Publications: Recent submissions
Now showing items 1461-1480 of 2956
-
Påvisning av biologiske trusselstoffer - teknologiinnspill til FS 07
(2006)This report describes various methods for detection and identification of biological (B) threat agents and different technical devices that may be used for military purposes. Various approaches may be used for B-detection ... -
Folkerettslige forhold ved bruk av leverandører i internasjonale operasjoner
(2006)In the last 10-15 years there has been a growing focus on the use of civilian suppliers in international military operations and on how they are used. This report is aiming to describe some basic law requirements of the ... -
Fjernstyrte våpenstasjoner for kjøretøy og skip - teknologiinnspill til FS 07
(2006)Recent events, such as the war in Iraq, have contributed to a renewed focus on the vulnerability of gunners on lighter fighting and patrol vehicles. Together with advances in electro-optical technology, this has lead to ... -
Ubemannet luftrom : teknologiinnspill til FS 07
(2006)Although human operators are an indispensable element in military aviation today, they are allready partly dispensable in many functions. Indeed humans are becoming the limiting factor for further improvements in aerial ... -
Utenlandsoperasjoner : ferdigpakket nisjefyll eller militærmakt i løs vekt
(2006)The main topic of this report is the transformation of The Norwegian Armed Forces and how best to prepare for operations both at home and abroad. The balance between operations abroad and at home is discussed as well as ... -
Paths to global Jihad: Radicalisation and recruitment to terror networks - proceedings from a FFI seminar, Oslo, 15 March 2005
(2006)In order to effectively combat international terrorism, government authorities need to understand the process of recruitment to violent Islamist or jihadist movements. In this report, the Transnational Radical Islamism ... -
Russland og arbeidet med kjernefysisk ikke-spredning - en kartleggingsstudie
(2006)This study assesses Russia’s role and policy with regard to nuclear non-proliferation. It gives an overview of Russia’s nuclear sector and nuclear weapons, and discusses how Moscow goes about to prevent the outflow of ... -
Jihadism online - a study of how al-Qaida and radical Islamist groups use the Internet for terrorist purposes
(2006)This report offers an analysis of how al-Qaida and likeminded groups use the Internet for terrorist purposes. The phenomenon, referred to in the report as ‘jihadism online’, has increased dramatically over the past few ... -
Bistand med satellittbilder til øvelse "Green Osprey" i Senegal høsten 2005
(2006)In late autumn 2005 a section of the Norwegian Navy went to Senegal to attend to an international exercise. The maps available for the area were partly outdated, and had a smaller scale than was needed. FFI volunteered to ... -
Håndtering av IKT-kriser : aktører og roller
(2005)This report presents an analysis and overview of the different actors involved in ICT crisis management in Norway. It particularly studies the responsibilities, roles and the measures available, and also gives an introduction ... -
Aksidentell hypotermi og bruk av rotte som eksperimentell modell
(2000)Accidental hypothermia is an important clinical complication in emergency and disaster medicine. In military medicine even mild hypothermia may seriously influence the soldier’s physiological responses and therefore his ... -
Risikovurdering av Forsvarets bruk av hvitt fosfor i Troms - med tilleggsnotat FFI NOTAT-2006 00512: Analysetekniske problemer ved bestemmelse av konsentrasjonen til hvitt fosfor i vann
(2005)The aim of the report is to unravel potential environmental impacts of white phosphorus (WP) in military training areas in Troms. The potential health impacts on humans and grazers and other organisms that dwell in the ... -
Måling av lydtrykk fra undersjøiske mineeksplosjoner - virkninger på området for planlagt småbåthavn i Østhusvik
(2005)Acoustic measurements of underwater mine explosions in the Naval test site in Brimsefjorden have been performed in an area of a planned small craft harbour. This is done to determine the possibilities for damages on the ... -
AMRISK version 2.0 - documentation of verification tests
(2005)This report documents the test results for Version 2.0 of the ammunition storage risk analysis tool AMRISK. AMRISK 2.0 contains new models for air blast outside freestanding and earth-covered magazines. In addition the ... -
A study of computer interfaces for soldier systems - (a look at Ethernet, FireWire and USB)
(2005)This report looks at the challenges regarding computer communication and information sharing between the different NATO counteries soldier systems. The emphasis is on the wired interface for this data exchange. The report ... -
Aldringsstudier av PBXN-109 med RS-RDX Ch. 719 03 v. 78, I
(2005)Questions have been asked about the stability of RS-RDX with regard to shock sensitivity during the lifecycle of a PBX. To study if there are changes in product properties due to ageing of the RDX have we selected PBXN-109 ... -
Early and reliable detection and identification - an important element for efficient biodefense preparedness and response
(2005)This report is based on the paper presented by the author at the International Bioterrorism Conference in Fürigen, Switzerland April 2005, “Meeting the Challenges of Bioterrorism: Assessing the Threat and Designing ... -
Kontrollert mild/moderat hypotermi ved blødningssjokk
(2000)In a rat model of controlled haemorrhagic shock we have investigated the effects of therapeutic mild/moderate hypothermia on the early inflammatory response and organ function. In two groups of animals (n=13 in each ... -
VoluViz 1.3 report
(2005)VoluViz is a direct volume rendering application based on SGI's Volumizer 2 and OpenGL. It is designed for interactive viewing of three-dimensional volumetric data. The report is in three parts. The rst part gives an ... -
Retningslinjer for design av militære taktiske IP-nett
(2005)The objective of this report is to illustrate the type of performance expected in military tactical IP based networks and that it can be expected that most applications can be supported. However the performance heavily ...