Browsing Rapporter by Title
Now showing items 61-80 of 1943
-
Analyse av militære ledelsessystemer - en metodeoversikt - sluttrapport for FFI-prosjekt 735.1 "Ledelse og beslutningstrening på operasjonelt nivå"
(2000)In the post cold war period, information age has reached the military domain as well as the civilian. However, the cost of new technology is significant, and the consequences of alternative organisational forms or investment ... -
Analyse av sjøoperasjoner og -strukturer : sluttrapport
(2003)This report concludes the FFI project 824 “Analyse av sjøoperasjoner og -strukturer” (ANSJOS). It gives the background and motivation for the project, its change in objectives caused by changes in the timing of the ... -
Analyse av utslipp og spredning av klorgass ved bruk av FLUENT : en vurdering av modelloppbygning og beregning av spredning
(2008)Denne rapporten dokumenterer arbeid utført, som en del av FFI-prosjekt 1048: Masseødelegelsesvåpen – trussel og beredskap, av Jens W Bjerkelundi forbindelse med hans Masterstudium i Prosess-sikkerhetsteknologi ved Institutt ... -
Analyse og vurdering av ulike tilstandsformer til tungmetaller i avrenningsbekker fra skytebaner
(2004)The aim of this work was to study the speciation of lead (Pb), copper (Cu), zink (Zn) and antimony (Sb) in selected shooting ranges, and how the speciation of these elements varied under different conditions /episodic ... -
Analyses of the geolocation accuracy that can be obtained from shipborne sensors by use of time difference of arrival (TDOA), scanphase, and angle of arrival (AOA) measurements
(2010)We have performed a theoretical study of the geolocation accuracy that can be obtained from shipborne sensors by use of the localization methods: 1) time difference of arrival (TDOA), 2) scanphase, and 3) angle of arrival ... -
Analysestøtte for Forsvarets operasjoner : et år ved Fellesoperativt hovedkvarter
(2005)The report presents the results of a preliminary cooperation between the National Joint Headquarters (FOHK) and the Norwegian Defence Research Establishment (FFI) on analysis support for the planning and execution of ... -
Analysestøtte til militære operasjoner : utvalgte miljøer og en mulig norsk tilnærming
(2008)Gjennom operasjonsanalyse (OA) anvendes vitenskapelige metoder til støtte i beslutningsprosesser, noe som kan dras nytte av både ved planlegging og gjennomføring av militære operasjoner. En rekke nasjoner og NATO benytter ... -
Analysis of antimony (Sb) in environmental samples
(2012-02-28)Metals and metalloids from ammunition residues in shooting ranges and landfills may leach into the soil and surrounding watercourses and may pose a threat to exposed wildlife and humans. To assess the mobility of metals ... -
Analysis of bottom samples collected from the Norwegian Trench during Rumble Second Sea Trial
(2004)The RUMBLE second sea trial was carried out in the Norwgian Trench northwest of Stavanger in September –October 2002. 35 grab samples were collected during the experiment. This report presents the results of grain size ... -
Analysis of bottom samples from Vestfjorden collected during Rumble First Sea Trial
(2002)As a part of the RUMBLE first sea trial 15 sediment samples were taken from two areas in the inner and outer Vestfjorden, respectively. This report presents the results of the analysis of the sediment samples. The seabed ... -
Analysis of maritime operations - methodology and implementation
(2016-10-12)The report presents the accumulated experience, obtained methodology and associated recommendations gained through FFI project P1200 (Analysis of Maritime Operations) and P1337 (Analysis of Maritime Operations and ... -
Analysis of multirotor drone wind response
(2023-03-20)This report describes the fundamental mechanisms and response of a generic multirotor drone when subjected to gusting wind. We have used simplified dynamic models, both linear and nonlinear. Based on these, we have ... -
An analysis of required authentication of user traffic across networks
(2012-09-28)The analysis documented in this report identifies and assesses use cases that require authentication of user traffic across networks. The purpose of the analysis is to show that there exist several use cases where such ...