Dissertations / Theses on the topic 'Dept of Defence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Dept of Defence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Van, Dyk Johannes Jacobus. "An evaluation of the South African Department of Defence's policy on Defence Industrial Participation (DIP) as a defence industrial development mechanism." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/1067.
Full textEccleston, Anthony L., and n/a. "Coordinating information provision in government agencies using an integrated information management strategy." University of Canberra. Information, Language & Culture Studies, 1996. http://erl.canberra.edu.au./public/adt-AUC20060404.123006.
Full textQwele, Gcobani. "An analysis of the role of labour relations practitioners as change agents : a case study on the Department of Defence." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/2109.
Full textENGLISH ABSTRACT: Chapter 1 outlines the purpose of the research, provides the background on the way in which LR matters are currently managed and handled in the Department of Defence (DOD), identifies the research problem, and outlines the research design and methodology. Chapter 2 explores the theoretical framework of the principles of labour relations and management of change. The chapter reveals that the principles of labour relations hold persons in management or supervisory positions responsible for managing LR matters, and suggests that LR practitioners should therefore be able to equip them with adequate skills and knowledge of the procedures for dealing with LR matters in the workplace. The chapter also reveals that the principles of the management of change suggest that the employees should be prepared for change; that a change agent, who should create an environment conducive to change through lobbying the support of persons in management and employees for the proposed change, should be identified; and that resistance to change should be identified at an early stage of the change process in order to eliminate it. Change agents are encouraged not to dominate the change process, but rather to facilitate it in order to ensure that the organisation and its employees drive the change process themselves. Chapter 3 explores the objectives of the LR support function as well as the content of LR practices in order to determine the extent to which LR practitioners can become change agents in the DOD. The chapter reveals that LR at grassroots level is practiced in the way that has resulted to conflicts and costly litigations. In this chapter the regulatory framework and procedures that impede LR practitioners from becoming change agents are also analysed. Chapter 4 covers the data collection process and the analysis thereof. The data reveals that the LR structure at grassroots level is not conducive for the professional delivery of enhanced LR services; that the target group does not have access to adequate resources that would enable them to execute their functions; and that empowerment programmes are implemented to equip the target group with adequate qualifications, skills and or knowledge to be able to render enhanced LR services. The main findings were that guidance is lacking to ensure that LR systems, structures and processes at grassroots level are in place, to ensure that LR matters are managed and handled in a fair and responsible way; to ensure that LR staff with adequate competences to render LR services is appointed; and to ensure that the LR department is active enough and lead the execution of enhanced LR services. In Chapter 5 the main findings are analysed and it is concluded that LR practitioners are unable to become change agents if LR systems, structures and processes are not in place. It is encouraged that LR practitioners should form a cohesive but diverse team that is able to render enhanced LR services, and that the LR department should take a leading role. It is recommended that a study be conducted to determine overarching LR strategy that would guide the establishment of LR systems, the determination of LR structure and processes for dealing with LR matters, and the empowerment programmes for ensuring the professional delivery of enhanced LR services.
AFRIKAANSE OPSOMMING: Hoofstuk 1 skets die doel van die navorsing en verskaf agtergrond oor die manier waarop arbeidsverhoudinge tans in die Departement van Verdediging bestuur en hanteer word. In hierdie hoofstuk word die navorsingsprobleem ook geïdentifiseer en die navorsingsontwerp en -metodologie uitgestippel. Hoofstuk 2 ondersoek die teoretiese raamwerk van arbeidsverhoudingbeginsels en die bestuur van verandering. Die hoofstuk openbaar dat die beginsels van arbeidsverhoudinge persone in bestuurs- of toesighoudende posisies verantwoordelik hou vir die bestuur van arbeidsverhoudingkwessies. Daar word voorgestel dat arbeidsverhoudingpraktisyns daarom in staat moet wees om hierdie persone toe te rus met voldoende vaardighede en kennis van die prosedures vir die hantering van arbeidsverhoudingkwessies in die werkplek. Die hoofstuk openbaar ook dat die beginsels van die bestuur van verandering aandui dat werknemers op verandering voorbereid moet wees en dat ’n veranderingsagent geïdentifiseer moet word. Só ’n agent moet ’n atmosfeer skep wat bevorderlik vir verandering is deur steun vir die voorgestelde verandering van persone in bestuur en werknemers te werf. Verder moet weerstand teen verandering in ’n vroeë stadium in die veranderingsproses vasgestel word om dit sodoende uit te skakel. Veranderingsagente word aangemoedig om nie die veranderingsproses te oorheers nie, maar eerder te vergemaklik om te verseker dat die instelling en sy werknemers die veranderingsproses self dryf. Hoofstuk 3 ondersoek die teikens van die arbeidsverhoudingsteunfunksie asook die inhoud van arbeidsverhoudingpraktyke om te bepaal tot watter mate arbeidsverhoudingpraktisyns veranderingsagente in die Departement van Verdediging kan word. Hierdie hoofstuk onthul dat arbeidsverhoudinge op grondvlak op ’n manier beoefen word wat reeds tot konflik en duur litigasies gelei het. In hierdie hoofstuk word die regulerende raamwerk en prosedures geanaliseer wat arbeidsverhoudingpraktisyns verhinder om veranderingsagente te word. Hoofstuk 4 dek die data-insamelingsproses en analise van hierdie proses. Die data onthul dat die arbeidsverhoudingstruktuur op grondvlak nie bevorderlik is vir die professionele lewering van verbeterde arbeidsverhoudingdienste nie, en dat die teikengroep nie toegang tot voldoende bronne het wat hulle in staat sou stel om hulle funksies uit te voer nie. Die data openbaar verder dat bemagtigingsprogramme toegepas word om die teikengroep met voldoende opleiding, vaardighede en/of kennis toe te rus om verbeterde arbeidsverhoudingdienste te lewer. Die hoofbevinding was dat daar gebrekkige leiding is om te verseker dat arbeidsverhoudingstelsels, -strukture en -prosesse op grondvlak gereed is; dat arbeidsverhoudingkwessies op ’n regverdige en verantwoordelike manier bestuur en hanteer word; dat arbeidsverhoudingpersoneel met voldoende bevoegdhede aangestel word om arbeidsverhoudingdienste te lewer, en dat die arbeidsverhoudingdepartement aktief genoeg is en die voortou neem in die uitvoering van verbeterde arbeidsverhoudingdienste. In hoofstuk 5 word die hoofbevindinge geanaliseer en die gevolgtrekking gemaak dat arbeidsverhoudingpraktisyns nie in staat is om veranderingsagente te word indien arbeidsverhoudingstelsels, -strukture en -prosesse nie gereed is nie. Arbeidsverhoudingpraktisyns word aangemoedig om ’n verenigde maar diverse span te vorm wat verbeterde arbeidsverhoudingdienste kan bied en die arbeidsverhoudingdepartement word aangemoedig om ’n leidende rol in hierdie verband te speel. Daar word aanbeveel dat ’n studie gedoen word om ’n oorkoepelende arbeidsverhoudingstrategie vas te stel wat as riglyn kan dien vir die stigting van arbeidsverhoudingstelsels, die bepaling van arbeidsverhoudingstruktuur en prosesse om met arbeidsverhoudingkwessies om te gaan, en bemagtigingsprogramme om te verseker dat verbeterde arbeidsverhoudingdienste professioneel gelewer word.
Hendricksen, Andrew D. "The optimal employment and defense of a deep seaweb acoustic network for submarine communications at speed and depth using a defender-attacker-defender model." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37637.
Full textThe need for submarines to execute communications at speed and depth (CSD) is a vital link in our nations and our allies defense network. A promising method to do this without limiting the inherent stealth and advantage of submarines is to utilize Deep Seaweb, an underwater acoustic communication network. The challenge is to be able to optimally employ such a network in a constantly changing environment. In particular, our goal is to develop a network that is resilient to a given number of adversary attacks that can disable individual nodes. To this end, we build and solve a defender-attacker-defender (DAD) optimization model that provides the optimal location of repeater nodes that maintains as much of the function of the network as possible, even after a worst-case attack. We analyze four initial basic network configurations and compare the resulting optimum node placements when the network is not subject to attack, when the network is subject to two attacks, and when the flow of each network configuration is completely blocked by attacks.
Yun, Ronald E. "Network defense-in-dept : evaluating host-based intrusion detection systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA395808.
Full textBarnes, David S. "A defense-in-depth approach to phishing." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FBarnes.pdf.
Full textThesis Advisor(s): Craig H. Martell, Neil C. Rowe. "September 2006." Includes bibliographical references (p. 71). Also available in print.
Anderson, John C. Scott Clifford G. "Benchmarking and performance metrics for a defense distribution depot /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA359952.
Full text"December 1998." Thesis advisor(s): Kevin R. Gue, Jane Feitler. Includes bibliographical references (p. 69-70). Also available online.
Anderson, John C., and Clifford G. Scott. "Benchmarking and performance metrics for a defense distribution depot." Thesis, Monterey, California. Naval Postgraduate School, 1998. http://hdl.handle.net/10945/32605.
Full textPennock, Michael James. "The economics of enterprise transformation." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28171.
Full textCommittee Chair: Rouse, William; Committee Member: Boff, Kenneth; Committee Member: Cross, Stephen; Committee Member: Griffin, Paul; Committee Member: Keskinocak, Pinar.
Rush, Marvin P., and Eric H. Burks. "Implementing a fast-pick area at Defense Distribution Center San Joaquin (DDJC)." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1139.
Full textIn a warehouse, a fast-pick-area is a region containing many items that can be retrieved quickly and inexpensively to fulfill customer orders. The Defense Distribution Center San Joaquin (DDJC) implements a similar strategy on a wider scale by designating one of many warehouses as a "fast-pick-area." We develop a plan to optimally slot the fast-pick area at DDJC using a computer model that captures the tradeo.s of storage space versus cost of replenishment from bulk storage. Our results suggest that defense distribution centers should consider implementing a fast pick area as a means of reducing operating costs.
Lieutenant Commander, United States Navy
Karlsson, Sixten. "Fred och säkerhet? : En studie om det Svenska Försvaret utifrån tre perspektiv, Bonsdorff, Andrén och Clausewitz." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-44224.
Full textHitefield, Seth D. "A Defense-In-Depth Security Architecture for Software Defined Radio Systems." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/96594.
Full textDoctor of Philosophy
In recent years, wireless devices and communication systems have become a common part of everyday life. Mobile devices are constantly growing more complex and with the growth in mobile networks and the Internet of Things, an estimated 20 billion devices will be connected in the next few years. Because of this complexity, there has been a recent shift towards using software rather than hardware for the primary functionality of the system. Software enables an easier and faster development process, longer product lifetimes through over- the-air updates, and better adaptability for extremely congested environments. However, these complex software systems can be susceptible to attack through vulnerabilities in the radio interfaces that allow attackers to completely control a targeted device. Much of the existing wireless security research only focuses on vulnerabilities within different protocols rather than considering the possibility of vulnerabilities in the radios themselves. This work specifically focuses on this new threat and demonstrates example exploits of software radios. We then introduce a new security model intended to protect against these attacks. The main goal of this dissertation is to introduce a new defense-in-depth security architecture for software radios that protects the system by isolating components within a waveform into different security zones. Exploits against the system are contained within the zones and unable to compromise the overall system. Unlike other security models, our model protects from exploits within the radio protocol stack itself and not just the higher layer application. Different isolation mechanisms such as containers or virtual machines can be used depending on the security risk imposed by a component and any security requirements for the system. However, adding these isolation environments incurs a performance overhead for applications. We also perform a performance analysis with several example applications and show the overhead generated from the added isolation can be minimal. Therefore, the defense-in-depth model should be the standard method for architecting wireless communication systems. We finally present a GNU Radio based framework for developing waveforms using the defense- in-depth approach.
Olofsson, Mattias. "Att stärka det svenska samhället vid svåra påfrestningar i fred : en uppgift för dagens Försvarsmakt?" Thesis, Swedish National Defence College, Swedish National Defence College, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-46.
Full textFörsvarsmakten har sedan sekelskiftet gått ifrån att vara ett invasionsförsvar till att bli ett insatsförsvar. Under denna omvandling har Försvarsmakten blivit allt mindre och fått en mer internationell inriktning. Förband har lagts ned, personal sagts upp och materiel skrotats. Författaren är intresserad av att se hur detta har påverkat Försvarsmakten som en samhällsresurs.
Problemet som ställs i uppsatsen är huruvida regeringen har anpassat Försvarsmaktens uppgift att stärka det svenska samhället vid svåra påfrestningar i fred, mot bakgrund av den omvandling som skett. Syftet med denna uppsats är sålunda att undersöka och jämföra om uppgiften att stärka det svenska samhället vid svåra påfrestningar i fred har förändrats, utvecklats eller anpassats till det nya insatsförsvaret som Sverige har idag.
Som metod används en komparativ och kvalitativ textanalys av utvalda propositioner, departementsserier och regleringsbrev. De fakta i dokumenten som berör uppsatsämnet analyseras och jämförs, för att sedan sammanfattas och diskuteras.
Resultatet i uppsatsen påvisar att regeringen inte har ändrat uppgiften att stärka det svenska samhället vid svåra påfrestningar i fred, som ställs till Försvarsmakten. Men det påvisar även att en kontinuerlig anpassning av uppgiften sker i form av ett samarbete med andra myndigheter, denna utveckling kan följas på olika sätt i de utvalda källorna.
Författaren har dragit slutsatser kring det presenterade resultatet och kommit fram till att regeringen inte behövt ändra uppgiften. Men för att kunna effektivisera utnyttjandet av de resurser som Försvarsmakten kan tillföra vid svåra påfrestningar bör regeringen utveckla och precisera hur Försvarsmakten skall utnyttjas med störst effektivitet.
The Swedish Armed Forces has, since the turn of the century, transformed from an invasion defence to a type of mission oriented defence. This means that the Swedish armed forces have become smaller in volume, material has been terminated, a lot of personnel have been terminated and the amount of conscripts heavily reduced. The author is interested in how this has affected the Swedish armed force as recourse to the Swedish society.
Before and under the transformation, one of the Swedish armed forces duties has been to strengthen the Swedish society when hard tensions have emerged in peacetime. This duty has been presented in the regulations that the Swedish government give to the Swedish Armed Forces every year. The duty is also one of the duties presented in the regulation that controls the Swedish Armed Forces activities.
The problem that is presented in the essay is how the Swedish government has adjusted this duty to the Swedish Armed Forces with this transformation in mind. The purpose of this essay is therefore to investigate and compare if the duties have been changed, developed and/or adjusted to the new Swedish armed forces as it is today.
The result of this paper shows that the government has not changed the duty to strengthen the society when hard tensions come. However, it also shows that there is a continuing adjustment to the duty in form of cooperation with other authorities. This development can be seen in different ways in the varying sources that have been presented in the essay.
The author has drawn some conclusions concerning the presented results and reached a conclusion that the government does not have to change the duty. It can be preserved as it is today. In order to use the resources that the Swedish armed forces contribute more efficiently, the government has to develop and specify how the Swedish armed forces can be used with the greatest efficiency.
Asklander, Niklas, and Christian Schmidt. "ILLUSIONEN OM DET VÄPNADE ANGREPPET." Thesis, Högskolan i Halmstad, Akademin för ekonomi, teknik och naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42330.
Full textFörsvarsberedningen har föreslagit att Försvarsmakten åter ska få huvuduppgiften att försvara Sverige mot väpnat angrepp. Försvar mot väpnat angrepp har fått ett allt större fokus sedan försvarsbeslutet 2015 och inför det kommande försvarsbeslutet föreslås en ytterligare inskärpning. Är politiken och Försvarsmakten överens om innebörden utifrån samtidens hot? Studiens övergripande syfte är att förstå samspelet mellan politiken och Försvarsmakten i utformningen och inriktningen av Försvarsmakten. Studien tar avstamp i förspelet inför det planerade försvarsbeslutet 2020 och tar sikte på att förstå en del av detta stora sammanhang genom att fokusera på att identifiera samstämmigheten mellan försvarsutskottet och Försvarsmaktens militärstrategiska ledning om innebörden av att väpnat angrepp ska vara dimensionerande för Försvarsmaktens inriktning. Därtill identifieras viktiga faktorer som påverkar samspelet mellan politiken och Försvarsmakten. Empirin är hämtad från internationell rätt, Försvarsmaktens militärstrategiska doktrin, försvarsberedningens rapporter samt intervjuer med försvarsutskottet och Försvarsmaktens militärstrategiska ledning. Resultatet visar på att det saknas samstämmighet såväl inom försvarsutskottet som mellan försvarsutskottet och Försvarsmakten avseende innebörden av Försvarsmaktens föreslagna huvuduppgift samt hur den ska förhålla sig till övriga uppgifter. Det råder en illusion om innebörden av ett väpnat angrepp. I verkligheten är det regeringen som under konstitutionellt ansvar fastställer vad som är ett väpnat angrepp när en aggressionshandling sker. Därtill identifieras lämpligheten av att ömsesidigt förbättra förtroendet mellan politiken och Försvarsmakten genom att öka kunskapen om varandras realiteter.
Hedayati, Vahid Peyman. "Automatic defect detection and depth estimation using pulsed thermography." Master's thesis, Université Laval, 2014. http://hdl.handle.net/20.500.11794/25638.
Full textNon-Destructive Testing (NDT) is an aspect of science concerning on uniformity, quality and serviceability of materials and their components. NDT techniques attempt to inspect and measure significant features of materials without changing or destroying their structure or functionality. NDT makes it possible to observe the internal properties of parts and detect the undersurface defects. NDT has progressively become an important technology to assure safety and reliability of many system components in the design, manufacturing and development areas. Infrared thermography is essentially a fast non-contact NDT inspection method that uses thermographic cameras. This technique detects the infrared energy emitted from objects and displays the corresponding temperature distributions on the specimen. In this project, we aim to use infrared thermography for detecting subsurface defects. Localizing the defects and estimating their depths are the important problems to be addressed in our research project. The manuscript investigates different methods related to these challenges.
Hedlöf, Jonas, and Johan Lenngren. "Drivmedelsförsörjning – En interorganisatorisk möjlighet eller utmaning : ”Det är det som är i tanken som räknas”." Thesis, Högskolan i Halmstad, Akademin för lärande, humaniora och samhälle, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40024.
Full textThe aim of this thesis, is to investigate the conditions for the Swedish Military Defence Force to incorporate support from the Business sector. The study focusses on the provision of fuel from business sector in the event of an armed attack.Our thesis is conducted from current military and civil defence capabilities, which have been under reconstruction for a couple of years.By conducting a qualitative interview study with representatives from the Swedish Armed Forces, selected Public Agencies and the Business sector, we investigated if there is a will and identified preconditions and factors that we deem crucial for success.We applied a method of the analysis inspired by Grounded Theory and search for factors that can affect the different actors in this study. Results lead to different theories that are supported by existing organisational and inter organisational theories.Our conclusions are that in spite of great differences between the different actors’ properties, there are still good expectations within and between the actors to reach a common goal. However, at present there are limiting factors preventing exploring the position, such as the requirement for mandates and regulations to regulate responsibilities and tasks within, and between the military and the civilian defence.
Avdellas, Nicholas John. "The Public-Private Dilemma: A Strategic Improvement Agenda for U.S. Department of Defense Depot Maintenance." Diss., Virginia Tech, 2005. http://hdl.handle.net/10919/26847.
Full textPh. D.
Malokofsky, Nicholas C. "Blood and treasure: the U.S. debt and its implications for national defense and security." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27862.
Full textÅberg, Erik. "Review of an industrially implemented model of zoning principles for electricity distribution and energy production." Thesis, KTH, Industriella informations- och styrsystem, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81329.
Full textColvin, Janet D. (Janet Delores). "The Effectiveness of Institutionalization of a Curricular Change in Department of Defense Dependents' Schools." Thesis, University of North Texas, 1995. https://digital.library.unt.edu/ark:/67531/metadc278839/.
Full textVesterlund, Mattias. ""Det gäller dig och din familj!" : Svenskt civilförsvar och vardagslivets militarisering under kalla kriget 1945-1975." Thesis, Uppsala universitet, Historiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-343198.
Full textGivens, Mark Allen. "Modeling and analyzing intrusion attempts to a comuter network operating in a defense-in-depth posture /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FGivens.pdf.
Full textThesis advisor(s): Alex Bordetsky, Joe Roth. Includes bibliographical references (p. 89-90). Also available online.
Givens, Mark Allen. "Modeling and analyzing intrusion attempts to a computer network operating in a defense-in-depth posture." Thesis, View thesis View thesis via DTIC web site, 2004. http://handle.dtic.mil/100.2/ADA427180.
Full textTitle from title screen (viewed Mar. 15, 2005). "September 2004." "ADA427180"--URL. Includes bibliographical references (p. 89-90). Also issued in paper format.
Hagene, Matthew Ray. "Momentum Defect Superposition Model for Predicting Depth-Averaged Velocities in Trapezoidal Channels." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/theses/553.
Full textHagberg, Nelly. ""Det är demokratin som är gemensam" : En komparativ kvalitativ innehållsanalys av nationell biblioteksstrategi och nationell säkerhetsstrategi." Thesis, Uppsala universitet, Institutionen för ABM, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-415049.
Full textHolmberg, Sara, and Martin Linjo. "Det svenska skyddsrumsbestådet : en undersökning av skyddsrummens relevans i Sverige." Thesis, KTH, Fastigheter och byggande, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-297483.
Full textIn 2002, the Swedish government decided to stop building air raid shelters. Sweden has per capita the second most air raid shelters in the world. A large number of air raid shelters in Sweden, combined with the decision to stop constructing them, has left Sweden at a crossroad. How much should Sweden care about the air raid shelters? To foreign enemies, the air raid shelters may seem as yet another obstacle to invading, because of the opportunity given to the Swedish civilians to be safe from bombs and the effects of war. Even though the warfare has changed during the years and new strategies have been developed, a safe place for civilians will strengthen the defending side. For this defense to work, the air raid shelters have to be constructed at available locations for civilians, be equipped with the material needed, be operated by a civilian and the shelters have to be in good condition. It was during the Cold War era that Sweden built most of its air raid shelters. With a lot of decades and different rules of construction passing, many of these air raid shelters have problems now. The problems concern materials missing, air filters which have passed their best before date, the shelters being renovated to something completely different, or simply that the shelter cannot guarantee the function that it once did. In Sweden, The Swedish Civil Contingencies Agency (MSB) is the agency responsible for the condition of the air raid shelters. The agency has the utmost responsibility that the air raid shelters will be safe in case of emergency. To fulfill that, the agency executes supervision and regulatory control of the shelters. In this essay, the condition of the Swedish air raid shelters and the problems that come along with them get examined. We also found it interesting to examine the air raid shelters' relevance to Swedish society from a historic and present-day point of view. A qualitative and legal dogmatic method has been used. The conclusions that could be drawn from this essay is that Sweden’s air raid shelters are in different conditions regarding standard and quality. It can also be established that there aren’t enough regulatory controls being executed. Finally, the Swedish air raid shelters do serve a purpose for the Swedish society even though they have been built for other reasons.
Ibarra, Castanedo Clémente. "Quantitative subsurface defect evaluation by pulsed phase thermography: depth retrieval with the phase." Thesis, Université Laval, 2005. http://www.theses.ulaval.ca/2005/23016/23016.pdf.
Full textPulsed Phase Thermography (PPT) is a NonDestructive Testing and Evaluation (NDT&E) technique based on the Fourier Transform that can be thought as being the link between Pulsed Thermography, for which data acquisition is fast and simple; and Lock-In thermography, for which depth retrieval is straightforward. A new depth inversion technique using the phase obtained by PPT is proposed. The technique relies on the thermal diffusion length equation, i.e. μ=(α /π·f)½, in a similar manner as in Lock-In Thermography. The inversion problem reduces to the estimation of the blind frequency, i.e. the limiting frequency at which a defect at a particular depth presents enough phase contrast to be detected on the frequency spectra. However, an additional problem arises in PPT when trying to adequately establish the temporal parameters that will produce the desired frequency response. The decaying thermal profiles such as the ones serving as input in PPT, are non-periodic, non-band-limited functions for which, adequate sampling Δt, and truncation w(t), parameters should be selected during the signal discretization process. These parameters are both function of the depth of the defect and of the thermal properties of the specimen/defect system. A four-step methodology based on the Time-Frequency Duality of the discrete Fourier Transform is proposed to interactively determine Δt and w(t). Hence, provided that thermal data used to feed the PPT algorithm is correctly sampled and truncated, the inversion solution using the phase takes the form: z=C 1 μ, for which typical experimental C 1 values are between 1.5 and 2. Although determination of fb is not possible when working with badly sampled data, phase profiles still present a distinctive behavior that can be used for depth retrieval purposes. An apparent blind frequency f’b , can be defined as the blind frequency at a given phase threshold φd , and be used in combination with the phase delay definition for a thermal wave: φ=z /μ, and the normalized diameter, Dn=D/z, to derive an alternative expression. Depth extraction in this case requires an additional step to recover the size of the defect.
La Termografía de Fase Pulsada (TFP) es una técnica de Evaluación No-Destructiva basada en la Transformada de Fourier y que puede ser vista como el vínculo entre la Termografía Pulsada, en la cual la adquisición de datos se efectúa de manera rápida y sencilla, y la Termografía Modulada, en la que la extracción de la profundidad es directa. Un nuevo método de inversión de la profundidad por TFP es propuesto a partir de la ecuación de la longitud de difusión térmica: μ=(α /π·f)½. El problema de inversion se reduce entonces a la determinación de la frecuencia límite fb (frecuencia a la cual un defecto de profundidad determinada presenta un contraste de fase suficiente para ser detectado en el espectro de frecuencias). Sin embargo, las curvas de temperatura utilizadas como entrada en TFP, son señales no-periódicas y no limitadas en frecuencia para las cuales, los parámetros de muestreo Δt, y de truncamiento w(t), deben ser cuidadosamente seleccionados durante el proceso de discretización de la señal. Una metodología de cuatro etapas, basada en la Dualidad Tiempo-Frecuencia de la Transformada de Fourier discreta, ha sido desarrollada para la determinación interactiva de Δt y w(t), en función de la profundidad del defecto. Así, a condición que la información de temperatura sea correctamente muestreada y truncada, el problema de inversión de la profundidad por la fase toma la forma : z=C 1 μ, donde los valores experimentales de C 1 se sitúan típicamente entre 1.5 y 2. Si bien la determinación de fb no es posible en el caso de datos térmicos incorrectamente muestreados, los perfiles de fase exhiben de cualquier manera un comportamiento característico que puede ser utilizado para la extracción de la profundidad. La frecuencia límite aparente f’b , puede ser definida como la frecuencia límite evaluada en un umbral de fase dado φd , y puede utilizarse en combinación con la definición de la fase para una onda térmica: φ=z /μ, y el diámetro normalizado Dn , para derivar una expresión alternativa. La determinación de la profundidad en este caso, requiere de una etapa adicional para recuperar el tamaño del defecto.
Ibarra, Castanedo Clemente. "Quantitative subsurface defect evaluation by pulsed phase thermography: depth retrieval with the phase." Doctoral thesis, Université Laval, 2005. http://hdl.handle.net/20.500.11794/18116.
Full textPulsed Phase Thermography (PPT) is a NonDestructive Testing and Evaluation (NDT& E) technique based on the Fourier Transform that can be thought as being the link between Pulsed Thermography, for which data acquisition is fast and simple; and Lock-In thermography, for which depth retrieval is straightforward. A new depth inversion technique using the phase obtained by PPT is proposed. The technique relies on the thermal diffusion length equation, i.e. μ=(α /π·f)½, in a similar manner as in Lock-In Thermography. The inversion problem reduces to the estimation of the blind frequency, i.e. the limiting frequency at which a defect at a particular depth presents enough phase contrast to be detected on the frequency spectra. However, an additional problem arises in PPT when trying to adequately establish the temporal parameters that will produce the desired frequency response. The decaying thermal profiles such as the ones serving as input in PPT, are non-periodic, non-band-limited functions for which, adequate sampling Δt, and truncation w(t), parameters should be selected during the signal discretization process. These parameters are both function of the depth of the defect and of the thermal properties of the specimen/defect system. A four-step methodology based on the Time-Frequency Duality of the discrete Fourier Transform is proposed to interactively determine Δt and w(t). Hence, provided that thermal data used to feed the PPT algorithm is correctly sampled and truncated, the inversion solution using the phase takes the form: z=C 1 μ, for which typical experimental C 1 values are between 1.5 and 2. Although determination of fb is not possible when working with badly sampled data, phase profiles still present a distinctive behavior that can be used for depth retrieval purposes. An apparent blind frequency f’b , can be defined as the blind frequency at a given phase threshold φd , and be used in combination with the phase delay definition for a thermal wave: φ=z /μ, and the normalized diameter, Dn=D/z, to derive an alternative expression. Depth extraction in this case requires an additional step to recover the size of the defect.
La Termografía de Fase Pulsada (TFP) es una técnica de Evaluación No-Destructiva basada en la Transformada de Fourier y que puede ser vista como el vínculo entre la Termografía Pulsada, en la cual la adquisición de datos se efectúa de manera rápida y sencilla, y la Termografía Modulada, en la que la extracción de la profundidad es directa. Un nuevo método de inversión de la profundidad por TFP es propuesto a partir de la ecuación de la longitud de difusión térmica: μ=(α /π·f)½. El problema de inversion se reduce entonces a la determinación de la frecuencia límite fb (frecuencia a la cual un defecto de profundidad determinada presenta un contraste de fase suficiente para ser detectado en el espectro de frecuencias). Sin embargo, las curvas de temperatura utilizadas como entrada en TFP, son señales no-periódicas y no limitadas en frecuencia para las cuales, los parámetros de muestreo Δt, y de truncamiento w(t), deben ser cuidadosamente seleccionados durante el proceso de discretización de la señal. Una metodología de cuatro etapas, basada en la Dualidad Tiempo-Frecuencia de la Transformada de Fourier discreta, ha sido desarrollada para la determinación interactiva de Δt y w(t), en función de la profundidad del defecto. Así, a condición que la información de temperatura sea correctamente muestreada y truncada, el problema de inversión de la profundidad por la fase toma la forma : z=C 1 μ, donde los valores experimentales de C 1 se sitúan típicamente entre 1.5 y 2. Si bien la determinación de fb no es posible en el caso de datos térmicos incorrectamente muestreados, los perfiles de fase exhiben de cualquier manera un comportamiento característico que puede ser utilizado para la extracción de la profundidad. La frecuencia límite aparente f’b , puede ser definida como la frecuencia límite evaluada en un umbral de fase dado φd , y puede utilizarse en combinación con la definición de la fase para una onda térmica: φ=z /μ, y el diámetro normalizado Dn , para derivar una expresión alternativa. La determinación de la profundidad en este caso, requiere de una etapa adicional para recuperar el tamaño del defecto.
Kivett, Ryan B. "Partnering defense depots with industry for the performance of depot-level maintenance : a case analysis of the AIM XXI program." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341442.
Full text"December 1997." Thesis advisor(s): Mark W. Stone, David F. Matthews. Includes bibliographical references (p. 77-80). Also available online.
Darabi, Akbar. "Detection and estimation of defect depth in infrared thermography using artificial neural networks and fuzzy logic." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0016/NQ55806.pdf.
Full textWalldén, Dean. "Det Militära Maktmedlet : En politisk pusselbit vid upprustning av nationell försvarsförmåga." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10016.
Full textAlexander, Rodney T. "Can the analytical hierarchy process model be effectively applied in the prioritization of information assurance defense in-depth measures? - a quantitative study." Thesis, Capella University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10257625.
Full textOrganizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection systems, and password procedures across their enterprises to plan strategically and manage IT security risks. This quantitative study explores whether the analytical hierarchy process (AHP) model can be effectively applied to the prioritization of information assurance defense in-depth measures. In response to these threats, the President, legislators, experts, and others have characterized cybersecurity as a pressing national security issue. The methods used in this study consisted of emailing study participants a survey requesting that they prioritize five defense in-depth information assurance measures, anti-virus, intrusion detection, password, smart-cards, and encryption, with a range of responses from 1-5 using a Likert scale to consider standard cost, effectiveness, and perceived ease of use in terms of protection of organizational computing devices. The measures were then weighted, based on ranking. A pair-wise comparison of each of the five measures were then made using AHP to determine whether the Likert scale and the AHP model could be effectively applied to the prioritization of information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that AHP does not affect the relationship between the information technology analysts’ prioritization of five defense in-depth dependent variables and the independent variables of cost, ease of use, and effectiveness in protecting organizational devices against cyber-attacks.
Guild, Jennifer A. "Scripting quality of security service (QoSS) safeguard measures for the suggested INFOCON system." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1188.
Full textThe existing INFOCON system is an information warning system that the DOD maintains. It is not formally correlated to other warning systems, such as DEFCON, FPCON/THREATCON, WATCHCONs, SANS INFOCON, or the Homeland Security Advisory System Threat condition. The criteria for each INFOCON level are subjective. The INFOCON recommended actions are a mix of policy and general technical measures. The INFOCON system vaguely follows the Defense in Depth network defense methodology. This thesis examines the foundations for the existing INFOCON system and presents an evolved INFOCON system. The focus will be on the security of the DOD information infrastructure and the accomplishment of the mission, as well as the usability and the standardization of the INFOCON warning system. The end result is a prototype that is a set of predefined escalation scripts for the evolved INFOCON system's safeguard measures.
Civilian, Federal Cyber Service Corps, Naval Postgraduate School
Kullander, Nathalia. "En analys kring det civila försvaret på lokal nivå. : En jämförande studie mellan Värmland och Örebros resurser och samarbetsförmågor." Thesis, Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85130.
Full textNolan, Heather R. "Understanding Outcomes in the Giant Omphalocele Population: An In-depth Look at a Single Center Comprehensive Experience." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1554120110247392.
Full textElman, Kim. ""NI ÄR PROPAGANDA!" : Ett bidrag till det psykologiska försvaret." Thesis, Försvarshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5843.
Full textAndersson, Daniel, and Jesper Sparre. "Svenskt-finskt armésamarbete på taktisk nivå : – Vad finns det för förutsättningar?" Thesis, Högskolan i Halmstad, Akademin för ekonomi, teknik och naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42444.
Full textThe defence cooperation between Sweden and Finland has accelerated during the last couple of years. Last into the cooperation, and maybe the most complex part is the cooperation between the two armies. The unique context of land forces puts human interaction in focus when large amounts of people, vehicles and technical systems are to be commanded and coordinated in time and in a limited geographical space. When this type of action involves two defence forces the dynamics that occurs is worth studying. This thesis project studies the conditions and factors that affect the Swedish-Finnish defence cooperation on a tactical level, from an Army perspective. The study explains both the driving and the constricting factors in the cooperation. The research is based on interviews with Swedish and Finnish army officers. Conclusions are drawn supported by a model built on the factors that are most influential on the cooperation and how these factors apply to the context of the cooperation. The thesis shows that there are differences between the two defence forces that affect the cooperation, but it also shows aspects that strengthens the efforts. The factors have different effects and different impact depending on the organisational level in the defence forces. The conclusions points to five strong factors in different areas that influence the cooperation. The main drive has a strong connection to the political will. Swedish and Finnish leadership culture is diversified, this shows and has the greatest impact on lower organisational levels. Language is a dividing factor. It is a logical solution to use a common working language, but this study shows that the common language results in great challenges. Building a cooperation without obligations means that trust and confidence are of substantial importance. In a cooperation between Armies a common command and control system is vital. The collaboration on system development can set the condition for a common command and control system. Even though this study found differences it also found a working cooperation. Proof of this is our bilateral high readiness units and international operations. Through clear and common goals and ambitions there are prerequisites for an even deeper cooperation.
Yhteenveto Ruotsin ja Suomen puolustusyhteistyö on edennyt nopeasti viime vuosina. Viimeinen ja ehkä monimutkaisin osa tätä yhteistyötä on molempien maiden maavoimien välinen yhteistyö. Maavoimien yksikköjen ainutlaatuisuus asettaa keskeiseksi ihmisten vuorovaikutuksen, jossa suuria määriä ihmisiä, ajoneuvoja ja järjestelmiä on johdettava ja koordinoitava aikaan ja paikkaan rajoitetulla maantieteellisellä alueella. Kun tähän toimintaan liittyy kahden maan puolustusvoimaa, muodostuva dynamiikka on pohdinnan arvoinen. Maavoimien näkökulmasta tutkimuksessa tuodaan esiin olosuhteet ja tekijät, jotka vaikuttavat Ruotsin ja Suomen väliseen sotilaalliseen yhteistyöhön, lähtökohtana taktinen taso. Tutkimuksessa tarkastellaan ja selitetään sekä yhteistyötä yhdistäviä ja eteenpäin vieviä tekijöitä että yhteistyön vaikeuttavia tekijöitä. Tutkimus perustuu sekä Ruotsin että Suomen armeijan upseerien haastatteluihin. Tutkimus perustuu johtopäätöksiin mallista joka kuvaa tekijöitä jotka vaikuttavat yhteistyöhön eniten ja miten nämä liittyvät sen kontekstiin. Tutkimus osoittaa, että asevoimien välillä on eroja jotka vaikuttavat yhteistyöhön, mutta myös aspekteja jotka vahvistavat yhteistä työtä. Kaiken kaikkiaan tutkimus osoittaa viisi tekijää eri alueilla, joilla on selvä vaikutus yhteistyöhön. Tekijät vaikuttavat yhteistyöhön eri tavoin ja erilaisilla vaikutustasoilla organisaation eri tasoilla. Yhteistyön liikkeellepaneva voima liittyy kiinteästi selkeään poliittiseen tahtoon. Ruotsin ja Suomen johtamiskulttuuri eroavat, mikä heijastuu kaikilla tasoilla, mutta on selkein ja vaikuttaa enempi alemmalla tasolla. Kieli on erottava tekijä. Yhteinen työkieli on ratkaisuna looginen, mutta tutkimus osoittaa, että se asettaa suurempia haasteita kuin ensi silmäyksellä voisi todeta. Yhteistyön rakentaminen ilman sopimusvelvoitteita tarkoittaa, että luottamuksella on merkittävä rooli. Komentotukijärjestelmän merkitys on keskeinen maavoimien yhteistyölle. Yhteinen työskentely johtamisjärjestelmän alueella voi luoda nämä olosuhteet. Eroista huolimatta Ruotsilla ja Suomella on jo hyvin toimiva yhteistyö, jonka nykypäivän kokemukset osoittavat esimerkiksi yhteisistä valmiusjoukoista ja kansainvälisistä rauhanturvaamis- ja kriisinhallintatehtävistä. Selkeät tavoitteet ja pyrkimykset luovat myös erittäin hyvät edellytykset syventää yhteistyötä entisestään.
Fredin, Fredrik, and Peter Johnsson. "Förutsättningar för det nya nationella försvaret : En fallstudie av plutonchefskapet vid den 161.strilbataljonen." Thesis, Högskolan i Halmstad, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-36975.
Full textThe changes in the strategical environment have resulted in the government giving the Swedish defense forces a new national alignment, towards the capability of national defense. The purpose of this study is to build understanding of the conditions for platoon level leadership in the new national defense and to develop knowledge of the conditions the platoon commanders have been given to meet the demands by the new national defense. The research has been carried out by an inductive quantitative case study design with a hermeneutic approach. The empirical data is based on twelve interviews with platoon leaders and a study of official defense force documents. The research shows that the role of the platoon leader is characterized by balancing the role as commander and the role of administrator, were the administration weighs over on the expense of the capability of warfare and leadership. The platoon commander’s perception of the demands of the national defense complies with official defense force documents, but the absence of a clear compilation of the demands leads to some uncertainty. The platoon commander’s conditions to fulfill the demands of the new national defense is determined by their ability to balance tasks and available resources. This in turn is due to absence of administrative support and command. The research has identified a contradiction between two simultaneously ongoing organizational changes. The phenomenon that we have chosen to call the paradox change, contains one role-orientated change towards the commander as an administrator and one character-oriented change towards combat commander in the new national defense.
Uppdragsutbildning för Försvarsmakten
Phalama, Mmabore S. H. "Factors affecting implementation of enterprise applications integration (EAI) with special reference to corruption and fraud in DOD." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20253.
Full textENGLISH ABSTRACT: Corporate mergers and partnerships are common in today’s competitive environment and inevitably require organisations to integrate information and telecommunication systems when such unisons take place. One of the most important challenges in each enterprise, especially forced by global markets and the resulting competition, is the capability to efficiently interact, collaborate and exchange information with business partners and within an organisation. Many software systems within organisations are not integrated into a homogeneous structure and therefore the sharing and exchange of information, not being synchronised, leads to possible misappropriation of such information. These isolated systems in organisations, could consequently become possible platforms for corruption and fraud, leading to increase in computer crime. While key risk areas remain, new dangers are emerging. Government stakeholders require departments to be accountable and responsible, which underpins the sharing and exchanging of relevant information, which in turn necessitates the integration of inter- as well as intra-departmental systems. If corruption and fraud is committed in these departments the impact may be significant, including damage to their reputation and image and even detrimental to service delivery to communities. Government and law enforcement agencies all over the world are faced with challenges of combating corruption and fraud. Fighting corruption and fraud committed via computers necessitates the need to close the gaps created by computers which were designed without consideration for future integration. Hence organisations should seek a way to link systems that were developed in isolation in order to simplify and automate business processes to the greatest extent possible. The aim of this study is to discuss factors affecting the implementation of application systems in large organisations with special reference to the South African Department of Defence (SA DOD). Current systems will be studied and a possible approach on how the DOD Vehicle Management Systems could be integrated will be recommended. This study introduces and defines the problem, describes different research methodologies including the methodology that was used. The topics of corruption and fraud, electronic commerce and e-government will be explored through intensive research of the extant literature, drawing interpretations to be applied to the empirical data gathered on fraud and corruption in DOD and on their ITC systems. Finally the findings and recommendations of this research, based on the theoretical and empirical data, will be presented.
AFRIKAANSE OPSOMMING: Korporatiewe oornames en vennootskappe is algemeen in vandag se kompeterende omgewing. Dit is dus onvermydelik dat daar van ondernemings verwag word om informasie en telekommunikasie stelsels te integreer by die paasvind van sulke verbintenisse. Een van die mees belangrike uitdagings in elke onderneming, veral in die lig van globale markte met die gevolglike kompeterende uitdagings, is die vermoë vir effektiewe interaksie, samewerking en uitruil van inligting met besigheidsvennote en ook in die onderneming self. Talle sagteware stelsels in ondernemings is nie geïntegreer in ʼn homogene struktuur nie en gevolglik, omdat dit nie gesinkroniseer is nie, lei die deel en uitruil van informasie tot moontlike wederregtelike toe-eiening van sulke informasie. Sulke geïsoleerde stelsels in ondernemings kan dus die platvorms word van korrupsie en bedrog en lei tot ʼn verhoging van rekenaarmisdywe. Terwyl sleutel risiko areas steeds van toepassing is, is daar ook weer nuwe gevare wat te voorskyn kom. Die Staat se aandeelhouers vereis dat departemente aanspreeklik en verantwoordelik sal wees wat die belangrikheid van die deel en uitruil van inligting onderstreep en wat op sy beurt weer die integrasie van inter- asook intradepartementele stelsels noodsaak. As misdaad en korrupsie gepleeg word in hierdie departemente mag die impak betekenisvol wees. Dit sluit in skade aan hul reputasie en beeld en kan selfs dienslewering aan gemeenskappe belemmer. Om korrupsie en bedrog wat met rekenaars gepleeg word te beveg, is dit nodig om die gapings toe te maak wat deur ontwerpe geskep is sonder dat toekomstige integrasie inaggeneem is. Ondernenings moet dus ‘n manier soek om stelsels te koppel wat in isolasie ontwikkel was met die doel om besigheidsprosesse tot die grootste moontlike mate te vereenvoudig en te outomatiseer. Die doel van hierdie studie is om die faktore te ondersoek wat die implementering van stelsels beïnvloed in groot ondernemings met spesifieke verwysing na die Suid Afrikaanse Departement van Verdediging (SA DVV). Huidige sisteme sal bestudeer word en ʼn moontlike benadering sal aanbeveel word oor hoe die DVV se Voertuig Bestuurstelsels geintegreer kan word. In hierdie studie word die besiheids- asook die navorsings-probleem gedefineer. Die onderwerpe van korrupsie en bedrog, elektroniese handel en e-regering sal ondersoek word deur intensiewe navorsing van bestaande literatuur te doen. Dit word aangevul deur vertolkings van die hierdie toepaslike literatuur gepaard met empiriese data versameling oor bedrog en korrupsie in die DVV en die Departement se “ITK” stelsels. As finale stap sal die bevindings en aanbevelings van hierdie navorsing, gebasseer op teoretiese en impiriese data, aangebied word.
Hodžic, Faris. "Vliv míry zadluženosti na výši veřejných výdajů v resortu obrany ve vybraných členských státech NATO." Doctoral thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-165928.
Full textRutkowski, Mitchell M. "Growth Parameter Dependence and Correlation of Native Point Defects and Dielectric Properties in BaxSr1-xTiO3 Grown by Molecular Beam Epitaxy." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1366299175.
Full textJunior, Reinaldo Squillante. "Controle relacionado à segurança nas indústrias de processos: uma abordagem integrada de modelos de acidentes, defesa em profundidade e diagnosticabilidade segura." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/3/3152/tde-10082017-110852/.
Full textThe issue of the functional safety of process industries has been receiving increasing attention from the world scientific community, since it has stated the possibility of occurrences of the accidents and the related undesired consequences. These industries can be considered as part of a system class called critical systems, which are characterized by the occurrence of critical faults, which can result in accidents involving loss of life, damage to the environment, and financial losses involving equipment and property. These facts justify the need for a new approach that addresses: process design, process control design, risk analysis and control, and risk assessment. One of the challenges related to functional safety is associated with how to integrate accident scenarios to the requirements for the design of safety-related control systems of the process industries in a systematic way. Furthermore, there is the possibility of the occurrence of the unobserved or hidden undesired and / or critical events, as relevant factors associated to the evolution of the sequence of the events that corroborates in the occurrence of an accident. In this context, the challenge is to improve the effectiveness of these control systems, which involves the development of a solution capable of supervising the process of evolution of the critical and / or undesired events, in order to guarantee an adequate level of functional safety, and that complies with the applicable international standards IEC 61508 and IEC 61511. Therefore, these considerations bring new requirements for the design of control systems of this nature, capable of encompassing the accident models and the critical fault evolution processes. One solution is to consider critical fault prevention and mitigation approaches in an integrated and interactive way. In addition, it is necessary to addresses new techniques and concepts in order to develop a control system capable of tracking and acting in the evolution processes of faults of this nature. One possibility is to consider the principle of defense-in-depth coupled with the property of safe diagnosability. The fulfillment of this new set of requirements is not trivial and it is necessary to integrate different formalisms for the development of adequate solutions. Therefore, this work presents a methodology for the design of a safety-related control systems based on the concept of functional safety for the process industries, which proposes: (i) a control architecture for the prevention and mitigation of the critical faults, (ii) an extension of the classification of the safety barriers focusing on automation via safety instrumented system (SIS), (iii) a framework for the synthesis of the safety-related control systems based on accident models and which includes the following methods: (a) elaboration of the HAZOP study, (b) construction of the accident models, (c) integration of the accident models with the HAZOP study, and (d) generation of the defense algorithms for the prevention and mitigation of the critical faults, via modeling techniques using extensions of the Petri net: Production Flow Schema (PFS) and Mark Flow Graph (MFG). The proposed methodology was verified, from application examples investigated in the literature.
Lambach, Mark D. "Distribution of Chondrocyte Cell Death in Medial and Lateral Femoral Condyles in Porcine Knees after Sub-impact Loading." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1338354533.
Full textLin, Chung-Han. "The Effects of Thermal, Strain, and Neutron Irradiation on Defect Formation in AlGaN/GaN High Electron Mobility Transistors and GaN Schottky Diodes." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1371466261.
Full textKhazaka, Rami. "From atomic level investigations to membrane architecture : an in-depth study of the innovative 3C-SiC/Si/3C-SiC/Si heterostructure." Thesis, Tours, 2016. http://www.theses.fr/2016TOUR4023/document.
Full textDue to its outstanding physico-chemical properties, the cubic polytype of silicon carbide (3C-SiC) gained significant interest in several fields. In particular, this material emerged as a potential candidate to replace Si in MEMS devices operating in harsh environment. The development of 3C-SiC/Si/3C-SiC heterostructures on top of Si substrate can pave the road towards original and novel MEMS devices profiting from the properties of the 3C-SiC. However, such epitaxial system suffers from wide range of defects characterizing each layer. Thus, we first tried to improve the quality of each layer in this heterostructure. This was achieved relying on two levers; (i) the optimization of the growth parameters of each layer and (ii) the understanding of the nature of defects present in each layer. These two key points combined together allowed an in-depth understanding of the limit of improvement of the overall quality of this heterostructure. After the development of the complete heterostructure, the fabrication of 3C-SiC microstructures was performed. Furthermore, we presented an unprecedented method to form free-standing 3C-SiC membranes in-situ during its growth stage. This novel technique is expected to markedly simplify the fabrication process of suspended membranes by reducing the fabrication time and cost
Riberg, Joakim, and Johan Selin. "Det moderna kriget och de hybrida hoten : Ett problem för Sveriges nationella säkerhetsstrategi?" Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-39726.
Full textIn 2014 Russia, in front of the rest of the world, claimed and performed an annexing of Crimea. The larger parts of the western world were left in shock. Without any acknowledgment Russia moved forward with “little green men” and implied a different tactic. It was not officially war and nor peace, the fighting and the action took place in what was popularly named as the gray zone. This thesis is answering the following questions by using a qualitative document examination. From a strategic security perspective: How can the problem regarding hybrid threats in the gray zone be described and how does the national Swedish strategy respond to these threats? By reading and concluding existing theory about hybrid threats within the gray zone the authors have created their own model of analysis to utilize on the Swedish National Security Strategy. The model of analysis consists of the five main hybrid threats chosen from the theory presented by Treverton: Disinformation, Cyber-attacks, Economic pressure, Irregular armed forces and Regular forces.The thesis concludes that although unclear and found lacking in coherence regarding ends, ways and means; the National Security Strategy addresses and gives guidance on how to counter the effects of the above-mentioned threats. The Security Strategy also shows a consciousness regarding the complexity of the hybrid threats and the gray zone, without trying to define the actual area or methods utilized. When looked at through the model of analysis, it also highlights a possible new threat to be considered; environmental threats. The results of the analysis also indicate that it might be wise to use the term contemporary threats and the utilization of these, instead of arguing about definitions. The authors argue that it is of greater importance to create a larger understanding of the phenomena, in order to counter the actual effects by employing a truly comprehensive approach.
Píchalová, Nikol. "Rozpočtová politika vlády ČR v letech 2008-2013." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-194061.
Full textŽák, Tomáš. "Návrh schématu zajištěného napájení jaderného bloku pro řešení projektových i nadprojektových havárií." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220178.
Full textWalia, Piyush. "The Effect of Combined Bony Defects on the Anterior Stability of the Glenohumeral Joint and Implications for Surgical Repair." Cleveland State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=csu1440173026.
Full textLahidji, Reza. "Incertitude, causalité et décision : Le cas des risques sociaux et du risque nucléaire en particulier." Phd thesis, HEC, 2012. http://pastel.archives-ouvertes.fr/pastel-00718790.
Full text