Search
Now showing items 61-70 of 105
Evaluation of a highly discriminating multiplex multi-locus variable-number of tandem-repeats (MLVA) analysis for Vibrio cholerae
(2009)
Vibrio cholerae is the etiological agent of cholera and may be used in bioterror actions due to the easiness of its dissemination, and the public fear for acquiring the cholera disease. A simple and highly discriminating ...
Counter biological and chemical terrorism - WP8000: conclusions and recommendations
(2009)
This report constitutes an unclassified summary of the main results and conclusions of the European Defence Agency project “Counter Biological and Chemical Terrorism”, EDA-0156-GEM3-ERG. The overall objective has been is ...
Return to Tripoli - battle over minds and meaning amongst religious leaders within the islamist field in Tripoli (Lebanon)
(2009)
This study analyses the Islamist movements in Tripoli, in light of Pierre Bourdieu’s concept of a
religious field. Its point of departure is the empirical observation that the Islamist movements in
Tripoli, a city in ...
KOSTMOD 4.0 - user manual
(2009)
KOSTMOD is a tool developed for conducting long term cost analyses. The tool has been developed by FFI since the 1970s. This report describes the latest version, Version 4.0, which has been developed in close co-operation ...
Counterinsurgency Field Manual 3-24 and operations
(2009)
The purpose of this report is fourfold. The first is to highlight the key tenets of FM 3-24. The idea that sets counterinsurgency apart from conventional military operations – that it is more important to secure the host ...
Weapons of mass instruction? - a preliminary exploration of the link between madrassas in Pakistan and militancy
(2009)
This study conducts a preliminary investigation into the link between madrassas in Pakistan and Islamic militancy. Available literature is reviewed and pitted against findings from primary sources – such as interviews, ...
XML and Web services security standards
(2009)
XML and Web services are widely used in current distributed systems. The security of the XML based communication, and the Web services themselves, is of great importance to the overall security of these systems. Furthermore, ...
A method for restoring data in a hyperspectral imaging system with large keystone without loss of spatial resolution
(2009)
This report proposes a new method of keystone correction in the postprocessing of hyperspectral
images. Unlike conventional resampling the proposed method does not introduce any loss of
resolution. A hardware modification ...
Noen konsepter for datafusjon for undervannsakustisk sensornettverk
(2009)
Denne rapporten beskriver prinsipper for tracking av fartøyer som passerer et undervannsakustisk
sensornettverk hvor nodene maler retninger til lyd. Dataene fra nodene kan inkludere målefeil og
tvetydigheter. Estimater ...
Interoperable service discovery : experiments at Combined Endeavor 2009
(2009)
This report summarizes the Web services discovery activities in project 1086. In particular, we
discuss our experiments at Combined Endeavor, where we performed joint experiments with the
NC3A in the Netherlands in 2009. ...