Full Issue
Archive
The purpose of this research paper is to provide a better understanding of the challenges that a modern state faces in the current security environment. Given the emerging threat environment with innovative state and non-state actors willing to confront a modern state across a spectrum of activities, it is of vital importance to provide a clear picture for civil servants/employees of the state to best use the tools of good governance. Without a more robust employment of the whole-of-government resources and a holistic approach of the national security the modern state will not be able to counter such threats and seize, retain or exploit the strategic initiative.
" ["hu_HU"]=> string(677) "The purpose of this research paper is to provide a better understanding of the challenges that a modern state faces in the current security environment. Given the emerging threat environment with innovative state and non-state actors willing to confront a modern state across a spectrum of activities, it is of vital importance to provide a clear picture for civil servants/employees of the state to best use the tools of good governance. Without a more robust employment of the whole-of-government resources and a holistic approach of the national security the modern state will not be able to counter such threats and seize, retain or exploit the strategic initiative.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["title"]=> array(2) { ["en_US"]=> string(19) "Warfare and Society" ["hu_HU"]=> string(19) "Warfare and Society" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#732 (6) { ["_data"]=> array(15) { ["id"]=> int(1205) ["email"]=> string(31) "bakos.csaba.attila@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1172) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "A. Bakos " ["hu_HU"]=> string(9) "A. Bakos " } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Csaba" ["hu_HU"]=> string(5) "Csaba" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(3) "war" [1]=> string(7) "warfare" [2]=> string(7) "society" [3]=> string(7) "culture" } ["en_US"]=> array(4) { [0]=> string(3) "war" [1]=> string(7) "warfare" [2]=> string(7) "society" [3]=> string(7) "culture" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#745 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20026) ["id"]=> int(380) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1172) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The Role of Churches in Hungary in Providing Pastoral Care and Humanitarian Help for Migrants
The author is a Lutheran pastor with a Master’s Degree in International Relations. He is a Doctor of Military Science (PhD) and a senior staff member at the National University of Public Service, also holding the position of General Secretary of the Ecumenical Council of Churches in Hungary. The publication tackles the problem of how Protestant Churches have been involved in the migratory processes. The aim of this paper is to explore the core function of the humanitarian service provided by Protestant Churches and the Catholic Church in Hungary, with special regard to the ethnic and religious aspects of the refugee problem.
" ["hu_HU"]=> string(641) "The author is a Lutheran pastor with a Master’s Degree in International Relations. He is a Doctor of Military Science (PhD) and a senior staff member at the National University of Public Service, also holding the position of General Secretary of the Ecumenical Council of Churches in Hungary. The publication tackles the problem of how Protestant Churches have been involved in the migratory processes. The aim of this paper is to explore the core function of the humanitarian service provided by Protestant Churches and the Catholic Church in Hungary, with special regard to the ethnic and religious aspects of the refugee problem.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(93) "The Role of Churches in Hungary in Providing Pastoral Care and Humanitarian Help for Migrants" ["hu_HU"]=> string(93) "The Role of Churches in Hungary in Providing Pastoral Care and Humanitarian Help for Migrants" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(1206) ["email"]=> string(24) "fischl.vilmos@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1174) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Fischl" ["hu_HU"]=> string(6) "Fischl" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Vilmos" ["hu_HU"]=> string(6) "Vilmos" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(7) { [0]=> string(5) "Islam" [1]=> string(4) "west" [2]=> string(12) "civilization" [3]=> string(7) "refugee" [4]=> string(6) "church" [5]=> string(9) "migration" [6]=> string(12) "humanitarian" } ["en_US"]=> array(7) { [0]=> string(5) "Islam" [1]=> string(4) "west" [2]=> string(12) "civilization" [3]=> string(7) "refugee" [4]=> string(6) "church" [5]=> string(9) "migration" [6]=> string(12) "humanitarian" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#761 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21287) ["id"]=> int(381) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1174) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The aim of the publication is to examine and present the need and possibilities of using protected vehicles in the police and disaster management forces. One ofthequestions arising nowadays is what threats thepolice and disaster management forces are facing at the locations of terror attacks or environmental catastrophes. The reduction of the tűhreats is possible with choosing the appropriate vehicles and ensuring their proper usage.
" ["hu_HU"]=> string(445) "The aim of the publication is to examine and present the need and possibilities of using protected vehicles in the police and disaster management forces. One ofthequestions arising nowadays is what threats thepolice and disaster management forces are facing at the locations of terror attacks or environmental catastrophes. The reduction of the tűhreats is possible with choosing the appropriate vehicles and ensuring their proper usage.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(50) "Military Vehicles Used for Public Service Purposes" ["hu_HU"]=> string(50) "Military Vehicles Used for Public Service Purposes" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#115 (6) { ["_data"]=> array(15) { ["id"]=> int(1207) ["email"]=> string(23) "gavay.gyorgy@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1175) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) " Gávay" ["hu_HU"]=> string(7) " Gávay" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "György" ["hu_HU"]=> string(7) "György" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(14) "public service" [1]=> string(14) "terror attacks" [2]=> string(23) "protection requirements" [3]=> string(13) "MRAP vehicles" } ["en_US"]=> array(4) { [0]=> string(14) "public service" [1]=> string(14) "terror attacks" [2]=> string(23) "protection requirements" [3]=> string(13) "MRAP vehicles" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#737 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20028) ["id"]=> int(382) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1175) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }China: The New Key Protagonist of International Security
The People’s Republic of China has become one of the leading superpowers in the World; its capabilities to protect its interests embrace not only some regional areas of the Asian continent but practically the entire World. This heading has not only positive consequences but negative effects, as well. Obviously, there are many different fields where security risks can threaten the Chinese interests. One of the most important is that parallel to the growth of China as a great power, the exposure to terrorist threats against the Chinese colonies living around the World is also growing.
" ["hu_HU"]=> string(598) "The People’s Republic of China has become one of the leading superpowers in the World; its capabilities to protect its interests embrace not only some regional areas of the Asian continent but practically the entire World. This heading has not only positive consequences but negative effects, as well. Obviously, there are many different fields where security risks can threaten the Chinese interests. One of the most important is that parallel to the growth of China as a great power, the exposure to terrorist threats against the Chinese colonies living around the World is also growing.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(56) "China: The New Key Protagonist of International Security" ["hu_HU"]=> string(56) "China: The New Key Protagonist of International Security" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#762 (6) { ["_data"]=> array(15) { ["id"]=> int(1208) ["email"]=> string(25) "kasznar.attila@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1176) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Kasznár" ["hu_HU"]=> string(8) "Kasznár" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Attila" ["hu_HU"]=> string(6) "Attila" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(5) "China" [1]=> string(15) "security policy" [2]=> string(8) "religion" [3]=> string(6) "terror" [4]=> string(10) "superpower" [5]=> string(22) "international security" } ["en_US"]=> array(6) { [0]=> string(5) "China" [1]=> string(15) "security policy" [2]=> string(8) "religion" [3]=> string(6) "terror" [4]=> string(10) "superpower" [5]=> string(22) "international security" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#746 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20029) ["id"]=> int(383) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1176) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Australian defence and foreign policy experienced a great shift in 1942. From that year on, the nation began to think of itself as an independent entity, and a key player in Southeast Asia. The first armed conflict that Australian units participated in after the end of the Second World War was the Malayan Emergency, where all service branches contributed forces to the successful counterinsurgency war. The aim of this article is, firstly to look at the events and factors that initiated this shift in Australian policy, and secondly to analyse the forces the nation committed to fighting the Emergency. This analysis includes the fighting forces of the Royal Australian Air Force, the Army as well as the Navy.
" ["hu_HU"]=> string(720) "Australian defence and foreign policy experienced a great shift in 1942. From that year on, the nation began to think of itself as an independent entity, and a key player in Southeast Asia. The first armed conflict that Australian units participated in after the end of the Second World War was the Malayan Emergency, where all service branches contributed forces to the successful counterinsurgency war. The aim of this article is, firstly to look at the events and factors that initiated this shift in Australian policy, and secondly to analyse the forces the nation committed to fighting the Emergency. This analysis includes the fighting forces of the Royal Australian Air Force, the Army as well as the Navy.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(48) " Australian Involvement in the Malayan Emergency" ["hu_HU"]=> string(48) " Australian Involvement in the Malayan Emergency" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#768 (6) { ["_data"]=> array(15) { ["id"]=> int(1209) ["email"]=> string(26) "jozsef.ondrek.89@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1177) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-1831-5479" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Ondrék" ["hu_HU"]=> string(7) "Ondrék" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "József" ["hu_HU"]=> string(7) "József" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(8) { [0]=> string(6) "Malaya" [1]=> string(9) "Emergency" [2]=> string(9) "Australia" [3]=> string(6) "policy" [4]=> string(7) "defence" [5]=> string(9) "operation" [6]=> string(8) "Cold War" [7]=> string(14) "Southeast Asia" } ["en_US"]=> array(8) { [0]=> string(6) "Malaya" [1]=> string(9) "Emergency" [2]=> string(9) "Australia" [3]=> string(6) "policy" [4]=> string(7) "defence" [5]=> string(9) "operation" [6]=> string(8) "Cold War" [7]=> string(14) "Southeast Asia" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#767 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21639) ["id"]=> int(4786) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1177) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Fire, Rescue, Disaster Management. Experiences from Different Countries
On international level we can find various methods in the field of fire and disaster management interventions. Individual nations are trying to manage the activities related to firefighting, technical rescue, and, in some cases, healthcare on the basis of international trends but individually and at the highest quality possible. In this article, the author intends to present some syntheses of information that have already been published about the differences and some good practices of rescue organisations applying common, basically similar tools by taking an international outlook and studying various countries—including Hungary. The target countries are in Europe: Poland, Germany, the United Kingdom and Italy.
" ["hu_HU"]=> string(728) "On international level we can find various methods in the field of fire and disaster management interventions. Individual nations are trying to manage the activities related to firefighting, technical rescue, and, in some cases, healthcare on the basis of international trends but individually and at the highest quality possible. In this article, the author intends to present some syntheses of information that have already been published about the differences and some good practices of rescue organisations applying common, basically similar tools by taking an international outlook and studying various countries—including Hungary. The target countries are in Europe: Poland, Germany, the United Kingdom and Italy.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(72) "Fire, Rescue, Disaster Management. Experiences from Different Countries" ["hu_HU"]=> string(72) "Fire, Rescue, Disaster Management. Experiences from Different Countries" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#777 (6) { ["_data"]=> array(15) { ["id"]=> int(1210) ["email"]=> string(23) "pantya.peter@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1178) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Pántya" ["hu_HU"]=> string(7) "Pántya" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Péter" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(4) "fire" [1]=> string(6) "rescue" [2]=> string(19) "disaster management" [3]=> string(10) "experience" [4]=> string(13) "international" } ["en_US"]=> array(5) { [0]=> string(4) "fire" [1]=> string(6) "rescue" [2]=> string(19) "disaster management" [3]=> string(10) "experience" [4]=> string(13) "international" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#771 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20032) ["id"]=> int(385) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1178) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The OSCE and the Crisis in Ukraine. Focusing on the Theoretical Characteristics of the European Crisis Management. Concepts, Players, Tools, Vision
European security and defence policy is one of today’s main topics. One of the reasons for this, is the high number of operations conducted by the European players in regards to its crisis management. The second reason we can find in the actual substance. Testament to this is Europe’s fight for global peace and stability. To achieve this, the robust international presence is imperative. Especially in places, where following an armed conflict the state’s structure is destroyed and aiding the creation of the new political structure, as well as levelling the democratic playing field is needed. Operations conducted in crisis management are not limited to European ground only. In the creation of global and regional stability, which is paramount from Europe’s point of view due to its nature, a shift occurred: from military power to civilian power. This justifies the need to deal with European security, with particular regard to crisis management and international actors, including the OSCE and its role in Ukraine. I prefer this analysis to be a theoretical approach (thought provoking) than to fully present the Ukrainian crisis. And I look at it from the point of view of the OSCE.
" ["hu_HU"]=> string(1207) "European security and defence policy is one of today’s main topics. One of the reasons for this, is the high number of operations conducted by the European players in regards to its crisis management. The second reason we can find in the actual substance. Testament to this is Europe’s fight for global peace and stability. To achieve this, the robust international presence is imperative. Especially in places, where following an armed conflict the state’s structure is destroyed and aiding the creation of the new political structure, as well as levelling the democratic playing field is needed. Operations conducted in crisis management are not limited to European ground only. In the creation of global and regional stability, which is paramount from Europe’s point of view due to its nature, a shift occurred: from military power to civilian power. This justifies the need to deal with European security, with particular regard to crisis management and international actors, including the OSCE and its role in Ukraine. I prefer this analysis to be a theoretical approach (thought provoking) than to fully present the Ukrainian crisis. And I look at it from the point of view of the OSCE.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["title"]=> array(2) { ["en_US"]=> string(147) "The OSCE and the Crisis in Ukraine. Focusing on the Theoretical Characteristics of the European Crisis Management. Concepts, Players, Tools, Vision" ["hu_HU"]=> string(147) "The OSCE and the Crisis in Ukraine. Focusing on the Theoretical Characteristics of the European Crisis Management. Concepts, Players, Tools, Vision" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#781 (6) { ["_data"]=> array(15) { ["id"]=> int(1226) ["email"]=> string(20) "remek.eva@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1194) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-0403-8466" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Remek" ["hu_HU"]=> string(5) "Remek" } ["givenName"]=> array(2) { ["en_US"]=> string(4) "Éva" ["hu_HU"]=> string(4) "Éva" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(4) "OSCE" [1]=> string(7) "Ukraine" [2]=> string(26) "European Crisis Management" } ["en_US"]=> array(3) { [0]=> string(4) "OSCE" [1]=> string(7) "Ukraine" [2]=> string(26) "European Crisis Management" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#775 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21293) ["id"]=> int(399) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1194) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Life Sentence Without the Possibility of Parole. “We Do not Allow Them to Live, We Do not Let Them Die”
In the first part of our study (Serial Killers on the Other Side of the Bars: “Bestial Humans—Human Beasts”) we focused on the crimes committed by serial murderers, identified alternatives of classification and analysed their behavior within the prison walls. In the upcoming part, we will investigate international and domestic experiences related to the use of life without parole; review the way of life of those who have been sentenced to “life until death”; examine the punishment’s mechanics and impact and finally conduct an analysis of the present form of the notion “not allowing them to live, not letting them die”. The basis for this inquiry is the fact that currently, 67% of the serial killers serve a sentence of life without parole. [In Hungary, the practice of sentencing convicts to life without parole is regulated by the Criminal Code. In its principle, this form of punishment means that those who receive this sentence will never be released on parole (42. §). Article 46/A‒B of the Prison Code; however, it also introduces a mandatory clemency procedure for those who are serving a life sentence without parole. This procedure may be initiated after 40 years served.] Furthermore, we also endeavour to collect the characteristics of this sanction, evaluate related professional opinions and put forth a suggestion for an amendment, as well.
" ["hu_HU"]=> string(1388) "In the first part of our study (Serial Killers on the Other Side of the Bars: “Bestial Humans—Human Beasts”) we focused on the crimes committed by serial murderers, identified alternatives of classification and analysed their behavior within the prison walls. In the upcoming part, we will investigate international and domestic experiences related to the use of life without parole; review the way of life of those who have been sentenced to “life until death”; examine the punishment’s mechanics and impact and finally conduct an analysis of the present form of the notion “not allowing them to live, not letting them die”. The basis for this inquiry is the fact that currently, 67% of the serial killers serve a sentence of life without parole. [In Hungary, the practice of sentencing convicts to life without parole is regulated by the Criminal Code. In its principle, this form of punishment means that those who receive this sentence will never be released on parole (42. §). Article 46/A‒B of the Prison Code; however, it also introduces a mandatory clemency procedure for those who are serving a life sentence without parole. This procedure may be initiated after 40 years served.] Furthermore, we also endeavour to collect the characteristics of this sanction, evaluate related professional opinions and put forth a suggestion for an amendment, as well.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(107) "Life Sentence Without the Possibility of Parole. “We Do not Allow Them to Live, We Do not Let Them Die”" ["hu_HU"]=> string(107) "Life Sentence Without the Possibility of Parole. “We Do not Allow Them to Live, We Do not Let Them Die”" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#780 (6) { ["_data"]=> array(15) { ["id"]=> int(1229) ["email"]=> string(25) "ruzsonyi.peter@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1195) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Ruzsonyi" ["hu_HU"]=> string(8) "Ruzsonyi" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Péter" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(14) "serial killers" [1]=> string(19) "life without parole" [2]=> string(23) "international practices" [3]=> string(19) "time as a dimension" [4]=> string(17) "criminal-pedagogy" } ["en_US"]=> array(5) { [0]=> string(14) "serial killers" [1]=> string(19) "life without parole" [2]=> string(23) "international practices" [3]=> string(19) "time as a dimension" [4]=> string(17) "criminal-pedagogy" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#779 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20034) ["id"]=> int(401) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1195) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Security of E-Government Website Encryption in Germany and Hungary
The paper deals with comparative research of the communication security of e-Government services in Germany and Hungary. The focus point of the research is to analyse the cryptographic security algorithms and protocols which encrypt communication in the relations of the citizen and a governmental body. The analysis includes the general e-Government portals, central web services, and specialised services, like taxation and criminal record extracts. The actuality of the topic lies in the fact that the security of the citizens’ personal data, used, stored and transferred by the governmental bodies can be in danger. Two examples are the loss of 25 million UK citizens’ personal data in 2007 because of a failure of the UK Customs Service and the compromise personally identifiable information of 191 million US citizens, stored in the Voter Database in 2015. The goal of the research is to check the current practice used for governmental communication, based on international standards and current practices. The study compares the e-administration systems of a country of Central Europe which is considered less developed in e-government systems and processes than a Western European country. Based on the evaluation, which can be found at the end of this study, those persons who are responsible for the operation of such systems, can see the actual benchmarks of the communication security. So, this way they can learn about the usage of what communication protocols and cryptographic algorithms are recommended and under what settings.
" ["hu_HU"]=> string(1557) "The paper deals with comparative research of the communication security of e-Government services in Germany and Hungary. The focus point of the research is to analyse the cryptographic security algorithms and protocols which encrypt communication in the relations of the citizen and a governmental body. The analysis includes the general e-Government portals, central web services, and specialised services, like taxation and criminal record extracts. The actuality of the topic lies in the fact that the security of the citizens’ personal data, used, stored and transferred by the governmental bodies can be in danger. Two examples are the loss of 25 million UK citizens’ personal data in 2007 because of a failure of the UK Customs Service and the compromise personally identifiable information of 191 million US citizens, stored in the Voter Database in 2015. The goal of the research is to check the current practice used for governmental communication, based on international standards and current practices. The study compares the e-administration systems of a country of Central Europe which is considered less developed in e-government systems and processes than a Western European country. Based on the evaluation, which can be found at the end of this study, those persons who are responsible for the operation of such systems, can see the actual benchmarks of the communication security. So, this way they can learn about the usage of what communication protocols and cryptographic algorithms are recommended and under what settings.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(66) "Security of E-Government Website Encryption in Germany and Hungary" ["hu_HU"]=> string(66) "Security of E-Government Website Encryption in Germany and Hungary" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#789 (6) { ["_data"]=> array(15) { ["id"]=> int(1230) ["email"]=> string(26) "szadeczky.tamas@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1196) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Szádeczky" ["hu_HU"]=> string(10) "Szádeczky" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Tamás" ["hu_HU"]=> string(6) "Tamás" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(36) "Hypertext Transfer Protocol Security" [1]=> string(20) "information security" [2]=> string(24) "transport layer security" [3]=> string(31) "web-based governmental services" } ["en_US"]=> array(4) { [0]=> string(36) "Hypertext Transfer Protocol Security" [1]=> string(20) "information security" [2]=> string(24) "transport layer security" [3]=> string(31) "web-based governmental services" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#783 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20035) ["id"]=> int(402) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1196) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }In the early 1940s the first practically usable helicopters rose into the sky. Their importance was quickly recognised both by the military and civilian decision makers. A good summary of their most important advantage is the next quotation: “If you are in trouble anywhere in theworld, an airplane can fly over and drop flowers, but a helicopter can land and save your life.” (Igor Sikorsky, 1947) Just after their appearance it immediately became an urgent problem to replace the relatively low-power and heavy piston engines, forwhich the much lighter and more powerful turboshaft engines offered a good alternative. Significant improvement of helicopter engines, which has embodied mainly in power to weight ratio, thermal cycle efficiency, specific fuel consumption, together with reliability and maintainability, of course, has influenced the technicaltactical parameters of helicopters. In this paper I introduce the evolution of helicopter turboshaft engines, the most important manufacturers and engine types. Through statistical analysis I display what kind of performance parameters the helicopter turboshaft engines had in the past and have in the present days.
" ["hu_HU"]=> string(1184) "In the early 1940s the first practically usable helicopters rose into the sky. Their importance was quickly recognised both by the military and civilian decision makers. A good summary of their most important advantage is the next quotation: “If you are in trouble anywhere in theworld, an airplane can fly over and drop flowers, but a helicopter can land and save your life.” (Igor Sikorsky, 1947) Just after their appearance it immediately became an urgent problem to replace the relatively low-power and heavy piston engines, forwhich the much lighter and more powerful turboshaft engines offered a good alternative. Significant improvement of helicopter engines, which has embodied mainly in power to weight ratio, thermal cycle efficiency, specific fuel consumption, together with reliability and maintainability, of course, has influenced the technicaltactical parameters of helicopters. In this paper I introduce the evolution of helicopter turboshaft engines, the most important manufacturers and engine types. Through statistical analysis I display what kind of performance parameters the helicopter turboshaft engines had in the past and have in the present days.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(37) "Power Sources of Military Helicopters" ["hu_HU"]=> string(37) "Power Sources of Military Helicopters" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#786 (6) { ["_data"]=> array(15) { ["id"]=> int(1231) ["email"]=> string(21) "varga.bela@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1198) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Varga" ["hu_HU"]=> string(5) "Varga" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Béla" ["hu_HU"]=> string(5) "Béla" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(7) { [0]=> string(30) "helicopter gas turbine engines" [1]=> string(10) "turboshaft" [2]=> string(11) "shaft power" [3]=> string(25) "specific fuel consumption" [4]=> string(18) "thermal efficiency" [5]=> string(24) "specific net work output" [6]=> string(14) "specific power" } ["en_US"]=> array(7) { [0]=> string(30) "helicopter gas turbine engines" [1]=> string(10) "turboshaft" [2]=> string(11) "shaft power" [3]=> string(25) "specific fuel consumption" [4]=> string(18) "thermal efficiency" [5]=> string(24) "specific net work output" [6]=> string(14) "specific power" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#787 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21294) ["id"]=> int(403) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1198) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Comparison of Fastening Methods of Military Vehicles on Railway Freight Wagons Using Fastening Straps
The paper identifies possible ways of fastening military vehicles on rail freight wagons using textile fastening straps and then compares particular methods. The comparison includes, besides used methods—diagonal lashing and V-shape diagonal lashing, the previously used method of lashing—slope lashing, which is currently not allowed to use. To calculate the inertia forces affecting the cargo, respectively the fastening straps, appropriate methods in accordance with EN 12195–1 have been chosen. In the discussion part, recommendations in relation to the fastening of military vehicles on rail freight wagons are introduced.
" ["hu_HU"]=> string(640) "The paper identifies possible ways of fastening military vehicles on rail freight wagons using textile fastening straps and then compares particular methods. The comparison includes, besides used methods—diagonal lashing and V-shape diagonal lashing, the previously used method of lashing—slope lashing, which is currently not allowed to use. To calculate the inertia forces affecting the cargo, respectively the fastening straps, appropriate methods in accordance with EN 12195–1 have been chosen. In the discussion part, recommendations in relation to the fastening of military vehicles on rail freight wagons are introduced.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(101) "Comparison of Fastening Methods of Military Vehicles on Railway Freight Wagons Using Fastening Straps" ["hu_HU"]=> string(101) "Comparison of Fastening Methods of Military Vehicles on Railway Freight Wagons Using Fastening Straps" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#743 (6) { ["_data"]=> array(15) { ["id"]=> int(1234) ["email"]=> string(23) "martin.vlkovsky@unob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1200) ["seq"]=> int(11) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Vlkovský" ["hu_HU"]=> string(9) "Vlkovský" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Martin" ["hu_HU"]=> string(6) "Martin" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(9) "fastening" [1]=> string(16) "fastening straps" [2]=> string(14) "inertia forces" [3]=> string(22) "railway freight wagons" } ["en_US"]=> array(4) { [0]=> string(9) "fastening" [1]=> string(16) "fastening straps" [2]=> string(14) "inertia forces" [3]=> string(22) "railway freight wagons" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#791 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20041) ["id"]=> int(405) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1200) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Correlation Between the Relation to Work and Social Intelligence Among the Mayors in the Slovak Republic
The aim was to identify the relationship between the relation to work and social intelligence according to its individual factors. The subject of the research was the mayors of municipalities in Slovakia. The survey was attended by 787 mayors from a total of 2,753 (28.5%). To obtain the empirical data, a standardized social intelligence questionnaire based on MESI’s psychometric approach was used, and the questionnaire finds a relationship with Job Satisfaction Instrument (JSI). The results of the research were processed using the SPSS 21 statistical software. To test the nature of relationships and dependencies between variables and to test the tightness of the relationship between the studied variables, a correlation analysis was used using the Pearson correlation coefficient, which expresses the degree of tightness of the linear relationship between the two (interval) variables.
Research has found that the higher the rate of social irritability the mayor has,
the more positive is his relationship to the job.
The aim was to identify the relationship between the relation to work and social intelligence according to its individual factors. The subject of the research was the mayors of municipalities in Slovakia. The survey was attended by 787 mayors from a total of 2,753 (28.5%). To obtain the empirical data, a standardized social intelligence questionnaire based on MESI’s psychometric approach was used, and the questionnaire finds a relationship with Job Satisfaction Instrument (JSI). The results of the research were processed using the SPSS 21 statistical software. To test the nature of relationships and dependencies between variables and to test the tightness of the relationship between the studied variables, a correlation analysis was used using the Pearson correlation coefficient, which expresses the degree of tightness of the linear relationship between the two (interval) variables.
Research has found that the higher the rate of social irritability the mayor has,
the more positive is his relationship to the job.