Browsing by Title
Now showing items 96-115 of 2872
-
Analysis of bottom samples from Vestfjorden collected during Rumble First Sea Trial
(2002)As a part of the RUMBLE first sea trial 15 sediment samples were taken from two areas in the inner and outer Vestfjorden, respectively. This report presents the results of the analysis of the sediment samples. The seabed ... -
Analysis of detection performance of incoherent range walk compensation for passive radar
(2015)This paper analyzes the performance of an incoherent range walk compensation method for passive radar systems. The method utilizes the velocity information in the range-Doppler map, and no detection before compensation ... -
Analysis of maritime operations - methodology and implementation
(2016-10-12)The report presents the accumulated experience, obtained methodology and associated recommendations gained through FFI project P1200 (Analysis of Maritime Operations) and P1337 (Analysis of Maritime Operations and ... -
Analysis of multirotor drone wind response
(2023-03-20)This report describes the fundamental mechanisms and response of a generic multirotor drone when subjected to gusting wind. We have used simplified dynamic models, both linear and nonlinear. Based on these, we have ... -
An analysis of required authentication of user traffic across networks
(2012-09-28)The analysis documented in this report identifies and assesses use cases that require authentication of user traffic across networks. The purpose of the analysis is to show that there exist several use cases where such ... -
Analysis of samples of high explosives extracted from explosive remnants of war
(2022-10-10)Millions of tonnes of dumped ammunition and explosive remnants of war remain in nature both on land and at sea. It is well known that the ordnance could represent a definite explosive risk if disturbed, and that some of ... -
Analysis of the Stuhmiller blast injury model
(2013-06-04)The Stuhmiller model for blast wave injury has been studied. Although it has not been documented well in literature, we were able to program the model in Matlab and study some of its properties. It turned out that the ... -
Analytical cavity expansion penetration models compared with numerical simulations
(2003)Penetration models for rigid projectiles based on cavity expansion theory (CET) are widely used. In this article we performed several hydrocode simulations and compared with analytical results from CET-based theories for ... -
An analytical review of perforation statistics – using aluminium as witness plates in perforation experiments
(2023-12-20)This report documents the statistical methods that are used in perforation experiments at the Norwegian Defence Research Establishment (FFI). We also introduce new (or at least unused) statistical methods, which have ... -
Anbefalt metode for kartlegging av mobbing og seksuell trakassering i Forsvaret
(2019-05-12)I dette notatet redegjør vi for utviklingen av to spørsmålsbatterier som vi anbefaler at Forsvaret bruker for å kartlegge omfang og type av mobbing og seksuell trakassering. Analysen er basert på en undersøkelse som ble ... -
Anisotropic scattered data interpolation for pushbroom image rectification
(2014)This paper deals with fast and accurate visualization of pushbroom image data from airborne and spaceborne platforms. A pushbroom sensor acquires images in a line-scanning fashion, and this results in scattered input data ... -
Anisotropy and shear-layer edge dynamics of statistically unsteady,stratified turbulence
(2015)Direct numerical simulation data of an evolving Kelvin-Helmholtz instability have been analyzed in order to characterize the dynamic and kinematic response of shear-generated turbulent flow to imposed stable stratification. ... -
ANNCP WG IX Collaborative Project CP-20 on Analysis of Network Enabled Operations : final report
(2008)Network Enabled Capabilities (NEC) has become an important concept for enhancing the operational capability of military forces in all three of the ANNCP nations. There is currently no universally accepted understanding of ... -
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
(2022-10-22)Anonymous single-use tokens have seen recent applications in private Internet browsing and anonymous statistics collection. We develop new schemes in order to include public metadata such as expiration dates for tokens. ... -
Anonymous tokens – implementation and development
(2022-01-18)Anonymous tokens can be used to provide one-time authentication for a service without revealing one’s identity, and has been used as a CAPTCHA replacement and to provide additional anonymity in the Norwegian COVID-19 ...