Browsing by Title
Now showing items 2620-2639 of 2868
-
To Learn or not to Learn: On the Importance of Mode Switching in Educational Wargames
(2022-09-19)Conventional wisdom holds that educational wargames come with certain challenges – factors that can potentially hinder, rather than increase, learning – and that these must be mitigated. In this article, we argue that ... -
Toksikologiske og kjemiske egenskaper av sprengstoff og komponenter i ammunisjon
(2005)To investigate the environmental impact of munitions a literature study was performed to collect data on toxicity and transport of components in munitions such as TNT, RDX, HMX and TNB. Based on these data benchmark values ... -
Tolkning av sedimentprøver fra Forsvarets øvingsfelt i nordlige Nordsjøen innsamlet 2004-2008
(2008)I forbindelse med oppmåling av havbunnen i Forsvarets øvingsfelt i den nordlige Nordsjøen har Forsvarets forskningsinstitutt (FFI) tatt 40 kjerneprøver og 37 grabbprøver i årene 2004 – 2008 for undersøkelser av havbunnens ... -
Toward an architecture and data model to enable interoperability between federated mission networks and IoT-enabled smart city environments
(2018)The emergence of smart city initiatives in many areas of the world has led to rapid development and proliferation of Internet of Things (IoT) technologies. Successful deployments of IoT have resulted in the military looking ... -
Toward federated mission networking in the tactical domain
(2015)NATO is currently working on the Federated Mission Networking (FMN) concept, which will become the foundation for establishing mission networks in the future. The realization of the FMN concept is described in the NATO FMN ... -
Towards a certifiable MILS based workstation
(2012-02-20)This report is based on work at FFI towards the potential realization of a certifiable workstation for handling multiple security classifications. To realize such a solution based on the use of a MILS separation kernel, ... -
Towards data-driven autonomous cyber defence for military unmanned vehicles - threats & attacks
(2022-11-28)Unmanned vehicles with varying degrees of autonomy will likely change the way military operations can be conducted, but they also introduce risks that require new ways of thinking security. In particular, the safety ... -
Towards friendly force tracking with MQTT over LoRa
(2019-11-25)With the steady growth of the Internet of Things (IoT) in the civilian commercial sector, the question arises as to whether such IoT concepts can also be used for defense purposes. Military needs, especially those that ... -
Towards NNEC - breaking the interaction barrier with collaboration services
(2014-09-25)The Norwegian armed forces intend to reach NATO Network Enabled Capability (NNEC) maturity level 4 within 2030. The realization of NNEC is essential in developing the future tactical Command and Control (C2) systems for ... -
Towards simulation-based verification of autonomous navigation systems
(2020-09)Autonomous ships are expected to change water-based transport of both cargo and people, and large investments are being made internationally. There are many reasons for such transformation and interest, including shifting ... -
Towards Using Reinforcement Learning for Autonomous Docking of Unmanned Surface Vehicles
(2022-06-10)Providing full autonomy to Unmanned Surface Vehicles (USV) is a challenging goal to achieve. Autonomous docking is a subtask that is particularly difficult. The vessel has to distinguish between obstacles and the dock, and ... -
Towards XAI in the SOC – a user centric study of explainable alerts with SHAP and LIME
(2023-01-26)Many studies of the adoption of machine learning (ML) in Security Operation Centres (SOCs) have pointed to a lack of transparency and explanation – and thus trust – as a barrier to ML adoption, and have suggested ... -
Toxic effects of gunshot fumes from different ammunitions for small arms on lung cells exposed at the air liquid interface
(2021-01-14)Concerns have been raised as to whether gunshot fumes induce prolonged reduced lung capacity or even cancer due to inhalation. Gunshot fumes from three different types of ammunition calibre 5.56 mm × 45 NATO were investigated. ... -
Trace determination of primary nerve agent degradation products in aqueous soil extracts by on-line solid phase extraction-liquid chromatography-mass spectrometry using ZrO2 for enrichment
(2014)A method for determination of the primary nerve agent degradation products ethyl-, isopropyl-, isobutyl-, cyclohexyl- and pinacolyl methylphosphonic acid in aqueous soil extracts has been developed utilizing on-line solid ... -
Trace determination of sulphur mustard and related compounds in environmental samples by headspace-trap GC-MS
(2008)New methods for trace determination of sulphur mustard (HD) by headspace-trap GC-MS have been developed for water and soil samples. As HD is unstable, especially in water, methods for determination of some of the cyclic ... -
Trace determination of sulphur mustard and related compounds in water by headspace-trap gas chromatography-mass spectrometry
(2010)A method for trace determination of sulphur mustard (HD) and some of its cyclic decomposition compounds in water samples has been developed using headspace-trap in combination with gas chromatography-mass spectrometry ... -
Tracking airborne Legionella and Legionella pneumophila at a biological treatment plant
(2008)Biological treatment plants are frequently used to degrade organic substances in wastewater from wood refinement processes. Aeration ponds in such plants provide an optimal growth environment for many microorganisms, ... -
Traffic control in a heterogeneous mobile tactical network with autonomous platforms
(2018-08-15)Future military operations will involve autonomous platforms and systems. In order for these systems to fully achieve their potential, the autonomous platforms need to collaborate. Each platform might have its own ... -
Traffic flow confidentiality in federated networks - Multi-topology routing and security options
(2014)Traffic Flow Confidentiality (TFC) aims to prevent analysis of traffic flows. According to the principles of Protected Core Networking (PCN), TFC should be provided as a service in the network and not implemented by the ...