From its beginning until today the Hungarian hydrocarbon industry has suffered more than seventy bigger accidents where intervention of the fire service and thorough examination was required. In the article the author presents the short analysis of accidents that were collected, systemized, and entered into database during the research, and their integration into the Geographic Information System (GIS). Based on the finished database, with the extended list of the locations’ GPS coordinates, the accidents will be entered into the ArcMap application. The publication of the accidents will be done with the help of Arcgis Viewer for Flex – Application Builder program. Following the GIS placement of accidents, testing, drawing conclusions and summarization are the main goals. The next step will be the preparation for assigning the database to the Disaster Management Decision Support Geographic Information System. Following the international publication, the long-term goal is the connection of each country’s files of dangerous industrial activities that were collected by researchers into one common database.
This article is written to highlight the ways in which China engages in the competition to conquer world supremacy. China is regularly hailed as a potential new superpower. There are views on rapid economic progress, increasing military power, a very large population and increasing its international influence, as signs that it will play an important role in the world in the 21st century. However, other opinions warn that economic chimeras and demographic imbalances could slow or even stop China’s economic growth. The Chinese dream is a concept that has been promoted by the Chinese president Xi Jinping since late 2012 within the Chinese society to describe a set of personal and national paragons for the future of China. It is currently widely used by journalists, governmental officials, and activists to describe the individual’s role in the Chinese society, as well as the Chinese nation’s goals for the future.
This paper describes automobile collision avoidance system by using of an ultrasonic sensor for a vehicle. We utilize the electronic systems application embedded in car that is anticipated to minimize the disaster of car accident. This paper is concentrating on developing a model of rear end car collision avoidance system that detects the gap among motors moving in the identical lane, inside the identical direction and alert the driver each time she or he is in danger range by using a microcontroller. The gap is measured via an ultrasonic sensor used to experience the obstacle beforehand.
Writing has traditionally been a neglected area of foreign language teaching, and most probably the least popular skill to acquire among students. However, it has lately emerged as an important element of the communication dyad, which also involves speaking, i.e. the oral manifestation of social interaction and exchange of information. When explaining writing in practical terms, the focus falls on showing that there should be a link between real-life needs and instruction, both from the perspective of the language and from that of the task. Understanding writing systematically not only guarantees successful writing outcomes, but also leads to the acquisition of a secondary set of language-related abilities: an informed selection of grammar and lexical structures; a logical pattern of organization in the development of ideas; an appropriate choice of register and style; an overall better approach to writing tasks and contextualizations. This article aims to discuss writing as a productive skill while proposing six different approaches that successfully marry both the linguistic dimension and the task-related awareness students need to acquire in order to successfully express themselves in written forms.
This study presents the history of explosive devices and that of their detection. With the invention of explosive devices and their subsequent use, the methods of warfare changed significantly. New procedures emerged that were already unthinkable to implement without the use of such tools. In parallel with the emergence of explosive devices with increasing destructive power, the need to deactivate them also came to the fore. Opposing parties made increasing efforts to detect, deactivate, and destroy explosive devices. After the completion of military operations, the detection of explosive devices did not lose its importance, and developed into an essential mission, since the areas had to be cleared of devices left over from the military actions and posing a murderous danger.
The toxic leadership point out damaging attitudes and behaviours which can affect leaders’ personal traits resulting severe damage to the organization and its subordinates. Given the multinational environment from a theatre of operations, what might be toxic for the military in one country might be accepted in another one, taking into consideration the discrepancies between cultures. No matter their cultural background or their national particularities, the toxic leaders reduce the effectiveness of the organization and of it’s operations. This article wants to highlight, from an analytical approach, the existing types of toxic leaders and their impact to the military organization in Afghanistan theatre of operations.
During the past decades scientific research caused major changes in the perception of students’ learning styles. Empirical findings show that learning styles are neither innate nor unchangeable. On the contrary, students themselves adapt their learning behaviour to the task at hand and aim at trying out different learning styles using their creativity. Therefore, teachers have to plan and propose activities that invite their students to recur to a number of learning strategies. The aim of this paper is to emphasize the importance of the students’ creativity in foreign language acquisition.
Movement and transport planning involves the coordination of a whole complex of influence factors including: the dimensions of the deployed force as well as the logistical support required, the requirements for the time to reach the destination for each structure, the availability of means of transport and their transport capacity, the tactical situation, the terrain conditions, the season and the weather, the availability and maintenance of the communication routes and their occupancy, the existence of threats in the travel strip and their level, the availability of force protection measures, etc. The analysis and application of the measures necessary to improve the influence of these factors on the execution of the mission is a laborious and detailed work with a great need of time for completion. In order to counter the waste of time, as well as the precise and scientific planning of logistics supply and transport support, the North Atlantic Alliance has designed and made available to transport planners in the member countries the package of specialized logistics programmes – LOGFAS (Logistics Functional Area Services).
In times of information flooding us from everywhere and in an environment of increasingly complex and difficult to understand systems that our forces face in the operational environment, there is a need for alternative approaches to analyzing the environment and its participants. This approach meets key requirements and provides new and in-depth knowledge of systems. Network analysis is an approach based on graph theory that is applicable to the analysis of any system or process with a network structure. The network analysis toolkit is suitable for highlighting “important” players or elements in complex networks invisible at first glance, according to various criteria set in the term “important”.
Post-quantum (or quantum-resistant) cryptography refers to a set of cryptographic algorithms that are thought to remain secure even in the world of quantum computers. These algorithms are usually considered to be inefficient because of their big keys, or their running time. However, if quantum computers became a reality, security professionals will not have any other choice, but to use these algorithms. Lamport signature is a hash based one-time digital signature algorithm that is thought to be quantum-resistant. In this paper we will describe some simulation results related to the efficiency of the Lamport signature.