Browsing by Title
Now showing items 2625-2644 of 2867
-
Towards a certifiable MILS based workstation
(2012-02-20)This report is based on work at FFI towards the potential realization of a certifiable workstation for handling multiple security classifications. To realize such a solution based on the use of a MILS separation kernel, ... -
Towards data-driven autonomous cyber defence for military unmanned vehicles - threats & attacks
(2022-11-28)Unmanned vehicles with varying degrees of autonomy will likely change the way military operations can be conducted, but they also introduce risks that require new ways of thinking security. In particular, the safety ... -
Towards friendly force tracking with MQTT over LoRa
(2019-11-25)With the steady growth of the Internet of Things (IoT) in the civilian commercial sector, the question arises as to whether such IoT concepts can also be used for defense purposes. Military needs, especially those that ... -
Towards NNEC - breaking the interaction barrier with collaboration services
(2014-09-25)The Norwegian armed forces intend to reach NATO Network Enabled Capability (NNEC) maturity level 4 within 2030. The realization of NNEC is essential in developing the future tactical Command and Control (C2) systems for ... -
Towards simulation-based verification of autonomous navigation systems
(2020-09)Autonomous ships are expected to change water-based transport of both cargo and people, and large investments are being made internationally. There are many reasons for such transformation and interest, including shifting ... -
Towards Using Reinforcement Learning for Autonomous Docking of Unmanned Surface Vehicles
(2022-06-10)Providing full autonomy to Unmanned Surface Vehicles (USV) is a challenging goal to achieve. Autonomous docking is a subtask that is particularly difficult. The vessel has to distinguish between obstacles and the dock, and ... -
Towards XAI in the SOC – a user centric study of explainable alerts with SHAP and LIME
(2023-01-26)Many studies of the adoption of machine learning (ML) in Security Operation Centres (SOCs) have pointed to a lack of transparency and explanation – and thus trust – as a barrier to ML adoption, and have suggested ... -
Toxic effects of gunshot fumes from different ammunitions for small arms on lung cells exposed at the air liquid interface
(2021-01-14)Concerns have been raised as to whether gunshot fumes induce prolonged reduced lung capacity or even cancer due to inhalation. Gunshot fumes from three different types of ammunition calibre 5.56 mm × 45 NATO were investigated. ... -
Trace determination of primary nerve agent degradation products in aqueous soil extracts by on-line solid phase extraction-liquid chromatography-mass spectrometry using ZrO2 for enrichment
(2014)A method for determination of the primary nerve agent degradation products ethyl-, isopropyl-, isobutyl-, cyclohexyl- and pinacolyl methylphosphonic acid in aqueous soil extracts has been developed utilizing on-line solid ... -
Trace determination of sulphur mustard and related compounds in environmental samples by headspace-trap GC-MS
(2008)New methods for trace determination of sulphur mustard (HD) by headspace-trap GC-MS have been developed for water and soil samples. As HD is unstable, especially in water, methods for determination of some of the cyclic ... -
Trace determination of sulphur mustard and related compounds in water by headspace-trap gas chromatography-mass spectrometry
(2010)A method for trace determination of sulphur mustard (HD) and some of its cyclic decomposition compounds in water samples has been developed using headspace-trap in combination with gas chromatography-mass spectrometry ... -
Tracking airborne Legionella and Legionella pneumophila at a biological treatment plant
(2008)Biological treatment plants are frequently used to degrade organic substances in wastewater from wood refinement processes. Aeration ponds in such plants provide an optimal growth environment for many microorganisms, ... -
Traffic control in a heterogeneous mobile tactical network with autonomous platforms
(2018-08-15)Future military operations will involve autonomous platforms and systems. In order for these systems to fully achieve their potential, the autonomous platforms need to collaborate. Each platform might have its own ... -
Traffic flow confidentiality in federated networks - Multi-topology routing and security options
(2014)Traffic Flow Confidentiality (TFC) aims to prevent analysis of traffic flows. According to the principles of Protected Core Networking (PCN), TFC should be provided as a service in the network and not implemented by the ... -
Trafikkdatalekkasje gjennom bruk av sosiale medier
(2014-09-02)Ukrypterte forbindelser forteller alt om hvem som kommuniserer og hva de utveksler av in- formasjon. Krypterte forbindelser skjuler innhold, men ikke hvem som kommuniserer. Mens anonymiserte forbindelser skjuler b°ade ... -
Training of Neural Network Target Detectors Mentored by SO-CFAR
(2020)A desirable objective in radar detection theory is the ability to detect and recognize targets in intricate scenarios such as in the presence of clutter or multiple closely spaced targets. Herein we propose the use of ... -
Training videos to prevent cold weather injuries
(2023-03-29)Cold weather injuries (CWIs) are a challenge during military training, exercises and operations in Arctic conditions. Soldier performance in these challenging conditions depends on protective equipment, knowledge, personal ... -
Transport and dispersion of non-neutral toxic industrial chemicals in an urban environment
(2012-08-31)The main focus in this study was to investigate the difference between the dispersion and transport process of non-neutral and passive gas release, respectively, in an urban area. The method used was the LES approach, ... -
Transport av eksplosiver : utlekking av eksplosiver under episode
(2010)Forurensning av eksplosiver fra ammunisjon opptrer som partikler, der størrelsen på partiklene er avhengig av hvordan ammunisjonen er omsatt. Partiklene blir liggende på overflaten av bakken og er lite mobile. Hvis ... -
Trender i militære operasjoner
(2010)Alle som har fulgt utviklingen av vestlige militære styrker de siste tre tiårene har vært vitner til en stadig reduksjon i deres størrelse og en tydelig satsing på omfattende teknologiske løsninger. Trenden har vært ...