyber security" [1]=> string(8) "strategy" [2]=> string(17) "national security" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#771 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4629) ["id"]=> int(361) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1153) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#769 (6) { ["_data"]=> array(27) { ["id"]=> int(563) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2019-11-25" ["lastModified"]=> string(19) "2022-02-14 15:43:16" ["primaryContactId"]=> int(806) ["sectionId"]=> int(38) ["seq"]=> int(7) ["submissionId"]=> int(695) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2019) ["issueId"]=> int(47) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "77–86" ["pub-id::doi"]=> string(23) "10.32565/aarms.2019.2.7" ["abstract"]=> array(2) { ["en_US"]=> string(961) "

The article deals with the issue of increasing resilience of the territory by reducing its vulnerability to natural hazards. The present state of the issue is focused on the analysis of the United Nations’ involvement in disaster response where organising World Conferences on Disaster Risk Reduction is viewed as a key moment. Subsequently, tools used for assessing the vulnerability and resilience to disasters are examined.
Based on the results of the current state of knowledge and deficiencies in the concerned area, a process has been proposed to evaluate the vulnerability and risk of the territory to the occurrence of natural hazards with the aim of ensuring acceptable area safety.
Applicability of the proposed process of the vulnerability and risk assessment of the territory to natural hazards is presented on an example of a municipality. Verification on the selected municipality has proven the merit of the proposed procedure.

" ["hu_HU"]=> string(961) "

The article deals with the issue of increasing resilience of the territory by reducing its vulnerability to natural hazards. The present state of the issue is focused on the analysis of the United Nations’ involvement in disaster response where organising World Conferences on Disaster Risk Reduction is viewed as a key moment. Subsequently, tools used for assessing the vulnerability and resilience to disasters are examined.
Based on the results of the current state of knowledge and deficiencies in the concerned area, a process has been proposed to evaluate the vulnerability and risk of the territory to the occurrence of natural hazards with the aim of ensuring acceptable area safety.
Applicability of the proposed process of the vulnerability and risk assessment of the territory to natural hazards is presented on an example of a municipality. Verification on the selected municipality has proven the merit of the proposed procedure.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(57) "AARMS - Academic and Applied Research in Military Science" ["hu_HU"]=> string(57) "AARMS - Academic and Applied Research in Military Science" } ["title"]=> array(2) { ["en_US"]=> string(64) "Resilience of the Territory to the Occurrence of Natural Hazards" ["hu_HU"]=> string(64) "Resilience of the Territory to the Occurrence of Natural Hazards" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#779 (6) { ["_data"]=> array(15) { ["id"]=> int(806) ["email"]=> string(23) "alena.oulehlova@unob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(563) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(37) "https://orcid.org/0000-0003-1685-5137" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(78) "Crisis Management Group, University of Defence, Faculty of Military Leadership" ["hu_HU"]=> string(84) "Crisis Management Group, University of Defence Bruno, Faculty of Military Leadership" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Oulehlova" ["hu_HU"]=> string(9) "Oulehlova" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Alena" ["hu_HU"]=> string(5) "Alena" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["en_US"]=> array(5) { [0]=> string(8) "disaster" [1]=> string(12) "municipality" [2]=> string(10) "resilience" [3]=> string(4) "risk" [4]=> string(24) "vulnerability assessment" } ["hu_HU"]=> array(5) { [0]=> string(8) "disaster" [1]=> string(12) "municipality" [2]=> string(10) "resilience" [3]=> string(4) "risk" [4]=> string(24) "vulnerability assessment" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#778 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4606) ["id"]=> int(348) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(563) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#743 (6) { ["_data"]=> array(27) { ["id"]=> int(197) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2019-06-30" ["lastModified"]=> string(19) "2022-02-14 15:42:50" ["primaryContactId"]=> int(279) ["sectionId"]=> int(38) ["seq"]=> int(8) ["submissionId"]=> int(252) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2020) ["issueId"]=> int(47) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(8) "87–100" ["pub-id::doi"]=> string(23) "10.32565/aarms.2019.2.8" ["abstract"]=> array(2) { ["en_US"]=> string(592) "

The study examines Turkish foreign policy in the Black Sea region after the Russian annexation of Crimea. It focuses on two main issues: Turkey’s policies within NATO and its balancing actions vis-à-vis Russia. The paper concludes that in spite of the sporadic Western criticism Ankara is still committed to NATO. Nonetheless, Turkey has taken only limited balancing actions to counter the Russian threat. Ankara evaluates and prioritizes threats often very differently from its Western partners, and considers certain balancing steps ineffective or too costly at a specific moment.

" ["hu_HU"]=> string(592) "

The study examines Turkish foreign policy in the Black Sea region after the Russian annexation of Crimea. It focuses on two main issues: Turkey’s policies within NATO and its balancing actions vis-à-vis Russia. The paper concludes that in spite of the sporadic Western criticism Ankara is still committed to NATO. Nonetheless, Turkey has taken only limited balancing actions to counter the Russian threat. Ankara evaluates and prioritizes threats often very differently from its Western partners, and considers certain balancing steps ineffective or too costly at a specific moment.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["title"]=> array(2) { ["en_US"]=> string(58) "Is Turkey Still a Reliable Ally? The Case of the Black Sea" ["hu_HU"]=> string(58) "Is Turkey Still a Reliable Ally? The Case of the Black Sea" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#788 (6) { ["_data"]=> array(15) { ["id"]=> int(279) ["email"]=> string(28) "nikolett.penzvalto@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(197) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(60) "Nemzeti Közszolgálati Egyetem Hadtudományi Doktori Iskola" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(12) "Pénzváltó" ["hu_HU"]=> string(12) "Pénzváltó" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Nikolett" ["hu_HU"]=> string(8) "Nikolett" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(6) "Turkey" [1]=> string(9) "Black Sea" [2]=> string(4) "NATO" [3]=> string(6) "Russia" } ["en_US"]=> array(4) { [0]=> string(6) "Turkey" [1]=> string(9) "Black Sea" [2]=> string(4) "NATO" [3]=> string(6) "Russia" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#782 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4616) ["id"]=> int(355) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(197) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#774 (6) { ["_data"]=> array(27) { ["id"]=> int(1145) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2019-06-30" ["lastModified"]=> string(19) "2022-02-14 15:42:26" ["sectionId"]=> int(38) ["seq"]=> int(9) ["submissionId"]=> int(1029) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(47) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(9) "101–116" ["pub-id::doi"]=> string(23) "10.32565/aarms.2019.2.9" ["abstract"]=> array(2) { ["en_US"]=> string(974) "

There is an economic and political need to learn and know more and more information about customers, and the social media has recently become the most powerful tool for interaction with people. Customers became users in the social media, who express their opinion and share it with not only companies but also other users. Since a huge amount of reviews, opinions and comments appeared, there is a necessity to extract, aggregate, and analyse them; these are the aims of sentiment analysis. In this paper the technological details of sentiment analysis are presented. The problem types and their solution with text mining are described. Text mining is based on data mining, but steps of text preprocessing with tokenisation, stemming, filtering is an additional important phase before the data mining procedure. The correctness of sentiment analysis solutions can be measured by different validation methods. At the end of the paper the final conclusion is presented.

" ["hu_HU"]=> string(974) "

There is an economic and political need to learn and know more and more information about customers, and the social media has recently become the most powerful tool for interaction with people. Customers became users in the social media, who express their opinion and share it with not only companies but also other users. Since a huge amount of reviews, opinions and comments appeared, there is a necessity to extract, aggregate, and analyse them; these are the aims of sentiment analysis. In this paper the technological details of sentiment analysis are presented. The problem types and their solution with text mining are described. Text mining is based on data mining, but steps of text preprocessing with tokenisation, stemming, filtering is an additional important phase before the data mining procedure. The correctness of sentiment analysis solutions can be measured by different validation methods. At the end of the paper the final conclusion is presented.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(31) "Sentiment Analysis of Customers" ["hu_HU"]=> string(31) "Sentiment Analysis of Customers" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#785 (6) { ["_data"]=> array(15) { ["id"]=> int(1168) ["email"]=> string(17) "szucs@tmit.bme.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1145) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Szűcs" ["hu_HU"]=> string(6) "Szűcs" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Gábor" ["hu_HU"]=> string(6) "Gábor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(18) "sentiment analysis" [1]=> string(18) "text preprocessing" [2]=> string(12) "social media" [3]=> string(11) "text mining" } ["en_US"]=> array(4) { [0]=> string(18) "sentiment analysis" [1]=> string(18) "text preprocessing" [2]=> string(12) "social media" [3]=> string(11) "text mining" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#787 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4608) ["id"]=> int(350) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1145) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF

Soft Factors of Economic Security

Csath Magdolna, Nagy Balázs, Taksás Balázs, Vinogradov Szergej, Pálfi Nóra, Fási Csaba
doi: 10.32565/aarms.2019.2.10
117–129.
object(Publication)#786 (6) { ["_data"]=> array(27) { ["id"]=> int(1148) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2019-06-30" ["lastModified"]=> string(19) "2022-02-14 15:41:52" ["sectionId"]=> int(38) ["seq"]=> int(10) ["submissionId"]=> int(1032) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(47) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(9) "117–129" ["pub-id::doi"]=> string(24) "10.32565/aarms.2019.2.10" ["abstract"]=> array(2) { ["en_US"]=> string(744) "

The importance of economic security has increased considerably in the last decades. It can be separated into the following two parts: security of ordinary operation and security of long-term development. In this article we are going to be dealing with the latter, especially the so-called soft factors which make up the basis of it. These factors are the human capital, social capital and territorial capital. With the assistance of the tree model of competitiveness, we are going to demonstrate how important these factors are from the aspect of long-term economic development and social stability. Since the means of altering them is quite difficult and slow, developing them requires a continuous, well-considered, conscious strategy.

" ["hu_HU"]=> string(744) "

The importance of economic security has increased considerably in the last decades. It can be separated into the following two parts: security of ordinary operation and security of long-term development. In this article we are going to be dealing with the latter, especially the so-called soft factors which make up the basis of it. These factors are the human capital, social capital and territorial capital. With the assistance of the tree model of competitiveness, we are going to demonstrate how important these factors are from the aspect of long-term economic development and social stability. Since the means of altering them is quite difficult and slow, developing them requires a continuous, well-considered, conscious strategy.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(33) "Soft Factors of Economic Security" ["hu_HU"]=> string(33) "Soft Factors of Economic Security" } ["locale"]=> string(5) "en_US" ["authors"]=> array(6) { [0]=> object(Author)#789 (6) { ["_data"]=> array(15) { ["id"]=> int(1172) ["email"]=> string(27) "mail@magdacsath.t-online.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1148) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-1975-1045" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Csath" ["hu_HU"]=> string(5) "Csath" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Magdolna" ["hu_HU"]=> string(8) "Magdolna" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#790 (6) { ["_data"]=> array(15) { ["id"]=> int(1175) ["email"]=> string(23) "nagybalazsphd@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1148) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-1229-4021" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Nagy" ["hu_HU"]=> string(4) "Nagy" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Balázs" ["hu_HU"]=> string(7) "Balázs" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#796 (6) { ["_data"]=> array(15) { ["id"]=> int(1177) ["email"]=> string(24) "taksas.balazs@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1148) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-7583-4198" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Taksás" ["hu_HU"]=> string(7) "Taksás" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Balázs" ["hu_HU"]=> string(7) "Balázs" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [3]=> object(Author)#768 (6) { ["_data"]=> array(15) { ["id"]=> int(1178) ["email"]=> string(30) "vinogradov.szergej@gtk.szie.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1148) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-6242-3063" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Vinogradov" ["hu_HU"]=> string(10) "Vinogradov" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Szergej" ["hu_HU"]=> string(7) "Szergej" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [4]=> object(Author)#799 (6) { ["_data"]=> array(15) { ["id"]=> int(1176) ["email"]=> string(19) "noripalfi@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1148) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Pálfi" ["hu_HU"]=> string(6) "Pálfi" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Nóra" ["hu_HU"]=> string(5) "Nóra" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [5]=> object(Author)#781 (6) { ["_data"]=> array(15) { ["id"]=> int(1174) ["email"]=> string(21) "fasi.csaba@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1148) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Fási" ["hu_HU"]=> string(5) "Fási" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Csaba" ["hu_HU"]=> string(5) "Csaba" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(17) "economic security" [1]=> string(15) "competitiveness" [2]=> string(13) "human capital" [3]=> string(14) "social capital" [4]=> string(19) "territorial capital" } ["en_US"]=> array(5) { [0]=> string(17) "economic security" [1]=> string(15) "competitiveness" [2]=> string(13) "human capital" [3]=> string(14) "social capital" [4]=> string(19) "territorial capital" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#794 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4622) ["id"]=> int(357) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1148) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF