Browsing by Title
Now showing items 711-730 of 2876
-
EUCLID JP 9.16: Space-based AIS reception for ship identification
(2004)This report documents the results of Work element 3100 “Space-based AIS reception for ship identification” of the WEAG study JP 9.16 “Emerging Satellite Technologies, System Trends and Space Utilization”. The Automatic ... -
The European Arctic after the Cold War - how can we analyze it in terms of security
(2007)Som sikkerhetspolitisk arena har nordområdene gjennomgått store og viktige endringer etter den kalde krigens slutt og Sovjetunionens oppløsning. Under den kalde krigen var Barentshavsregionen et av verdens tyngst militariserte ... -
European defence research in crisis? The way towards strategic autonomy
(2016)Defence research, in the form of both research and development (R&D) and research and technology (R&T), are important factors in achieving long-term European strategic autonomy. The present paper analyses this debate from ... -
Europeisk sikkerhet i en foranderlig tid : en analyse av Norges utenriks- og sikkerhetspolitiske handlingsrom
(Forsvarets forskningsinstitutt, 2000) -
EUs "nye" sikkerhetspolitikk: Bekjempelse av terrorisme og internasjonal kriminalitet
(2003)This report is devoted to the EU as a comprehensive security policy actor. The aim is to study how the EU approaches the new threats and challenges facing the western communities and Europe. The analysis emphasises the ... -
EUs sikkerhetslogikk
(2004)The EU has developed a common foreign and security policy which in many ways differs from the current US policy. There are several reasons for these differences. Unlike the US the EU is not a unitary state, but a system ... -
Evaluating applied information security measures - an analysis of the data from the Norwegian Computer Crime Survey 2006
(2007)Forfatteren deltok i arbeidet med Mørketallsundersøkelsen sammen med Datakrimutvalget i Næringslivets sikkerhetsråd (NSR) fra januar 2006 frem til arbeidet ble presentert på Sikkerhetskonferansen i september 2006. Etter ... -
Evaluating Publish/Subscribe Protocols for use in Constrained Networks
(2023-03-09)Considering the case of disaster relief and search and rescue operations, we can anticipate personnel operating with a total or partial lack of any pre-existing infrastructure. This means that ad hoc com- munication solutions ... -
Evaluating the performance of JXTA over SATCOM
(2004)The transition towards a network-based defence brings along requirements to both network and distributed applications. Distributed applications are faced with a variety of networks ranging from high bandwidth links to ... -
Evaluating the recommended safety distance of a recoil booster
(2023-06-01)After a supplier course for the FN MINIMI 7.62 mm Tactical machine gun, it was noted that the accompanying recoil booster FN Herstal S. A. B0897 has a hole going through it, which is parallel to the line of fire. The ... -
Evaluation methods of signature effectiveness - a first evaluation of camouflage assessments by CAMAELEON compared to human observers
(2016-07-04)Signature control and a good understanding of the performance of signature control measures is a very important topic for the Norwegian Armed Forces. In order to achieve this we need methods for test and evaluation of ... -
Evaluation of a highly discriminating multiplex multi-locus variable-number of tandem-repeats (MLVA) analysis for Vibrio cholerae
(2009)Vibrio cholerae is the etiological agent of cholera and may be used in bioterror actions due to the easiness of its dissemination, and the public fear for acquiring the cholera disease. A simple and highly discriminating ... -
Evaluation of camouflage pattern performance of textiles by human observers and CAMAELEON
(2017)Military textiles with camouflage pattern are an important part of the protection measures for soldiers. Military operational environments differ a lot depending on climate and vegetation. This requires very different ... -
Evaluation of CLAWPACK with gravity and multiple phases for use in marine technology
(2000)English summary. This thesis concerns the use of the program package CLAWPACK (Conservation LAWs PACKage) in problems related to marine technology. Problems investigated are vortex shedding, multiple phases and gravity. ... -
Evaluation of hazards to occupant of the "Compact 230 Minecat" exposed to blast from 10 kg TNT
(1999)A mineclearing vehicle, Compact 230 MINCAT, of the rotating flail type has been developed by Norwegian Demining Consortium (NoDeCo). The machine is of the rotating flail type, and is based on the Bobcat 863 compact loader ... -
Evaluation of Message Broker Approaches for Information Exchange in Disadvantaged Tactical Networks in a Federated Environment
(2020)The research task group NATO STO/IST-150 «NATO Core Services profiling for Hybrid Tactical Networks» is working towards profiling Core Services for the tactical domain, which can be described as DIL (disconnected, intermittent ... -
Evaluation of Optoflow Microcyte(R) flow cytometer
(2002)Optoflow Microcyte flow cytometer has been evaluated with regard to its user-friendliness and ability to detect different types of bacteria. Bacillus cereus and Escherichia coli are tested at different concentrations and ... -
Evaluation of Radarsat-2 for ship detection
(2011-12-05)Ship detection and monitoring has become one of the first operational services from civilian spaceborne Synthetic Aperture Radar (SAR) satellites. The Norwegian Coast Guard presently uses such data to support fisheries ...