Search
Now showing items 801-810 of 926
Return to Tripoli - battle over minds and meaning amongst religious leaders within the islamist field in Tripoli (Lebanon)
(2009)
This study analyses the Islamist movements in Tripoli, in light of Pierre Bourdieu’s concept of a
religious field. Its point of departure is the empirical observation that the Islamist movements in
Tripoli, a city in ...
KOSTMOD 4.0 - user manual
(2009)
KOSTMOD is a tool developed for conducting long term cost analyses. The tool has been developed by FFI since the 1970s. This report describes the latest version, Version 4.0, which has been developed in close co-operation ...
Comparison of RADARSAT and IKONOS satellite images - detection and visibility of man-made objects
(2001)
This report compares the visual appearance and detection of different man-made objects in an area close to Bergen city
in Norway using IKONOS (1 m resolution) and RADARSAT (9 m resolution) images respectively.
The results ...
Counterinsurgency Field Manual 3-24 and operations
(2009)
The purpose of this report is fourfold. The first is to highlight the key tenets of FM 3-24. The idea that sets counterinsurgency apart from conventional military operations – that it is more important to secure the host ...
Weapons of mass instruction? - a preliminary exploration of the link between madrassas in Pakistan and militancy
(2009)
This study conducts a preliminary investigation into the link between madrassas in Pakistan and Islamic militancy. Available literature is reviewed and pitted against findings from primary sources – such as interviews, ...
Bakgrunn og problemstillinger for FFI-prosjekt 797 Bakkebasert luftvern
(2001)
The aim of FFI-project 797 - “Ground Based Air Defence (GBAD) System” is to analyse cost effectiveness of
alternative future SHORAD/MSAM concepts in support of a development and acquisition process in the Norwegian
Defence ...
XML and Web services security standards
(2009)
XML and Web services are widely used in current distributed systems. The security of the XML based communication, and the Web services themselves, is of great importance to the overall security of these systems. Furthermore, ...
Terrorism and organised crime in post-Soviet Russia
(2001)
This report explores the sources and nature of the terrorism that has afflicted Russia in post-Soviet time. The study focuses on three main contexts where terrorism has been generated: extremism based on ideological or ...
A method for restoring data in a hyperspectral imaging system with large keystone without loss of spatial resolution
(2009)
This report proposes a new method of keystone correction in the postprocessing of hyperspectral
images. Unlike conventional resampling the proposed method does not introduce any loss of
resolution. A hardware modification ...