At present, the TRL scale is used as an instrument in decision making regarding investments in research and development also at EU level. This requires different methods to make this instrument operational by adjusting (or understanding) TRL definitions. The scale must be adapted to the specific purpose of the funding by the EU of CDI programmes, because it does not approach the feedback mechanisms that are part of the innovation processes. This paper analyses conceptually and contextually the TRL scale also used in acquisitions of military equipment, in order to emphasize the necessity of the scale so that it corresponds to the purpose of the European decision makers.
Every decision poses risks, and it is necessary for them to be known. Some may be avoided, others may be diminished, and with others the management will need to become accustomed and avoided and are predominantly related to the external environment. For this reason, the risk can be approached as a variation of the results under the pressure of the environment of the activity. Based on these considerations, the paper addresses the risk in terms of its definition based on the literature and presents some essential aspects regarding the fundamental categories of risks from the point of view of managerial utility. Based on a selective scientific research carried out on a sample of entities in the Centre Region, the paper captures the degree to which managers are interested in capitalizing the accounting information for knowing the risks.
Annamaria Sârbu, Simona Miclăuş, Paul Bechet and Iulian Bouleanu
In this article we propose the use of the persistence spectrum to accurately assess the user’s exposure to electromagnetic field emitted by new generation of communication terminals. Persistent display view available within a Real Time Spectrum Analyzer (RTSA) enables a graphical observation of the main statistical parameters of a signal. A simple case study of exposure assessment was conducted by measuring the electric field strength in the close proximity of a mobile phone operated in a LTE-Advanced mobile communication network. The proposed measurement procedure is presented and then applied to a limited number of operating situations (VoIP, Video streaming, File upload, File download). We made use of the persistence spectrum capabilities to directly access the signal strength statistics in time. By this procedure we demonstrate a supplementary facility that enables direct visual tracing of exposure dynamics during real time usage of a specific mobile application.
Cornel Haţiegan, Mihaela Dorica Stroia and Eugen Răduca
A common problem with hydraulic turbines is the rupture of turbine horizontal shaft in the area between the rotor and its bearing, caused by different stresses , as well as problems caused by excessive bearing wear, vibration caused by instability of lubricant film from bearings, lubrication supply interruption of hydrodynamic bearings, gripping, decrease of bearing stiffness due to fatigue of supporting structures. In addition, during operation, vibration appear depending on exciter forces or bearing type. In present paper we present an analysis of vibrations measured on a subassembly found at hydraulic turbines. For the experimental subassembly was used a straight-lined shaft, having variable cross-section, and a sliding type bearing. The tests were made for bearings of different dimensions and materials. Vibrations were measured on two axes for established case studies and results were compared.
The article focuses on the basic characteristic of military development in the second half of the 20th century. On pursuance of William Lind´s concept or theory of Four Generations of War, the article describes the culmination of the Third Generation of War, based on manoeuver and mobility, coupled with air superiority. The first part deals with issues of US technical dominance in the military, the development of new ways of fighting, especially the airmobile tactics used in South Vietnam. The second part of the article focuses on the specific conditions of the Vietnam War that the US Army, for the first time, had to face while applying elements of the Fourth Generation of War. The final part focuses on the issues of implementing the theory of Four Generations of War into the Armed Forces Academy education to better understand the development of military in modern times.
Nowadays, smart devices like computers, tablets, and smartphones allow transmitting the information everywhere, with high speed, over the World Wide Web. However, risks regarding data integrity, privacy and security when using the Internet, increased dramatically, as methods designed to exploit the system’s vulnerabilities are more and more sophisticated. Therefore the need for people working in professional environments to protect their private data when using unsecure connections, by employing advanced tools. There are multiple solutions, but we will focus on the use of virtualization software like VMware or Oracle Virtual Box, together with traditional privacy measures (use of proxies and VPN’s). Today’s smart devices store an important amount of data about their owners and, in most of the cases, people don’t even realize this. Installing and using protection means is often not enough. They have to be properly setup in order to ensure the desired level of security, or anonymity, when using the Internet, and require for the military personnel a good knowledge not only about cyber vulnerabilities and risks, but also technical capabilities and features of the employed security solutions.
DISCLAIMER: This paper expresses the views, interpretations, and independent position of the authors. It should not be regarded as an official document, nor expressing formal opinions or policies, of NATO or the HUMINT Centre of Excellence (HCOE).
Introducing vocabulary to students is not always an easy task. Due to music and movies that young people are exposed to today, vocabulary acquisition is more often not taken seriously. Young people can hum or repeat sentences from a movie that impress them and think that they are able to communicate in a foreign language. In an academic environment you realize that each new vocabulary word is like a brick needed to build up a whole wall; is a small step that help you enrich your abilities to speak, write and understand all the English you might need at a certain time in your professional life. Studies have shown that the more words you know in a foreign language the more you can use it in real life situations. In this study we will approach the theoretical studies related to vocabulary acquisition as well as some practical exercises that might be used in class.
The use and maintenance of technical systems throughout their lifecycle aims at achieving goals that allow for high values of productivity and availability characteristics of these systems. In the economic policy of each state or private organization or state institution, there is the right to determine the type of adequate maintenance system within the maintenance strategy adopted. Thus, the types of maintenance systems recognized in the technical domain are analyzed from the point of view of the two previously-mentioned features, productivity and availability, thus making the predictive maintenance system, derived from the preventively-planned one, advantageous for all organizations. It is obvious that the current trend is to spread this predictive maintenance system, according to which the interventions will be carried out before the malfunction occurs, depending on the periodically measured values of global pressure, flow, energy consumption, temperature, current, voltage, vibrations, etc.
Dorel Badea, Silviu Mihai Petrişor, Dumitru Iancu, Rǎzvan Parfenov and Marian Coman
This article brings to the attention of specialists few points related to an improvement of existing situation in the field of critical infrastructure security through the implementation of advanced technologies and employing a scientific research methodology based on project management. For ensuring the functionality of critical infrastructures, the characteristics of current security environment such as volatility, ambiguity and uncertainty, which determine the use of solutions characterized mainly by the operational agility, have been taken into account. The results of this approach can be useful both for the educational field and for the staff who occupy positions inside the critical infrastructure protection departments within organizations holding or managing such critical infrastructures.
Employees must adapt to these permanent changes by acquiring new skills required to use new technologies. One of the phenomena developed in order to meet these challanges is labour mobility. For the purpose of economic and social mobility, labour is a form of movement in relation to the ever-changing needs of the productive factors. Mobility in the labor market can be considered from several aspects. At the EU level, the phenomenon of labour mobility is promoted by the desire to meet the challanges arising in the labour market. From a economic and political point of view, the free movement of people is inteded to create a common market for labour and promoting EU citizens, by removing barriers in this area.