Academic and Applied Research in Military and Public
Latest Publications


TOTAL DOCUMENTS

85
(FIVE YEARS 58)

H-INDEX

1
(FIVE YEARS 1)

Published By Academic And Applied Research In Military And Public Management Science

2498-5392

2021 ◽  
Vol 20 (1) ◽  
pp. 67-79
Author(s):  
Ádám Kiss ◽  
Levente Dudás

Passive radars are popular because without the expensive, high-power-rated RF components, they are much cheaper than the active ones, nevertheless, they are much harder to detect from their electromagnetic emission. Passive radars produce so-called RV matrices in an intermediate signal processing step. Although accurate RV matrices are found in DVBT-based passive radars, the characteristics of the FM signals are not always suitable for this purpose. In those situations, further signal processing causes false alarms and unreliable plots, misleads the tracker, and consumes power for processing unnecessarily, which matters in portable setups. Passive radars also come with the advantage of a possible MIMO setup, when multiple signal sources (broadcast services for example) are reflected by multiple targets to the receiver unit. One common case is the stealth aircraft’s which form is designed to reflect the radar signal away from the active radar, but it could also reflect the signals of the available broadcast channels. Only one of these reflected signals could reveal the position of the target.


2021 ◽  
Vol 20 (1) ◽  
pp. 43-54
Author(s):  
Faisal Warikat

This paper investigates the possibility of establishing peace between Hamas and Israel, based on the politicisation model of armed groups that leads eventually to change the violent character of armed groups. The main question is: Can Israel and Hamas have a long-lasting peace to end the conflict in the Gaza Strip?The main pillars of politicisation are the willingness of warring parties to conclude peace, the existence of a ‘hurting stalemate’, the narrowness of objectives and the ability to guarantee public support. The primary conclusion of this paper is that comprehensive peace is difficult to achieve, but a unique long-term truce ‘Hudna’ is attainable.


2021 ◽  
Vol 20 (1) ◽  
pp. 21-42
Author(s):  
Takele Bekele Bayu

Ethiopia is a multicultural and multilingual country. The Oromo and Somali communities are found in the same linguistic community, that is, the Cushitic language. Historically, Somalis and Oromo have a long tradition of co-existence and strong socio-cultural interactions, as well as antagonistic relationships and intermittent conflicts. Traditionally, the major sources of conflict between the two communities were competition over scarce resources, territorial expansion, livestock raids and counter raids, kidnapping for marriage purposes and the revenge tradition. However, this time the conflict took a different nature, form and bigger scale causing devastation never seen in the history of communal conflict in the country. The study has utilised primary and secondary data collection and employed narration and content analysis to realise the objective of the paper. The findings of this study reveal that the causes of the Oromo–Somali conflict are complex and dynamic. This urges the need to carry out a deeper investigation beyond the federal arrangement. Thus, fundamental and triggering factors including the involvement of internal and external forces, the collapse of social norms and prevalence of moral anarchism, socio-economic issues, competing interests among public and military officials, poor leadership and governance system, competing interests over resources, aspects of local cultural institutions in regulating inter-ethnic relationships are identified in fuelling ethnic conflict in the studied area. Since the conflict in the region is much more complex than the dominant narrative of resource scarcity and ethnic politicisation, open democratic dialogue, genuine consultation and negotiation at a different level with various interest groups, stakeholders and community representatives, militant groups operating in the area is of paramount importance to ease the increasing ethnic tension and political crisis in order to build sustainable peace in the region.


2021 ◽  
Vol 20 (1) ◽  
pp. 5-19
Author(s):  
Attila Csóka

Outflow itself and the turnover of personnel are natural phenomena and occur in any organisation. The motivational factors influencing outflow can be classified as financial, medical and psychological factors. Compared with the two other factors, the psychological factor is the most complex one. In the research, the author examined these psychological factors among the soldiers of the HDF 93rd CBRN Battalion in 2008 and in 2018 and compared the differences. The author also analysed the relationship between salary-motivated outflow and age, defining a key amount that should be taken into consideration in order to prevent the mass outflow.


2021 ◽  
Vol 20 (1) ◽  
pp. 81-93
Author(s):  
Alexandra Lilla Beregi ◽  
Tibor Babos

The goal of this study is to explore security threats and challenges of digitisation. Digitisation as one of the key technological factors has a significant impact on the development of today’s modern world. Beyond general security circumstances, this impact touches upon economic, financial, social, technological, medical, educational, defence and military issues, as well all over the world.The argument of this study is that the modernisation of defence systems is an essential key to successfully responding to new security challenges in our digital explosion era. Therefore, it is a must that government organisations, including defence and military systems fundamentally upgrade their own technical, structural and operational capabilities and accept digitisation as the driving factor of future defence and military development.In light of the above, the study first examines digitisation as a global security challenge and then presents a comparative analysis of the relationship between hybrid warfare and cybersecurity. Finally, before drawing conclusions, it takes stock of the military policy relevance of the cybersecurity challenges relevant to Hungary.Overall, it can be stated that digitisation and digital transformation are present all over the world as a result of globalisation. Developed nations, including Hungary must be connected to digitisation and by digitisation to each other’s various systems and technologies. This system has to be integrated, but independent at the same time, as well as connected but separable in order to be able to be involved in the whole cyberspace and get the benefits of it or get separated from it to defend threats or direct attacks coming from the outside. The Hungarian Defence Forces has a key role in this very important process.


2021 ◽  
Vol 20 (1) ◽  
pp. 55-65
Author(s):  
Emmanuel Abeku Essel

Ghana spends a large number of its public resources on the acquisition of goods, works and services with most of them being sourced through Public Procurement. The country in its quest to ensure transparency and efficiency in its public transaction established the Public Procurement Authority (PPA) and clothed it with powers by an Act of Parliament to discharge the given responsibilities. However, since 2003 when the 4th Republican rule was instituted, not a single government regime has exited from office without recourse to irregularities associated with the procurement processes as reported by the Auditor General’s Annual Reports or reports by Civil Society Organisations (CSOs). The goal of this paper is to look at the consequences of these irregularities in the procurement process posed to Ghana’s development. The methodology used in carrying out this study centred mainly on secondary data, and some recommendations have been offered for consideration.


2021 ◽  
Vol 20 (1) ◽  
pp. 95-110
Author(s):  
Irén Kopcsóné Németh ◽  
Márta Péntek ◽  
Zsombor Zrubka

Infection prevention and control (IPC) is a set of evidence-based practices of hospital epidemiology aiming to prevent and control healthcare-associated infections. The aim of the present study was two-fold. First, we estimated the costs of IPC in the Medical Centre of the Hungarian Defence Forces (MCHDF) in Hungary using a bottom-up microcosting approach. Second, we analysed how the involvement of the MCHDF in Covid-19 care changed the occurrence of multidrug-resistant infections in the hospital. Our results showed that depending on the type of ward, the daily costs of standard care ranged between 3,809–8,589 HUF, while the costs of isolation were between 9,203–11,200 HUF. Daily costs were highest in the intensive care unit (ICU). Total costs per patient ranged between 20,875–78,904 HUF for standard care and 79,996–282,892 HUF for isolation with highest values in the Neonatal Intensive Care Unit (NICU). The incremental isolation cost per patient compared to standard care ranged between 20,363–158,216 HUF. When the MCHDF became a Covid-19 care centre, the incidence of introduced Clostridium difficile and multidrug resistant cases increased by nearly 200 per cent and 40 per cent, respectively. Our results can be used as basic input data for the economic evaluation of IPC strategies and highlights an important IPC aspect to be considered for the redistribution of hospital capacities during the Covid-19 pandemic.


2020 ◽  
Vol 19 (3) ◽  
pp. 85-98
Author(s):  
Gábor Selján

It has been ten years since Stuxnet, a highly sophisticated malware that was originally aimed at Iran’s nuclear facilities, was uncovered in 2010. Stuxnet is considered to be the first cyber weapon, used by a nation state threat actor in a politically motivated cyberattack. It has significantly changed the cybersecurity landscape, since it was the first publicly known malware that could cause physical damage to real processes or equipment. Its complexity and level of sophistication, due to the exploitation of four different zero-day vulnerabilities in Windows and the usage of two stolen certificates, has triggered a paradigm shift in the cybersecurity industry. The recently uncovered cyber espionage campaign known as SolarStorm is a worthy anniversary celebration for Stuxnet. Especially because now the tables have turned. This campaign targeted the United States Government and its interests with a highly sophisticated supply chain attack through the exploitation of the SolarWinds Orion Platform used by thousands of public and private sector customers for infrastructure monitoring and management. In this article, I attempt to summarise the key points about the malware deployed in the SolarStorm campaign that can be drawn from reports available at the time of the writing.


2020 ◽  
Vol 19 (3) ◽  
pp. 5-22
Author(s):  
Ferenc Koczka

In ensuring the operation of an IT system, it is essential to maintain the data’s confidentiality and integrity, which is based on some encryption processes. Encryption procedures are based on algorithms, the theory of which is given by cryptography. Due to their complexity, they are often hardly understandable not only to an average person but also to the majority of professionals who are familiar with IT. The algorithms used are not eternal; various designs or implementation errors or even performance gains from computer hardware improvements make one time high achieving algorithms obsolete and easily hackable. Strong algorithms can be circumvented in alternative ways, the necessary software and hardware infrastructure can already be built from personal computing devices. I tested its effectiveness on two different password databases: with the success of hacking university passwords, I prove that it is possible to circumvent strong algorithms with simple methods. Modern encryption algorithms have a relatively long life cycle and they become obsolete slowly. The construction of the quantum computer creates a new situation, which requires a number of procedures to be eliminated and its parameters to be modified or protected by additional methods. As it is an impossible task to modernise the encryption algorithms of all IT systems operating today, preparations must be started as soon as possible so that the new situation can be handled, at least for critical systems. In my article, I would like to draw attention to the weaknesses of encryption methods, present a possible method of circumventing the cryptographic methods currently in use, demonstrate the operation of a quantum computer and some algorithms relevant to the topic.


2020 ◽  
Vol 19 (3) ◽  
pp. 37-51
Author(s):  
Árpád Pohl ◽  
György Gulyás

It is a basic requirement of the nations participating in multinational operations that the necessary resources be available at the required place and time, in the determined quality and quantity with optimal costs. In all of this, the Contractor Support to Operations, one of the pillars of the support to operations, has a more and more significant role. This method of support (besides the Host Nation Support) is destined for covering the gaps in the national military capabilities and capacities. It is indispensable these days to employ contractors for capitalising on their technological knowledge, as well as for achieving cost savings and a growth in the capabilities. The NATO Support and Procurement Agency (NSPA or Agency), the ‘contract integrator’ organisation of the NATO also support the NATO and the nations this way. In this article, the authors would like to introduce the operation of the NSPA and discuss the potential opportunities in its use.


Sign in / Sign up

Export Citation Format

Share Document