Search

Published After
Published Before

Search Results

  • How Implementing Space Capabilities can Realize the Directives of Hungary’s National Security Strategy
    120-141
    Views:
    359

    The Hungarian Government has released its decree on Hungary’s National Security Strategy, which provides a comprehensive picture of Hungary’s present state of security, sets out the country’s goals and directives to be achieved as well as the necessary government tools and tasks. Significant contributions can be made to the implementation of many of these directives by national space capabilities based on a Hungarian satellite system. In this study we intend to show the validity of this statement by presenting an overview of the legitimacy, features and possible benefits of national space-based capabilities as well as the necessary tasks involved in their implementation.

  • Safety Index Based on Geometric Probability Is Proposed to Represent the Uncertainty of Soil Parameters for Spread Foundations
    43-52
    Views:
    140

    The overall factor of safety in geotechnics can be defined as the product of four partial factors of safety. One of these partial factors represents the uncertainty of the soil parameters. Based on geometric probability, a safety index is proposed to calculate the uncertainty of the soil parameters for spread foundations. Numerical examples have also been presented.

  • Human security issues of deep wells retraining
    114-123
    Views:
    89

    Nowadays, in the world's energy production structure, fossil fuels dominate and at the same time cause a number of environmental problems. Comparing the use of conventional fossil fuels with geothermal energy, this kind of energy production is extremely beneficial, as there are no pollutants and a renewable energy source. Moreover, if we want to compare geothermal energy with other renewable energy sources (such as wind energy, solar energy, etc.), much of the benefits can also be attributed to geothermal energy becouse it is a stable energy source and the area requirement is low. Due to these extremely favorable properties, the study of the applicability of geothermal energy is gaining ground in renewable energy sources. In addition, it is well known that there are approximately 20 to 30 million abandoned oil wells in the world, plus sealed wells for other purposes, and the final number may be much larger. In the case of abandoned oil wells, the escaping residual oil may be a problem, which can lead to significant environmental problems. Taking these factors into account, research on the recyclability of abandoned wells for geothermal purposes becomes a target for more and more research topics around the world. It is interesting to note that a significant part of the publications are concerned with examining the technological potential of energy utilization, studying heat transport processes, and generating general, energetic or economical evaluations. A publication of a kind that would have evaluated the safety of recyclable abandoned wells in publishing databases was limited. It is therefore an important question that the abandoned wells, from the point of view of human security and environmental protection. How can they be reactive, how can the new technological elements be built up and how much human security factors of the newly created system are affected by the existing elements?

  • Security Evaluation of MODBUS RTU Protocol, Testing New Cryptographic Methods
    35-42
    Views:
    169

    In the late decade, the number of attacks against SCADA, CIS, or ICS systems had grown considerably. The purpose of this paper is to summarize the results of the implementation of a new cryptographic method on th e MODBUS RTU line.

  • The Information Security Risks of the BYOD
    176-185
    Views:
    234

    Today we cannot imagine our everyday lives without using our smart devices. While commuting we often get into people - even literally - who are doing their work on their portable devices 24 hours a day. This habit is widespread; there are many solutions that can be used by the corporation to have their employees work on their private devices, besides using it in their personal life. They can use these devices at their home, while commuting, or even while being at their own cubicle at the firm. In this article, we are concentrating on the IT risks of the firm with this work practice from a theoretical point of view. After this step, we will continue our research with investigating the problem of measuring and mitigating of these risks.

Database Logos