Browse

You are looking at 1 - 10 of 850 items for :

  • Business Management x
  • Engineering, other x
Clear All
Open access

Marioara Pateşan, Alina Balagiu and Dana Zechia

Abstract

Introducing vocabulary to students is not always an easy task. Due to music and movies that young people are exposed to today, vocabulary acquisition is more often not taken seriously. Young people can hum or repeat sentences from a movie that impress them and think that they are able to communicate in a foreign language. In an academic environment you realize that each new vocabulary word is like a brick needed to build up a whole wall; is a small step that help you enrich your abilities to speak, write and understand all the English you might need at a certain time in your professional life. Studies have shown that the more words you know in a foreign language the more you can use it in real life situations. In this study we will approach the theoretical studies related to vocabulary acquisition as well as some practical exercises that might be used in class.

Open access

Andrei Șandor

Abstract

Nowadays, smart devices like computers, tablets, and smartphones allow transmitting the information everywhere, with high speed, over the World Wide Web. However, risks regarding data integrity, privacy and security when using the Internet, increased dramatically, as methods designed to exploit the system’s vulnerabilities are more and more sophisticated. Therefore the need for people working in professional environments to protect their private data when using unsecure connections, by employing advanced tools. There are multiple solutions, but we will focus on the use of virtualization software like VMware or Oracle Virtual Box, together with traditional privacy measures (use of proxies and VPN’s). Today’s smart devices store an important amount of data about their owners and, in most of the cases, people don’t even realize this. Installing and using protection means is often not enough. They have to be properly setup in order to ensure the desired level of security, or anonymity, when using the Internet, and require for the military personnel a good knowledge not only about cyber vulnerabilities and risks, but also technical capabilities and features of the employed security solutions.

DISCLAIMER: This paper expresses the views, interpretations, and independent position of the authors. It should not be regarded as an official document, nor expressing formal opinions or policies, of NATO or the HUMINT Centre of Excellence (HCOE).

Open access

Juraj Šimko

Abstract

The article focuses on the basic characteristic of military development in the second half of the 20th century. On pursuance of William Lind´s concept or theory of Four Generations of War, the article describes the culmination of the Third Generation of War, based on manoeuver and mobility, coupled with air superiority. The first part deals with issues of US technical dominance in the military, the development of new ways of fighting, especially the airmobile tactics used in South Vietnam. The second part of the article focuses on the specific conditions of the Vietnam War that the US Army, for the first time, had to face while applying elements of the Fourth Generation of War. The final part focuses on the issues of implementing the theory of Four Generations of War into the Armed Forces Academy education to better understand the development of military in modern times.

Open access

Cornel Haţiegan, Mihaela Dorica Stroia and Eugen Răduca

Abstract

A common problem with hydraulic turbines is the rupture of turbine horizontal shaft in the area between the rotor and its bearing, caused by different stresses [1], as well as problems caused by excessive bearing wear, vibration caused by instability of lubricant film from bearings, lubrication supply interruption of hydrodynamic bearings, gripping, decrease of bearing stiffness due to fatigue of supporting structures. In addition, during operation, vibration appear depending on exciter forces or bearing type. In present paper we present an analysis of vibrations measured on a subassembly found at hydraulic turbines. For the experimental subassembly was used a straight-lined shaft, having variable cross-section, and a sliding type bearing. The tests were made for bearings of different dimensions and materials. Vibrations were measured on two axes for established case studies and results were compared.

Open access

Annamaria Sârbu, Simona Miclăuş, Paul Bechet and Iulian Bouleanu

Abstract

In this article we propose the use of the persistence spectrum to accurately assess the user’s exposure to electromagnetic field emitted by new generation of communication terminals. Persistent display view available within a Real Time Spectrum Analyzer (RTSA) enables a graphical observation of the main statistical parameters of a signal. A simple case study of exposure assessment was conducted by measuring the electric field strength in the close proximity of a mobile phone operated in a LTE-Advanced mobile communication network. The proposed measurement procedure is presented and then applied to a limited number of operating situations (VoIP, Video streaming, File upload, File download). We made use of the persistence spectrum capabilities to directly access the signal strength statistics in time. By this procedure we demonstrate a supplementary facility that enables direct visual tracing of exposure dynamics during real time usage of a specific mobile application.

Open access

Alina Ciuhureanu

Abstract

Every decision poses risks, and it is necessary for them to be known. Some may be avoided, others may be diminished, and with others the management will need to become accustomed and avoided and are predominantly related to the external environment. For this reason, the risk can be approached as a variation of the results under the pressure of the environment of the activity. Based on these considerations, the paper addresses the risk in terms of its definition based on the literature and presents some essential aspects regarding the fundamental categories of risks from the point of view of managerial utility. Based on a selective scientific research carried out on a sample of entities in the Centre Region, the paper captures the degree to which managers are interested in capitalizing the accounting information for knowing the risks.

Open access

Toma Pleşanu and Sorin Pînzariu

Abstract

At present, the TRL scale is used as an instrument in decision making regarding investments in research and development also at EU level. This requires different methods to make this instrument operational by adjusting (or understanding) TRL definitions. The scale must be adapted to the specific purpose of the funding by the EU of CDI programmes, because it does not approach the feedback mechanisms that are part of the innovation processes. This paper analyses conceptually and contextually the TRL scale also used in acquisitions of military equipment, in order to emphasize the necessity of the scale so that it corresponds to the purpose of the European decision makers.

Open access

Grudi Angelov, Dimitar Tashkov and Emil Enev

Abstract

At the beginning of the twenty-first century, understanding of transformation encompasses not only organizational and structural processes, but also processes related to the literacy of those who deal with transformation. The paper does not analyze the literal meaning of the concept of literacy as reading and writing abilities. Within the Armed Forces system, literacy can be considered from several aspects - doctrinal, managerial, methodological, psychological, pedagogical and technical. Since transformation is not an one-time act, but a permanent function of the National Security System, it is necessary to emphasize the importance of the continuity of the process of developing literacy of today’s leaders. The purpose of this paper is to present some of the arguments for the need of transformation of literacy (knowledge and skills) of the leaders of the transformation processes at the operational and tactical levels, so that they are able to skillfully apply the modern technological innovations in the preparation of the management bodies of the Armed Forces.

Open access

Laviniu Bojor

Abstract

The operational environments of future armed conflicts will be marked by military actions taken in densely populated areas. Skyscraper buildings, interconnected basements, blocked access ways, close range strikes, or lacks of combat support are some of the challenges that future military leaders have to face in future military conflicts. The paper aims to explore the challenges of large urban agglomerations where military leaders will conduct land forces actions by analyzing elements of combat power.

Open access

Dobrinka Chankova and Gergana Georgieva

Abstract

This study explores the latest developments on the European scale of the policies and practices towards victims of crime. Due to many economic and political factors a lot of people are in movement and exposed to the risk of becoming victims of crime. During the last decade the statistics already records enhanced victimization of the global European society. These have provoked numerous legislative actions and practical initiatives in order to ensure safety, to prevent falling victims to crime and to protect better victim’s rights and needs. The European Protection Order Directive, Victims’ Directive and Convention against domestic violence, are among the most advanced legal acts worldwide. However, it is observed that their implementation in Europe is asymmetric and sometimes problematic. This paper explores the role of the national governments and specialized agencies and mainly the deficits in their activities leading to the non-usage of victims of all the existing opportunities. The newest supra-national acts aiming at the acceleration of transposition and ratification of these important for the building of victim-friendly environment documents, are discussed. Practical recommendations for a more effective victim protection are developed.