Browsing Rapporter by Title
Now showing items 790-809 of 1944
-
International Workshop on Munitions and Environment, Lillestrøm, Norway 14-16 May 2008
(2008)The report is a summary of the International Workshop on Munitions and Environment that was hosted by the Norwegian Defence Research Establishment at Hotel Arena in Lillestrøm, Norway 14-16 May 2008. Twenty four participants ... -
Interoperabilitet - kostnadsdriver og styrkemultiplikator
(2002)The main aim of this report is to analyse Interoperability (IO) of military forces and the consequences for Norway of more emphasise on IO, both nationally and in NATO. The first part of the report argues that IO is a ... -
Interoperable service discovery : experiments at Combined Endeavor 2009
(2009)This report summarizes the Web services discovery activities in project 1086. In particular, we discuss our experiments at Combined Endeavor, where we performed joint experiments with the NC3A in the Netherlands in 2009. ... -
Introduction to ionization pin probes to measure detonation velocity
(2015-02-09)Detonation velocity can be measured by different methods. Earlier two probes of isolated twisted copper wires have been used to measure the time the detonation front uses for a predefined distance. The drawback with this ... -
Introduction to shock-response spectra
(2020-11-21)A shock is a sudden and violent event. There are many examples of shocks, from earth quakes and explosions to controlled mechanical transient processes. In this report, we discuss theory, modeling and analysis methods ... -
An introduction to the Bluetooth technology and its applications
(2015-05-21)Blåtann (Bluetooth) er innebygget i ulike produkter. Teknologien er anvendt i helseprodukter, i forretningsprodukter for eksempel logistikk, og selv i sikkerhetsprodukter. I mange tilfeller kan slike blåtannenheter kople ... -
Introduksjon til simulering
(1994) -
Intrusion tolerant systems
(2007)Security intrusions and successful attacks on computer systems will occur regardless of the quality of the control and protection systems in use. It is therefore necessary to build computer systems that offer essential ... -
Inverse modeling of penetration into 12.7 cartridges
(2002)In this article a study of the forces caused by penetration of steel penetrators into cartridges of brass has been carried out. Experimental data was compared with simulations using the Nike-2D code and with solutions ... -
Investigation and risk assessment of ships loaded with chemical ammunition scuttled in Skagerrak
(2002)The Norwegian authorities gave in 1945 permission to scuttle ships loaded with captured chemical ammunition on board in an area approximately 14 km X 4 km in size, 25 nautical miles south-east of Arendal. The total amount ... -
Investigation of conductive adhesive in harsh environment - the ReMi Fuze Case
(2012-03-12)FFI and Nammo have participated in the project ”Fine Pitch Interconnect of Microelectronics and Microsystems for use in Rough Environments” (ReMi). The project has to a large extent been founded by the Norwegian Research ... -
Ionospheric influence on X-band radio signals
(2003)We systematically study the possible effects of the ionosphere on radiowave propagation in the X-band. The quiet ionosphere and various types of ionosphere disturbance are considered. We place special emphasis on high ... -
Irak og terrortrusselen - eit oversyn over terrorgrupper med tilknyting til det irakiske regimet
(2003)The present report assesses the terrorist threats emanating from the current conflict in Iraq, focusing on terrorist organisations with past and/or present links to the Iraqi regime. Over the years, Bagdad has supported a ... -
Irans kjernefysiske program : for kraftproduksjon eller kjernevåpen
(2008)Denne rapporten omhandler Irans utvikling av kjernefysisk infrastruktur, og det foretas vurderinger knyttet til hvilket potensiale denne infrastrukturen i nær framtid vil kunne gi Iran til å produsere kjernekraft og/eller ... -
The Iraq hostage crisis : abductions in Iraq, April-August 2004
(2004)This report provides a brief and preliminary overview of the phenomenon of abductions of foreigners in Iraq between 1 April and 31 August 2004. Having reconstructed a timeline which includes 63 abduction incidents (159 ... -
Iridium Certus IP performance in the Arctic - data analysis
(2020-04-24)In the last years, there has been an increased military and civilian activity in the Arctic areas. Earlier studies from the Norwegian Defence Research Establishment (FFI) have concluded that a non-geostationary satellite ... -
Is Norwegian long term defence planning risk based?
(2013-02-01)The central and unavoidable challenge to defence planning is how to cope with uncertainty. As a strategic defence planner, the aim is to contribute to a long term defence plan which is a foundation for a viable national ... -
Islamic Jihad Union - al-Qaida´s key to the Turkic world
(2009)The Turkic peoples have assumed a relatively marginal role in global jihadism. The group Islamic Jihad Union (IJU) appears to have changed this. It broke off from the Islamic Movement of Uzbekistan in 2002, after the ... -
Islamist insurgencies, diasporic support networks, and their host states - the case of the Algerian GIA in Europe 1993-2000
(2001)Globalisation and transnational migration have increased the impact of insurgencies overseas on European security. The presence of a significant Muslim diaspora in Europe, and the emergence of Islamist support networks ... -
Islamist opposition in the Islamic Republic : Jundullah and the spread of extremist Deobandism in Iran
(2009)This report examines the Iranian Jundullah movement, a Sunni Muslim terrorist group waging a small-scale war against the Iranian government and operating in the Sistan va Baluchestan region of south-eastern Iran. Created ...