To see the other types of publications on this topic, follow the link: Dept of Defence.

Dissertations / Theses on the topic 'Dept of Defence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Dept of Defence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Van, Dyk Johannes Jacobus. "An evaluation of the South African Department of Defence's policy on Defence Industrial Participation (DIP) as a defence industrial development mechanism." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/1067.

Full text
Abstract:
This dissertation focuses on the local defence-related industry as a beneficiary under the Department of Defence’s defence industrial participation (DIP) programme, managed by Armscor. Attention is given to the main construct of the development theory and how the DIP process in South Africa compares with the international reciprocal trade phenomena commonly referred to as ‘countertrade’. The author does an in-depth analysis of the Government’s policy regarding the defence-related industry (DRI) that forms part of the local defence industrial base (DIB), as well as the DIP policy, procedures and practices and their subsequent bearing on the local defence industry. The study is further substantiated with a comprehensive review of the consequences and outcomes resulting from the largest defence package deal (SDP), signed in December 1999, between the Department of Defence and several major foreign original equipment manufacturers (OEMs) and subsequently benchmarked against academic discourse on the subjects of international countertrade and development theories.
APA, Harvard, Vancouver, ISO, and other styles
2

Eccleston, Anthony L., and n/a. "Coordinating information provision in government agencies using an integrated information management strategy." University of Canberra. Information, Language & Culture Studies, 1996. http://erl.canberra.edu.au./public/adt-AUC20060404.123006.

Full text
Abstract:
The specific aims of this study were determined on a conceptual appreciation that management of information assets and services in some government agencies was deficient in meeting both existing and developing demands. This appreciation manifested itself in a commitment to investigate the principles and processes intrinsic to existing management methodologies, to relate these processes to the needs of users, and to determine a strategy which could more ably meet the information provision requirements of those users. The achievement of these aims predicated the use of the case study research method, selecting as the first case study the Department of Human Services and Health (DHSH), an agency that had recognised that a problem existed in the provision of information services, and had initiated action to address that problem. As a counter, the Department of Defence, an agency which adrmts to a problem, but which had yet to initiate an active, global program for its resolution, was chosen as the second case study. A theoretical model, which reflects extant international thinking and practice, was initially constructed in order to establish a basis on which to ascertain and evaluate the information management circumstances of the two case study departments. This model specified the objectives considered to be fundamental to effective information management in a public service environment. It included studying the foundation repositories of information services from which information in the portfolio domains of government are sought. These services are the traditional records centres or registries, the library services which provide a repository of published and grey material in printed, image and magnetic formats, and the computerised networks holding electronic records at varying levels of development. An analysis of findings was carried out separately on each case study agency before bringing the data together for cross-case analysis. In order to maximise the veracity and validity of the data collected and its subsequent interpretation by the researcher, the draft analysed case study findings were submitted to the respective agencies for review and critique. All matters of substance received have been incorporated in the final version. The findings from the two case studies and the cross-case analysis confm that, despite significant advances in some specific agencies, the initial hypothesis that government agencies are still deficient in providing optimum services to meet the information needs of users, is demonstrated. The advances that have been made, however, similarly support the other thesis hypotheses that the implementation of an integrated information management strategy in any government agency will provide a foundation for improved information provision and the timely delivery of relevant available information to the user. Finally, a model of optimum processes involved in such a strategy, derived from the theory and practical products of this study, is offered. This could be the subject for future evaluation and testing for realistic and functional application.
APA, Harvard, Vancouver, ISO, and other styles
3

Qwele, Gcobani. "An analysis of the role of labour relations practitioners as change agents : a case study on the Department of Defence." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/2109.

Full text
Abstract:
Thesis (MPA (School of Public Management and Planning))--University of Stellenbosch, 2009.
ENGLISH ABSTRACT: Chapter 1 outlines the purpose of the research, provides the background on the way in which LR matters are currently managed and handled in the Department of Defence (DOD), identifies the research problem, and outlines the research design and methodology. Chapter 2 explores the theoretical framework of the principles of labour relations and management of change. The chapter reveals that the principles of labour relations hold persons in management or supervisory positions responsible for managing LR matters, and suggests that LR practitioners should therefore be able to equip them with adequate skills and knowledge of the procedures for dealing with LR matters in the workplace. The chapter also reveals that the principles of the management of change suggest that the employees should be prepared for change; that a change agent, who should create an environment conducive to change through lobbying the support of persons in management and employees for the proposed change, should be identified; and that resistance to change should be identified at an early stage of the change process in order to eliminate it. Change agents are encouraged not to dominate the change process, but rather to facilitate it in order to ensure that the organisation and its employees drive the change process themselves. Chapter 3 explores the objectives of the LR support function as well as the content of LR practices in order to determine the extent to which LR practitioners can become change agents in the DOD. The chapter reveals that LR at grassroots level is practiced in the way that has resulted to conflicts and costly litigations. In this chapter the regulatory framework and procedures that impede LR practitioners from becoming change agents are also analysed. Chapter 4 covers the data collection process and the analysis thereof. The data reveals that the LR structure at grassroots level is not conducive for the professional delivery of enhanced LR services; that the target group does not have access to adequate resources that would enable them to execute their functions; and that empowerment programmes are implemented to equip the target group with adequate qualifications, skills and or knowledge to be able to render enhanced LR services. The main findings were that guidance is lacking to ensure that LR systems, structures and processes at grassroots level are in place, to ensure that LR matters are managed and handled in a fair and responsible way; to ensure that LR staff with adequate competences to render LR services is appointed; and to ensure that the LR department is active enough and lead the execution of enhanced LR services. In Chapter 5 the main findings are analysed and it is concluded that LR practitioners are unable to become change agents if LR systems, structures and processes are not in place. It is encouraged that LR practitioners should form a cohesive but diverse team that is able to render enhanced LR services, and that the LR department should take a leading role. It is recommended that a study be conducted to determine overarching LR strategy that would guide the establishment of LR systems, the determination of LR structure and processes for dealing with LR matters, and the empowerment programmes for ensuring the professional delivery of enhanced LR services.
AFRIKAANSE OPSOMMING: Hoofstuk 1 skets die doel van die navorsing en verskaf agtergrond oor die manier waarop arbeidsverhoudinge tans in die Departement van Verdediging bestuur en hanteer word. In hierdie hoofstuk word die navorsingsprobleem ook geïdentifiseer en die navorsingsontwerp en -metodologie uitgestippel. Hoofstuk 2 ondersoek die teoretiese raamwerk van arbeidsverhoudingbeginsels en die bestuur van verandering. Die hoofstuk openbaar dat die beginsels van arbeidsverhoudinge persone in bestuurs- of toesighoudende posisies verantwoordelik hou vir die bestuur van arbeidsverhoudingkwessies. Daar word voorgestel dat arbeidsverhoudingpraktisyns daarom in staat moet wees om hierdie persone toe te rus met voldoende vaardighede en kennis van die prosedures vir die hantering van arbeidsverhoudingkwessies in die werkplek. Die hoofstuk openbaar ook dat die beginsels van die bestuur van verandering aandui dat werknemers op verandering voorbereid moet wees en dat ’n veranderingsagent geïdentifiseer moet word. Só ’n agent moet ’n atmosfeer skep wat bevorderlik vir verandering is deur steun vir die voorgestelde verandering van persone in bestuur en werknemers te werf. Verder moet weerstand teen verandering in ’n vroeë stadium in die veranderingsproses vasgestel word om dit sodoende uit te skakel. Veranderingsagente word aangemoedig om nie die veranderingsproses te oorheers nie, maar eerder te vergemaklik om te verseker dat die instelling en sy werknemers die veranderingsproses self dryf. Hoofstuk 3 ondersoek die teikens van die arbeidsverhoudingsteunfunksie asook die inhoud van arbeidsverhoudingpraktyke om te bepaal tot watter mate arbeidsverhoudingpraktisyns veranderingsagente in die Departement van Verdediging kan word. Hierdie hoofstuk onthul dat arbeidsverhoudinge op grondvlak op ’n manier beoefen word wat reeds tot konflik en duur litigasies gelei het. In hierdie hoofstuk word die regulerende raamwerk en prosedures geanaliseer wat arbeidsverhoudingpraktisyns verhinder om veranderingsagente te word. Hoofstuk 4 dek die data-insamelingsproses en analise van hierdie proses. Die data onthul dat die arbeidsverhoudingstruktuur op grondvlak nie bevorderlik is vir die professionele lewering van verbeterde arbeidsverhoudingdienste nie, en dat die teikengroep nie toegang tot voldoende bronne het wat hulle in staat sou stel om hulle funksies uit te voer nie. Die data openbaar verder dat bemagtigingsprogramme toegepas word om die teikengroep met voldoende opleiding, vaardighede en/of kennis toe te rus om verbeterde arbeidsverhoudingdienste te lewer. Die hoofbevinding was dat daar gebrekkige leiding is om te verseker dat arbeidsverhoudingstelsels, -strukture en -prosesse op grondvlak gereed is; dat arbeidsverhoudingkwessies op ’n regverdige en verantwoordelike manier bestuur en hanteer word; dat arbeidsverhoudingpersoneel met voldoende bevoegdhede aangestel word om arbeidsverhoudingdienste te lewer, en dat die arbeidsverhoudingdepartement aktief genoeg is en die voortou neem in die uitvoering van verbeterde arbeidsverhoudingdienste. In hoofstuk 5 word die hoofbevindinge geanaliseer en die gevolgtrekking gemaak dat arbeidsverhoudingpraktisyns nie in staat is om veranderingsagente te word indien arbeidsverhoudingstelsels, -strukture en -prosesse nie gereed is nie. Arbeidsverhoudingpraktisyns word aangemoedig om ’n verenigde maar diverse span te vorm wat verbeterde arbeidsverhoudingdienste kan bied en die arbeidsverhoudingdepartement word aangemoedig om ’n leidende rol in hierdie verband te speel. Daar word aanbeveel dat ’n studie gedoen word om ’n oorkoepelende arbeidsverhoudingstrategie vas te stel wat as riglyn kan dien vir die stigting van arbeidsverhoudingstelsels, die bepaling van arbeidsverhoudingstruktuur en prosesse om met arbeidsverhoudingkwessies om te gaan, en bemagtigingsprogramme om te verseker dat verbeterde arbeidsverhoudingdienste professioneel gelewer word.
APA, Harvard, Vancouver, ISO, and other styles
4

Hendricksen, Andrew D. "The optimal employment and defense of a deep seaweb acoustic network for submarine communications at speed and depth using a defender-attacker-defender model." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37637.

Full text
Abstract:
Approved for public release; distribution is unlimited
The need for submarines to execute communications at speed and depth (CSD) is a vital link in our nations and our allies defense network. A promising method to do this without limiting the inherent stealth and advantage of submarines is to utilize Deep Seaweb, an underwater acoustic communication network. The challenge is to be able to optimally employ such a network in a constantly changing environment. In particular, our goal is to develop a network that is resilient to a given number of adversary attacks that can disable individual nodes. To this end, we build and solve a defender-attacker-defender (DAD) optimization model that provides the optimal location of repeater nodes that maintains as much of the function of the network as possible, even after a worst-case attack. We analyze four initial basic network configurations and compare the resulting optimum node placements when the network is not subject to attack, when the network is subject to two attacks, and when the flow of each network configuration is completely blocked by attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Yun, Ronald E. "Network defense-in-dept : evaluating host-based intrusion detection systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA395808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barnes, David S. "A defense-in-depth approach to phishing." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FBarnes.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2006.
Thesis Advisor(s): Craig H. Martell, Neil C. Rowe. "September 2006." Includes bibliographical references (p. 71). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Anderson, John C. Scott Clifford G. "Benchmarking and performance metrics for a defense distribution depot /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA359952.

Full text
Abstract:
Thesis (M.S. in Management) Naval Postgraduate School, December 1998.
"December 1998." Thesis advisor(s): Kevin R. Gue, Jane Feitler. Includes bibliographical references (p. 69-70). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Anderson, John C., and Clifford G. Scott. "Benchmarking and performance metrics for a defense distribution depot." Thesis, Monterey, California. Naval Postgraduate School, 1998. http://hdl.handle.net/10945/32605.

Full text
Abstract:
Department of Defense logistics activities are under increasing pressure to reduce their cost of operations. Defense Logistics Agency's response to this challenge is to reduce costs through competition--16 of 22 Defense Distribution Depots will be competed in the near future. Defense Distribution Depot San Diego (DDDC), facing this competition, must assess its relative competitiveness with respect to commercial industry. However, DDDC lacks performance metrics and measurement methods necessary to effectively measure its performance for comparison. The purpose of our thesis is threefold: to identify performance measures, measurement methods, and uses of performance measures by leaders in the physical distribution industry; to determine the depot's competitive position by quantifying the gap in performance using the performance metrics identified; and to identify the qualitative factors contributing to the gap in performance between the depot and commercial firms. We employ benchmarking methodology to argue that there is a significant gap in performance between DDDC and commercial distribution firms. We quantify the gap and discuss the qualitative factors contributing to it. We conclude with recommended productivity performance indicators for implementation at DDDC.
APA, Harvard, Vancouver, ISO, and other styles
9

Pennock, Michael James. "The economics of enterprise transformation." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28171.

Full text
Abstract:
Thesis (M. S.)--Industrial and Systems Engineering, Georgia Institute of Technology, 2008.
Committee Chair: Rouse, William; Committee Member: Boff, Kenneth; Committee Member: Cross, Stephen; Committee Member: Griffin, Paul; Committee Member: Keskinocak, Pinar.
APA, Harvard, Vancouver, ISO, and other styles
10

Rush, Marvin P., and Eric H. Burks. "Implementing a fast-pick area at Defense Distribution Center San Joaquin (DDJC)." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1139.

Full text
Abstract:
Approved for public release; distribution in unlimited.
In a warehouse, a fast-pick-area is a region containing many items that can be retrieved quickly and inexpensively to fulfill customer orders. The Defense Distribution Center San Joaquin (DDJC) implements a similar strategy on a wider scale by designating one of many warehouses as a "fast-pick-area." We develop a plan to optimally slot the fast-pick area at DDJC using a computer model that captures the tradeo.s of storage space versus cost of replenishment from bulk storage. Our results suggest that defense distribution centers should consider implementing a fast pick area as a means of reducing operating costs.
Lieutenant Commander, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
11

Karlsson, Sixten. "Fred och säkerhet? : En studie om det Svenska Försvaret utifrån tre perspektiv, Bonsdorff, Andrén och Clausewitz." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-44224.

Full text
Abstract:
Following an increase in hostile foreign activity. The discussion regarding Sweden’s defense force´s ability to perform its task has come to a new heading. With the end of the cold war as a major revolution in matters of international security, a major overhaul has taken place to transform the static total defense plan of the nation to a less rigid operational system. Following an analysis of the budgets total amount from the governments of 2002 until 2015 it is clear that while the amount of resources has never directly been lowered, it has shrunk in relation to the countries total GDP. The possible futures for the defense of Sweden bring three possibilities forward in correlation three unique perspectives on military and political policy. Out of the three possibilities the focus on military strength as a political resource seems to be garnering the most support with the latest incursions made my foreign submersibles and the ever growing presence of 5th generation of warfare. And for as long as the potential threats remain it is unlikely that the current course will change.
APA, Harvard, Vancouver, ISO, and other styles
12

Hitefield, Seth D. "A Defense-In-Depth Security Architecture for Software Defined Radio Systems." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/96594.

Full text
Abstract:
Modern wireless communications systems are constantly evolving and growing more complex. Recently, there has been a shift towards software defined radios due to the flexibility soft- ware implementations provide. This enables an easier development process, longer product lifetimes, and better adaptability for congested environments than conventional hardware systems. However, this shift introduces new attack surfaces where vulnerable implementa- tions can be exploited to disrupt communications or gain unauthorized access to a system. Previous research concerning wireless security mainly focuses on vulnerabilities within pro- tocols rather than in the radios themselves. This dissertation specifically addresses this new threat against software radios and introduces a new security model intended to mitigate this threat. We also demonstrate example exploits of waveforms which can result in either a denial-of-service or a compromise of the system from a wireless attack vector. These example exploits target vulnerabilities such as overflows, unsanitized control inputs, and unexpected state changes. We present a defense-in-depth security architecture for software radios that protects the system by isolating components within a waveform into different security zones. Exploits against vulnerabilities within blocks are contained by isolation zones which protects the rest of the system from compromise. This architecture is inspired by the concept of a microkernel and provides a minimal trusted computing base for developing secure radio systems. Unlike other previous security models, our model protects from exploits within the radio protocol stack itself and not just the higher layer application. Different isolation mechanisms such as containers or virtual machines can be used depending on the security risk imposed by a component and any security requirements. However, adding these isolation environments incurs a performance overhead for applications. We perform an analysis of multiple example waveforms to characterize the impact of isolation environments on the overall performance of an application and demonstrate the overhead generated from the added isolation can be minimal. Because of this, our defense-in-depth architecture should be applied to real-world, production systems. We finally present an example integration of the model within the GNU Radio framework that can be used to develop any waveform using the defense-in-depth se- curity architecture.
Doctor of Philosophy
In recent years, wireless devices and communication systems have become a common part of everyday life. Mobile devices are constantly growing more complex and with the growth in mobile networks and the Internet of Things, an estimated 20 billion devices will be connected in the next few years. Because of this complexity, there has been a recent shift towards using software rather than hardware for the primary functionality of the system. Software enables an easier and faster development process, longer product lifetimes through over- the-air updates, and better adaptability for extremely congested environments. However, these complex software systems can be susceptible to attack through vulnerabilities in the radio interfaces that allow attackers to completely control a targeted device. Much of the existing wireless security research only focuses on vulnerabilities within different protocols rather than considering the possibility of vulnerabilities in the radios themselves. This work specifically focuses on this new threat and demonstrates example exploits of software radios. We then introduce a new security model intended to protect against these attacks. The main goal of this dissertation is to introduce a new defense-in-depth security architecture for software radios that protects the system by isolating components within a waveform into different security zones. Exploits against the system are contained within the zones and unable to compromise the overall system. Unlike other security models, our model protects from exploits within the radio protocol stack itself and not just the higher layer application. Different isolation mechanisms such as containers or virtual machines can be used depending on the security risk imposed by a component and any security requirements for the system. However, adding these isolation environments incurs a performance overhead for applications. We also perform a performance analysis with several example applications and show the overhead generated from the added isolation can be minimal. Therefore, the defense-in-depth model should be the standard method for architecting wireless communication systems. We finally present a GNU Radio based framework for developing waveforms using the defense- in-depth approach.
APA, Harvard, Vancouver, ISO, and other styles
13

Olofsson, Mattias. "Att stärka det svenska samhället vid svåra påfrestningar i fred : en uppgift för dagens Försvarsmakt?" Thesis, Swedish National Defence College, Swedish National Defence College, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-46.

Full text
Abstract:

Försvarsmakten har sedan sekelskiftet gått ifrån att vara ett invasionsförsvar till att bli ett insatsförsvar. Under denna omvandling har Försvarsmakten blivit allt mindre och fått en mer internationell inriktning. Förband har lagts ned, personal sagts upp och materiel skrotats. Författaren är intresserad av att se hur detta har påverkat Försvarsmakten som en samhällsresurs.

Problemet som ställs i uppsatsen är huruvida regeringen har anpassat Försvarsmaktens uppgift att stärka det svenska samhället vid svåra påfrestningar i fred, mot bakgrund av den omvandling som skett. Syftet med denna uppsats är sålunda att undersöka och jämföra om uppgiften att stärka det svenska samhället vid svåra påfrestningar i fred har förändrats, utvecklats eller anpassats till det nya insatsförsvaret som Sverige har idag.

Som metod används en komparativ och kvalitativ textanalys av utvalda propositioner, departementsserier och regleringsbrev. De fakta i dokumenten som berör uppsatsämnet analyseras och jämförs, för att sedan sammanfattas och diskuteras. 

Resultatet i uppsatsen påvisar att regeringen inte har ändrat uppgiften att stärka det svenska samhället vid svåra påfrestningar i fred, som ställs till Försvarsmakten. Men det påvisar även att en kontinuerlig anpassning av uppgiften sker i form av ett samarbete med andra myndigheter, denna utveckling kan följas på olika sätt i de utvalda källorna.

Författaren har dragit slutsatser kring det presenterade resultatet och kommit fram till att regeringen inte behövt ändra uppgiften. Men för att kunna effektivisera utnyttjandet av de resurser som Försvarsmakten kan tillföra vid svåra påfrestningar bör regeringen utveckla och precisera hur Försvarsmakten skall utnyttjas med störst effektivitet.


The Swedish Armed Forces has, since the turn of the century, transformed from an invasion defence to a type of mission oriented defence. This means that the Swedish armed forces have become smaller in volume, material has been terminated, a lot of personnel have been terminated and the amount of conscripts heavily reduced. The author is interested in how this has affected the Swedish armed force as recourse to the Swedish society.

Before and under the transformation, one of the Swedish armed forces duties has been to strengthen the Swedish society when hard tensions have emerged in peacetime. This duty has been presented in the regulations that the Swedish government give to the Swedish Armed Forces every year.  The duty is also one of the duties presented in the regulation that controls the Swedish Armed Forces activities.

The problem that is presented in the essay is how the Swedish government has adjusted this duty to the Swedish Armed Forces with this transformation in mind. The purpose of this essay is therefore to investigate and compare if the duties have been changed, developed and/or adjusted to the new Swedish armed forces as it is today.

The result of this paper shows that the government has not changed the duty to strengthen the society when hard tensions come. However, it also shows that there is a continuing adjustment to the duty in form of cooperation with other authorities. This development can be seen in different ways in the varying sources that have been presented in the essay.

The author has drawn some conclusions concerning the presented results and reached a conclusion that the government does not have to change the duty. It can be preserved as it is today. In order to use the resources that the Swedish armed forces contribute more efficiently, the government has to develop and specify how the Swedish armed forces can be used with the greatest efficiency.

APA, Harvard, Vancouver, ISO, and other styles
14

Asklander, Niklas, and Christian Schmidt. "ILLUSIONEN OM DET VÄPNADE ANGREPPET." Thesis, Högskolan i Halmstad, Akademin för ekonomi, teknik och naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42330.

Full text
Abstract:
The Defence Commission has proposed that the Swedish Armed Forces once again will be assigned the main task of defending Sweden against an armed attack. Defence against an armed attack has gained more focus since the defence decision 2015 and prior to the upcoming defence decision it is even more emphasized. Are the politics and the Swedish Armed Forces in agreement regarding the meaning and implications of this on basis of contemporary threats? The overall aim of the study is to understand the interaction between politics and the Swedish Armed Forces in the designing and shaping of the Swedish Armed Forces. This study has a starting point in the prelude to the planned political defence decision 2020 and aims to understand some of this major context. It is focusing on identifying the coherence between the Defence Committee and the Swedish Armed Forces’ military strategic leadership in terms of the meaning of an armed attack being the primary basis of designing and shaping the Swedish Armed Forces. In addition, important factors that have an impact on the interaction between politics and the Swedish Armed Forces are identified. The empiricism is taken from international law, the military strategic doctrine of the Swedish Armed Forces, reports from the Defence Commission and interviews with members of the Defence Committee and the military strategic leadership of the Swedish Armed Forces. The results show that there is lack of coherence within the Defence Committee as well as between the Defence Committee and the Swedish Armed Forces regarding the meaning of the proposed main task to the Swedish Armed Forces and how it should relate to other tasks. There is an illusion regarding the definition of an armed attack. In reality it is the government that, under constitutional responsibility, defines an armed attack when there is an act of aggression. In addition, it is identified that it is suitable to mutually improve trust between politics and the Swedish Armed Forces by increasing knowledge of each other's realities.
Försvarsberedningen har föreslagit att Försvarsmakten åter ska få huvuduppgiften att försvara Sverige mot väpnat angrepp. Försvar mot väpnat angrepp har fått ett allt större fokus sedan försvarsbeslutet 2015 och inför det kommande försvarsbeslutet föreslås en ytterligare inskärpning. Är politiken och Försvarsmakten överens om innebörden utifrån samtidens hot? Studiens övergripande syfte är att förstå samspelet mellan politiken och Försvarsmakten i utformningen och inriktningen av Försvarsmakten. Studien tar avstamp i förspelet inför det planerade försvarsbeslutet 2020 och tar sikte på att förstå en del av detta stora sammanhang genom att fokusera på att identifiera samstämmigheten mellan försvarsutskottet och Försvarsmaktens militärstrategiska ledning om innebörden av att väpnat angrepp ska vara dimensionerande för Försvarsmaktens inriktning. Därtill identifieras viktiga faktorer som påverkar samspelet mellan politiken och Försvarsmakten. Empirin är hämtad från internationell rätt, Försvarsmaktens militärstrategiska doktrin, försvarsberedningens rapporter samt intervjuer med försvarsutskottet och Försvarsmaktens militärstrategiska ledning. Resultatet visar på att det saknas samstämmighet såväl inom försvarsutskottet som mellan försvarsutskottet och Försvarsmakten avseende innebörden av Försvarsmaktens föreslagna huvuduppgift samt hur den ska förhålla sig till övriga uppgifter. Det råder en illusion om innebörden av ett väpnat angrepp. I verkligheten är det regeringen som under konstitutionellt ansvar fastställer vad som är ett väpnat angrepp när en aggressionshandling sker. Därtill identifieras lämpligheten av att ömsesidigt förbättra förtroendet mellan politiken och Försvarsmakten genom att öka kunskapen om varandras realiteter.
APA, Harvard, Vancouver, ISO, and other styles
15

Hedayati, Vahid Peyman. "Automatic defect detection and depth estimation using pulsed thermography." Master's thesis, Université Laval, 2014. http://hdl.handle.net/20.500.11794/25638.

Full text
Abstract:
L’évaluation non-destructive (END) est une branche de la science qui s’intéresse à l’uniformité, la qualité et la conformité des matériaux et les composants qu’ils servent à construire. Les techniques de END visent à repérer et à mesurer les caractéristiques principales des matériaux sans en affecter ou à en détruire la structure ou la fonctionnalité. L’END permet d’observer les propriétés internes des pièces et de détecter les défauts sous leur surface. Cette approche est devenue graduellement une technologie importante pour garantir la sécurité et la fiabilité de plusieurs composantes de système en design, en fabrication et en développement de produits. La thermographie infrarouge est une approche d’END sans contact rapide qui utilise des caméras thermiques. Elle permet de détecter l’énergie thermique émise par les objets et à en afficher la distribution en température de la surface du spécimen sous observation. Dans ce projet, notre objectif est d’exploiter la thermographie infrarouge pour détecter les défauts sous la surface des objets. Plus spécialement, nous nous intéressons à la localisation des défauts et à l’estimation de leur profondeur sous la surface. Le manuscrit présente une investigation de différentes méthodes de localisation de défauts et de mesure de leur profondeur des défauts sous la surface pour différentes catégories de matériaux.
Non-Destructive Testing (NDT) is an aspect of science concerning on uniformity, quality and serviceability of materials and their components. NDT techniques attempt to inspect and measure significant features of materials without changing or destroying their structure or functionality. NDT makes it possible to observe the internal properties of parts and detect the undersurface defects. NDT has progressively become an important technology to assure safety and reliability of many system components in the design, manufacturing and development areas. Infrared thermography is essentially a fast non-contact NDT inspection method that uses thermographic cameras. This technique detects the infrared energy emitted from objects and displays the corresponding temperature distributions on the specimen. In this project, we aim to use infrared thermography for detecting subsurface defects. Localizing the defects and estimating their depths are the important problems to be addressed in our research project. The manuscript investigates different methods related to these challenges.
APA, Harvard, Vancouver, ISO, and other styles
16

Hedlöf, Jonas, and Johan Lenngren. "Drivmedelsförsörjning – En interorganisatorisk möjlighet eller utmaning : ”Det är det som är i tanken som räknas”." Thesis, Högskolan i Halmstad, Akademin för lärande, humaniora och samhälle, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40024.

Full text
Abstract:
Syftet med denna uppsats är att undersöka förutsättningarna för det militära försvaret att kunna försörjas med drivmedel från näringslivet under ett väpnat angrepp. Vi har genomfört undersökningen utifrån dagens totalförsvarsförmåga som är under uppbyggnad sedan ett antal år tillbaka.Genom en kvalitativ intervjustudie med representanter från Försvarsmakten, utvalda bevakningsansvariga myndigheter och näringslivet undersökte vi om det finns en vilja och förutsättningar hos de aktörer vi identifierat som avgörande.Vi tillämpade en analysmetod inspirerad av grundad teori och identifierade de förhållanden som råder inom och mellan våra undersökningsenheter. Analysen leder till ett resultat som vi bekräftar med flera befintliga organisatoriska och interorganisatoriska teorier.Våra slutsatser är att det trots stora skillnader mellan undersökningsenheternas egenskaper, ändå finns goda förutsättningar inom och mellan dem, för att uppnå ett gemensamt mål. Däremot saknas andra yttre förutsättningar främst i form av mandat och regelverk som skulle reglera ansvar och uppgifter inom totalförsvaret.
The aim of this thesis, is to investigate the conditions for the Swedish Military Defence Force to incorporate support from the Business sector. The study focusses on the provision of fuel from business sector in the event of an armed attack.Our thesis is conducted from current military and civil defence capabilities, which have been under reconstruction for a couple of years.By conducting a qualitative interview study with representatives from the Swedish Armed Forces, selected Public Agencies and the Business sector, we investigated if there is a will and identified preconditions and factors that we deem crucial for success.We applied a method of the analysis inspired by Grounded Theory and search for factors that can affect the different actors in this study. Results lead to different theories that are supported by existing organisational and inter organisational theories.Our conclusions are that in spite of great differences between the different actors’ properties, there are still good expectations within and between the actors to reach a common goal. However, at present there are limiting factors preventing exploring the position, such as the requirement for mandates and regulations to regulate responsibilities and tasks within, and between the military and the civilian defence.
APA, Harvard, Vancouver, ISO, and other styles
17

Avdellas, Nicholas John. "The Public-Private Dilemma: A Strategic Improvement Agenda for U.S. Department of Defense Depot Maintenance." Diss., Virginia Tech, 2005. http://hdl.handle.net/10919/26847.

Full text
Abstract:
Since the end of the Cold War, the Department of Defense (DoD) has been challenged to formulate and make strategic decisions, especially in areas related to the Departmentâ s â business operations.â Strategic decisions are those that focus on setting long-term organizational direction. This has proven difficult because a rather simplistic (and somewhat comforting) DoD organizational orientation toward an â either/orâ or â us versus themâ decision-making mindset that was once ubiquitous and appropriate, given the nature of political and military threats, has been hard to shake. This study reviews a particular manifestation of this dilemma: the decision-making arrangements associated with the provision of military depot maintenance services. An historical review of this topic shows a mixture of problems, progress, and promise. A strategic decision-making approach that draws upon Sabatier and Jenkins-Smithâ s Advocacy Coalition Framework (ACF) is proposed to improve the situation. It addresses key problems identified in the analysis and rests upon an approach to strategic decision making that is politically rational in nature. This approach, called a Strategic Improvement Agenda, is offered as a potential foil to the â us versus themâ orientation.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
18

Malokofsky, Nicholas C. "Blood and treasure: the U.S. debt and its implications for national defense and security." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27862.

Full text
Abstract:
Is the current budget and debt of the United States a concern to its national defense Does debt held by foreign nations, particularly China, give them soft power over the United States The current national deficit is more than $1.3 trillion dollars each year with the national public debt just over $16 trillion. Congress and the greater civilian population are calling for dramatic cuts to the Department of Defense in order to balance the budgetbut the issue is more complicated. Accounting for only 3.7 percent of the FY2012 budget, reducing the DoD will reduce capabilities within the military but only reduce the deficit by a mere $50 billion a yearless than five percent of the overall deficit. By law, the government must fund such entitlements as Social Security, Medicare, and Medicaid, totaling almost $2.2 trillion (and increasing) per year. The governments receipts amount to $2.5 trillion per year, leaving only $300 billion for discretionary spending. This sum is inadequate to the demands upon it. For example, Department of Defense (DoD) alone currently has an annual base budget of just more than $700 billion. In other words, the national budget cannot balance without changes in law that would reduce outlays for entitlements. Entitlements account for 10 percent of the current federal budgetand are expected to engulf the entire federal budget within the next 40 years. Only if Congress changes the laws in regards to entitlementsand not simply the DoD budgetwill the federal deficit ever extinguish. But with the DoD taking the brunt of budget cut rhetoric, the fate of the defense lies with the current national debt. This study will examine the aspects of the U.S. national debt and how that debt influences the power of the military, the relationship with the rising Chinese, and the nations ability to protect itself financially.
APA, Harvard, Vancouver, ISO, and other styles
19

Åberg, Erik. "Review of an industrially implemented model of zoning principles for electricity distribution and energy production." Thesis, KTH, Industriella informations- och styrsystem, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-81329.

Full text
Abstract:
The interconnection of components of industrial automation and control systems (IACS) and enterprise systems involved in processes ranging from generation and transmission to billing within electric utilities poses challenges regarding cyber security as well as division of organisational responsibility. One means of organising these components and systems is to use a zone model in which they are segmented, offering layered defences as well as a logical grouping. One such zone model is the zone model under review, which was presented by Zerbst et al. in a CIRED paper from 2009. This master thesis reviews that zone model and compares it to other industry standard zone models which have been found to be able to be categorised into either functional based models or layered defence models. The outcome is a rough definition of what kind of content fits in the various zones of the reviewed model, as well as a normalised zone model to be used for comparison. A suggested method for dividing system components into zones is based on the 4R-method considering the response time, resolution, reliability and reparability of the system component, although its accuracy has not been empirically tested.
APA, Harvard, Vancouver, ISO, and other styles
20

Colvin, Janet D. (Janet Delores). "The Effectiveness of Institutionalization of a Curricular Change in Department of Defense Dependents' Schools." Thesis, University of North Texas, 1995. https://digital.library.unt.edu/ark:/67531/metadc278839/.

Full text
Abstract:
In this study factors which affect the degree of implementation of a curricular change were examined to determine how well a specific curricular change was implemented in relation to the original intent. The change, Developmentally Appropriate Practice, was implemented in Department of Defense Dependents Schools, Germany Region, beginning in school year 1991-1992 in grades kindergarten through two. During school year 1993-1994, grade three began the transition to Developmentally Appropriate Practice. Several factors which influence teacher behavior during the implementation process were investigated to determine if there is a correlation between those factors and degree of implementation, the dependent variable. The independent variables in this study were school culture; administrators' leadership effectiveness; teacher concerns about the implementation; and teacher characteristics including age, years teaching experience, years experience in Department of Defense Dependents' Schools, and training. The degree of implementation, the dependent variable, was defined in terms of the extent to which teachers had changed their behavior to become congruent with behavior required by the change. Teachers were identified as high, moderate, or low implementers, based on classroom observations. One purpose of the study was to increase understanding of implementation by analyzing the factors which affect the behavior of teachers in the change process. A second purpose of the study was to add to the body of research that explains why so many educational changes fail to become established practice. To establish interobserver reliability, two observers rated teachers using the same protocol. The interobserver reliability coefficient found was reported at .9820. The participants in the study completed the Stages of Concern Questionnaire, the Administrative Effectiveness Survey, the School Culture Survey, and a demographic survey. The results were correlated with the Early Childhood Classroom Observation form. Amount of training was found to have a statistically significant positive relationship with degree of implementation (p=.006). Statistically significant positive relationships were not found between the other independent variables and degree of implementation.
APA, Harvard, Vancouver, ISO, and other styles
21

Vesterlund, Mattias. ""Det gäller dig och din familj!" : Svenskt civilförsvar och vardagslivets militarisering under kalla kriget 1945-1975." Thesis, Uppsala universitet, Historiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-343198.

Full text
Abstract:
The Swedish civil defense during the Cold War Era was a well-developed and well-planned organization in comparison to many other countries. This caused civil defense ideas to come closer to individual citizens’ everyday lives and influence how they should adapt to the threat of nuclear war, thus creating a culture of civil defense. The purpose of this thesis is to elucidate what this militarization of everyday life looked like in Sweden during the Cold War and how it affected people’s everyday life. This is done through studying a civil defense journal between 1945-1975. The articles in the journal are analyzed by how they are portraying the day-to-day life in the context of civil defense. Partly through articles about propaganda and various civil defense courses and exercises, and partly through articles portraying the physical militarization of society, primarily fallout shelters and bunkers. Of particular interest is the contrast between the dark Cold War narrative and the narrative concerning the security and comfort provided by the welfare state. Finally, the thesis argues that the journal and its work can be seen in the context of militarization of everyday life. It tried to spread its militarizing vision in society, and did – incomparison to other countries – succeed in that pursuit. Militarization played a vital role in reaching out to the public, and in disseminating the idea of a welfare state that takes good care of its citizens, even during the hardest of times.
APA, Harvard, Vancouver, ISO, and other styles
22

Givens, Mark Allen. "Modeling and analyzing intrusion attempts to a comuter network operating in a defense-in-depth posture /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FGivens.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004.
Thesis advisor(s): Alex Bordetsky, Joe Roth. Includes bibliographical references (p. 89-90). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
23

Givens, Mark Allen. "Modeling and analyzing intrusion attempts to a computer network operating in a defense-in-depth posture." Thesis, View thesis View thesis via DTIC web site, 2004. http://handle.dtic.mil/100.2/ADA427180.

Full text
Abstract:
Thesis (M.S.)--Naval Postgraduate School, 2004.
Title from title screen (viewed Mar. 15, 2005). "September 2004." "ADA427180"--URL. Includes bibliographical references (p. 89-90). Also issued in paper format.
APA, Harvard, Vancouver, ISO, and other styles
24

Hagene, Matthew Ray. "Momentum Defect Superposition Model for Predicting Depth-Averaged Velocities in Trapezoidal Channels." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/theses/553.

Full text
Abstract:
An analytical model based on linear superposition of momentum defects is developed for predicting depth-averaged velocity distributions in trapezoidal and rectangular channels with submerged and unsubmerged rigid cylinders (i.e., simulated vegetation). The model is founded on wake theory and there is an existing model that is similar except for using linear superposition of velocity defects. The momentum defects and velocity defects supposition models both require a criterion for deciding when wakes created by the rigid cylinders will be considered completely dissipated (cutoff criterion). Comparing the momentum defects and velocity defects models required developing a new cutoff criterion that would have an equivalent effect when applied to either model. The chosen cutoff criterion considers a wake to be completely dissipated when umax (the maximum defect caused by a cylinder) is less than or equal to 0.2 m/s. Predicted depth-averaged velocities from both models were compared to measured values. The predicted values differed from the measured values by less than 20% in general. It was concluded that the depth-averaged velocity predictions from the linear superposition of momentum defects model and the linear superposition of velocity defects model do not differ significantly and that the greatest advantage of the velocity defects model is that compared to the momentum defects model it is simpler to implement.
APA, Harvard, Vancouver, ISO, and other styles
25

Hagberg, Nelly. ""Det är demokratin som är gemensam" : En komparativ kvalitativ innehållsanalys av nationell biblioteksstrategi och nationell säkerhetsstrategi." Thesis, Uppsala universitet, Institutionen för ABM, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-415049.

Full text
Abstract:
This thesis examines the correlation between the Swedish National Library Strategy and the Swedish National Security Strategy. These strategies originates from two different political fields that seemingly has nothing to do with each other. However, in the Swedish National Library Strategy, it states that public libraries in Sweden should be a part of the nation’s civil defense, and therefore be a part of Sweden’s total defense system. In the National Library Strategy, libraries are considered vital in order to sustain a strong democracy, this is described through the libraries focus on educating citizens in media and information literacy (MIL), as well as the librarians role as an independent and neutral information intermediary. Libraries would therefore enrich the civil defense through a crisis, or a wartime situation. However, in the National Security Strategy the vital role of public libraries within the defense system is not being discussed. The statement from the National Library Strategy has been met with a lot of questions and dispute. The reactions of the statement is in fact the premise of this thesis. The subsequent ignorance of the statement requires further knowledge, which this thesis establish. A comparative qualitative content analysis is applied to find similarities and differences between the two political fields, in order to understand the statement made in the Swedish National Library Strategy. The source material of this thesis consists of these two strategies, as well as further selected reports and research papers that is linked to the two strategies. The results of this thesis show that there is a communal discussion about threat scenarios, and that there are a mutual goal of a strong upheld democracy in both of the policies. However, the results show that there are differences in how to encounter and overcome the threats. This is a two years master’s thesis in Library and Information Science.
APA, Harvard, Vancouver, ISO, and other styles
26

Holmberg, Sara, and Martin Linjo. "Det svenska skyddsrumsbestådet : en undersökning av skyddsrummens relevans i Sverige." Thesis, KTH, Fastigheter och byggande, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-297483.

Full text
Abstract:
År 2002 fattade den svenska riksdagen beslutet att sluta bygga skyddsrum. Sverige har per capita näst flest antal skyddsrum i världen. Ett stort antal skyddsrum i Sverige, kombinerat med beslutet att inte bygga dem längre, har lämnat Sverige vid en vägkorsning. Hur mycket bör Sverige bry sig om sina skyddsrum? För utländska fiender kan skyddsrum verka som ännu ett hinder för att invadera, på grund av de svenska civila möjligheterna till att vara säkra från bomber och ett krigs påverkan. Även om krigföring har förändrats under åren och nya strategier har utvecklats, kommer en säker plats för civila att stärka den försvarande sidan. För att detta försvar ska fungera måste skyddsrummen vara konstruerade på tillgängliga platser för civilbefolkningen, erhålla det material som skyddsrummen är i behov av, kunna drivas av en civil samt vara i gott skick. Det var under kalla kriget som Sverige byggde de flesta av sina skyddsrum. Med många decennier och olika lagar för konstruktion som passerat, har många av skyddsrummen problem i nuläget. Problem såsom att material saknas, luftfilter har blivit för gamla, rummen har renoverats till något annat, eller helt enkelt att skyddet inte kan garantera den funktion som den en gång gjorde. I Sverige är Myndigheten för samhällsskydd och beredskap (MSB) den myndighet som ansvarar för skyddsrummens tillstånd. MSB har det yttersta ansvaret att se till att skyddsrummen är säkra i nödsituationer. För att uppfylla detta utgör de tillsyn och kontroller på skyddsrummen. I denna kandidatuppsats undersöks de svenska skyddsrummens tillstånd och de problem som följer med dem. Vi fann det även av intresse att undersöka skyddsrummens relevans i Sveriges samhälle ur ett historiskt- och ett nutidsperspektiv. Metoden som har använts är av kvalitativ och rättsdogmatisk karaktär. De slutsatser som kunnat dras i denna kandidatuppsats är att Sveriges skyddsrum befinner sig i olika tillstånd vad gäller skick och kvalité. Det kan också konstateras att det inte pågår tillräckligt många skyddsrumskontroller som både är önskat och nödvändigt gentemot det stora antal skyddsrum som finns. Slutligen nyttjas Sveriges skyddsrum för andra ändamål än vad de preliminärt byggdes för, vilket innebär att de fyller ett syfte i Sveriges samhälle.
In 2002, the Swedish government decided to stop building air raid shelters. Sweden has per capita the second most air raid shelters in the world. A large number of air raid shelters in Sweden, combined with the decision to stop constructing them, has left Sweden at a crossroad. How much should Sweden care about the air raid shelters? To foreign enemies, the air raid shelters may seem as yet another obstacle to invading, because of the opportunity given to the Swedish civilians to be safe from bombs and the effects of war. Even though the warfare has changed during the years and new strategies have been developed, a safe place for civilians will strengthen the defending side. For this defense to work, the air raid shelters have to be constructed at available locations for civilians, be equipped with the material needed, be operated by a civilian and the shelters have to be in good condition. It was during the Cold War era that Sweden built most of its air raid shelters. With a lot of decades and different rules of construction passing, many of these air raid shelters have problems now. The problems concern materials missing, air filters which have passed their best before date, the shelters being renovated to something completely different, or simply that the shelter cannot guarantee the function that it once did. In Sweden, The Swedish Civil Contingencies Agency (MSB) is the agency responsible for the condition of the air raid shelters. The agency has the utmost responsibility that the air raid shelters will be safe in case of emergency. To fulfill that, the agency executes supervision and regulatory control of the shelters. In this essay, the condition of the Swedish air raid shelters and the problems that come along with them get examined. We also found it interesting to examine the air raid shelters' relevance to Swedish society from a historic and present-day point of view. A qualitative and legal dogmatic method has been used. The conclusions that could be drawn from this essay is that Sweden’s air raid shelters are in different conditions regarding standard and quality. It can also be established that there aren’t enough regulatory controls being executed. Finally, the Swedish air raid shelters do serve a purpose for the Swedish society even though they have been built for other reasons.
APA, Harvard, Vancouver, ISO, and other styles
27

Ibarra, Castanedo Clémente. "Quantitative subsurface defect evaluation by pulsed phase thermography: depth retrieval with the phase." Thesis, Université Laval, 2005. http://www.theses.ulaval.ca/2005/23016/23016.pdf.

Full text
Abstract:
La Thermographie de Phase Pulsée (TPP) est une technique d’Évaluation Non-Destructive basée sur la Transformée de Fourier pouvant être considérée comme étant le lien entre la Thermographie Pulsée, pour laquelle l’acquisition de données est rapide, et la Thermographie Modulée, pour laquelle l’extraction de la profondeur est directe. Une nouvelle technique d’inversion de la profondeur reposant sur l’équation de la longueur de diffusion thermique : μ=(α /πf)½, est proposée. Le problème se résume alors à la détermination de la fréquence de borne fb, c à d, la fréquence à laquelle un défaut à une profondeur particulière présente un contraste de phase suffisant pour être détecté dans le spectre des fréquences. Cependant, les profils de température servant d’entrée en TPP, sont des signaux non-périodiques et non-limités en fréquence pour lesquels, des paramètres d’échantillonnage Δt, et de troncature w(t), doivent être soigneusement choisis lors du processus de discrétisation du signal. Une méthodologie à quatre étapes, basée sur la Dualité Temps-Fréquence de la Transformée de Fourier discrète, est proposée pour la détermination interactive de Δt et w(t), en fonction de la profondeur du défaut. Ainsi, pourvu que l’information thermique utilisée pour alimenter l’algorithme de TPP soit correctement échantillonnée et tronquée, une solution de la forme : z=C1μ, peut être envisagée, où les valeurs expérimentales de C1 se situent typiquement entre 1.5 et 2. Bien que la détermination de fb ne soit pas possible dans le cas de données thermiques incorrectement échantillonnées, les profils de phase exhibent quoi qu’il en soit un comportement caractéristique qui peut être utilisé pour l’extraction de la profondeur. La fréquence de borne apparente f’b, peut être définie comme la fréquence de borne évaluée à un seuil de phase donné φd et peut être utilisée en combinaison avec la définition de la phase pour une onde thermique : φ=z /μ, et le diamètre normalisé Dn=D/z, pour arriver à une expression alternative. L'extraction de la profondeur dans ce cas nécessite d'une étape additionnelle pour récupérer la taille du défaut.
Pulsed Phase Thermography (PPT) is a NonDestructive Testing and Evaluation (NDT&E) technique based on the Fourier Transform that can be thought as being the link between Pulsed Thermography, for which data acquisition is fast and simple; and Lock-In thermography, for which depth retrieval is straightforward. A new depth inversion technique using the phase obtained by PPT is proposed. The technique relies on the thermal diffusion length equation, i.e. μ=(α /π·f)½, in a similar manner as in Lock-In Thermography. The inversion problem reduces to the estimation of the blind frequency, i.e. the limiting frequency at which a defect at a particular depth presents enough phase contrast to be detected on the frequency spectra. However, an additional problem arises in PPT when trying to adequately establish the temporal parameters that will produce the desired frequency response. The decaying thermal profiles such as the ones serving as input in PPT, are non-periodic, non-band-limited functions for which, adequate sampling Δt, and truncation w(t), parameters should be selected during the signal discretization process. These parameters are both function of the depth of the defect and of the thermal properties of the specimen/defect system. A four-step methodology based on the Time-Frequency Duality of the discrete Fourier Transform is proposed to interactively determine Δt and w(t). Hence, provided that thermal data used to feed the PPT algorithm is correctly sampled and truncated, the inversion solution using the phase takes the form: z=C 1 μ, for which typical experimental C 1 values are between 1.5 and 2. Although determination of fb is not possible when working with badly sampled data, phase profiles still present a distinctive behavior that can be used for depth retrieval purposes. An apparent blind frequency f’b , can be defined as the blind frequency at a given phase threshold φd , and be used in combination with the phase delay definition for a thermal wave: φ=z /μ, and the normalized diameter, Dn=D/z, to derive an alternative expression. Depth extraction in this case requires an additional step to recover the size of the defect.
La Termografía de Fase Pulsada (TFP) es una técnica de Evaluación No-Destructiva basada en la Transformada de Fourier y que puede ser vista como el vínculo entre la Termografía Pulsada, en la cual la adquisición de datos se efectúa de manera rápida y sencilla, y la Termografía Modulada, en la que la extracción de la profundidad es directa. Un nuevo método de inversión de la profundidad por TFP es propuesto a partir de la ecuación de la longitud de difusión térmica: μ=(α /π·f)½. El problema de inversion se reduce entonces a la determinación de la frecuencia límite fb (frecuencia a la cual un defecto de profundidad determinada presenta un contraste de fase suficiente para ser detectado en el espectro de frecuencias). Sin embargo, las curvas de temperatura utilizadas como entrada en TFP, son señales no-periódicas y no limitadas en frecuencia para las cuales, los parámetros de muestreo Δt, y de truncamiento w(t), deben ser cuidadosamente seleccionados durante el proceso de discretización de la señal. Una metodología de cuatro etapas, basada en la Dualidad Tiempo-Frecuencia de la Transformada de Fourier discreta, ha sido desarrollada para la determinación interactiva de Δt y w(t), en función de la profundidad del defecto. Así, a condición que la información de temperatura sea correctamente muestreada y truncada, el problema de inversión de la profundidad por la fase toma la forma : z=C 1 μ, donde los valores experimentales de C 1 se sitúan típicamente entre 1.5 y 2. Si bien la determinación de fb no es posible en el caso de datos térmicos incorrectamente muestreados, los perfiles de fase exhiben de cualquier manera un comportamiento característico que puede ser utilizado para la extracción de la profundidad. La frecuencia límite aparente f’b , puede ser definida como la frecuencia límite evaluada en un umbral de fase dado φd , y puede utilizarse en combinación con la definición de la fase para una onda térmica: φ=z /μ, y el diámetro normalizado Dn , para derivar una expresión alternativa. La determinación de la profundidad en este caso, requiere de una etapa adicional para recuperar el tamaño del defecto.
APA, Harvard, Vancouver, ISO, and other styles
28

Ibarra, Castanedo Clemente. "Quantitative subsurface defect evaluation by pulsed phase thermography: depth retrieval with the phase." Doctoral thesis, Université Laval, 2005. http://hdl.handle.net/20.500.11794/18116.

Full text
Abstract:
La Thermographie de Phase Pulsée (TPP) est une technique d’Évaluation Non-Destructive basée sur la Transformée de Fourier pouvant être considérée comme étant le lien entre la Thermographie Pulsée, pour laquelle l’acquisition de données est rapide, et la Thermographie Modulée, pour laquelle l’extraction de la profondeur est directe. Une nouvelle technique d’inversion de la profondeur reposant sur l’équation de la longueur de diffusion thermique : μ=(α /πf)½, est proposée. Le problème se résume alors à la détermination de la fréquence de borne fb, c à d, la fréquence à laquelle un défaut à une profondeur particulière présente un contraste de phase suffisant pour être détecté dans le spectre des fréquences. Cependant, les profils de température servant d’entrée en TPP, sont des signaux non-périodiques et non-limités en fréquence pour lesquels, des paramètres d’échantillonnage Δt, et de troncature w(t), doivent être soigneusement choisis lors du processus de discrétisation du signal. Une méthodologie à quatre étapes, basée sur la Dualité Temps-Fréquence de la Transformée de Fourier discrète, est proposée pour la détermination interactive de Δt et w(t), en fonction de la profondeur du défaut. Ainsi, pourvu que l’information thermique utilisée pour alimenter l’algorithme de TPP soit correctement échantillonnée et tronquée, une solution de la forme : z=C1μ, peut être envisagée, où les valeurs expérimentales de C1 se situent typiquement entre 1.5 et 2. Bien que la détermination de fb ne soit pas possible dans le cas de données thermiques incorrectement échantillonnées, les profils de phase exhibent quoi qu’il en soit un comportement caractéristique qui peut être utilisé pour l’extraction de la profondeur. La fréquence de borne apparente f’b, peut être définie comme la fréquence de borne évaluée à un seuil de phase donné φd et peut être utilisée en combinaison avec la définition de la phase pour une onde thermique : φ=z /μ, et le diamètre normalisé Dn=D/z, pour arriver à une expression alternative. L'extraction de la profondeur dans ce cas nécessite d'une étape additionnelle pour récupérer la taille du défaut.
Pulsed Phase Thermography (PPT) is a NonDestructive Testing and Evaluation (NDT& E) technique based on the Fourier Transform that can be thought as being the link between Pulsed Thermography, for which data acquisition is fast and simple; and Lock-In thermography, for which depth retrieval is straightforward. A new depth inversion technique using the phase obtained by PPT is proposed. The technique relies on the thermal diffusion length equation, i.e. μ=(α /π·f)½, in a similar manner as in Lock-In Thermography. The inversion problem reduces to the estimation of the blind frequency, i.e. the limiting frequency at which a defect at a particular depth presents enough phase contrast to be detected on the frequency spectra. However, an additional problem arises in PPT when trying to adequately establish the temporal parameters that will produce the desired frequency response. The decaying thermal profiles such as the ones serving as input in PPT, are non-periodic, non-band-limited functions for which, adequate sampling Δt, and truncation w(t), parameters should be selected during the signal discretization process. These parameters are both function of the depth of the defect and of the thermal properties of the specimen/defect system. A four-step methodology based on the Time-Frequency Duality of the discrete Fourier Transform is proposed to interactively determine Δt and w(t). Hence, provided that thermal data used to feed the PPT algorithm is correctly sampled and truncated, the inversion solution using the phase takes the form: z=C 1 μ, for which typical experimental C 1 values are between 1.5 and 2. Although determination of fb is not possible when working with badly sampled data, phase profiles still present a distinctive behavior that can be used for depth retrieval purposes. An apparent blind frequency f’b , can be defined as the blind frequency at a given phase threshold φd , and be used in combination with the phase delay definition for a thermal wave: φ=z /μ, and the normalized diameter, Dn=D/z, to derive an alternative expression. Depth extraction in this case requires an additional step to recover the size of the defect.
La Termografía de Fase Pulsada (TFP) es una técnica de Evaluación No-Destructiva basada en la Transformada de Fourier y que puede ser vista como el vínculo entre la Termografía Pulsada, en la cual la adquisición de datos se efectúa de manera rápida y sencilla, y la Termografía Modulada, en la que la extracción de la profundidad es directa. Un nuevo método de inversión de la profundidad por TFP es propuesto a partir de la ecuación de la longitud de difusión térmica: μ=(α /π·f)½. El problema de inversion se reduce entonces a la determinación de la frecuencia límite fb (frecuencia a la cual un defecto de profundidad determinada presenta un contraste de fase suficiente para ser detectado en el espectro de frecuencias). Sin embargo, las curvas de temperatura utilizadas como entrada en TFP, son señales no-periódicas y no limitadas en frecuencia para las cuales, los parámetros de muestreo Δt, y de truncamiento w(t), deben ser cuidadosamente seleccionados durante el proceso de discretización de la señal. Una metodología de cuatro etapas, basada en la Dualidad Tiempo-Frecuencia de la Transformada de Fourier discreta, ha sido desarrollada para la determinación interactiva de Δt y w(t), en función de la profundidad del defecto. Así, a condición que la información de temperatura sea correctamente muestreada y truncada, el problema de inversión de la profundidad por la fase toma la forma : z=C 1 μ, donde los valores experimentales de C 1 se sitúan típicamente entre 1.5 y 2. Si bien la determinación de fb no es posible en el caso de datos térmicos incorrectamente muestreados, los perfiles de fase exhiben de cualquier manera un comportamiento característico que puede ser utilizado para la extracción de la profundidad. La frecuencia límite aparente f’b , puede ser definida como la frecuencia límite evaluada en un umbral de fase dado φd , y puede utilizarse en combinación con la definición de la fase para una onda térmica: φ=z /μ, y el diámetro normalizado Dn , para derivar una expresión alternativa. La determinación de la profundidad en este caso, requiere de una etapa adicional para recuperar el tamaño del defecto.
APA, Harvard, Vancouver, ISO, and other styles
29

Kivett, Ryan B. "Partnering defense depots with industry for the performance of depot-level maintenance : a case analysis of the AIM XXI program." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341442.

Full text
Abstract:
Thesis (M.S. in Management) Naval Postgraduate School, December 1997.
"December 1997." Thesis advisor(s): Mark W. Stone, David F. Matthews. Includes bibliographical references (p. 77-80). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
30

Darabi, Akbar. "Detection and estimation of defect depth in infrared thermography using artificial neural networks and fuzzy logic." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0016/NQ55806.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Walldén, Dean. "Det Militära Maktmedlet : En politisk pusselbit vid upprustning av nationell försvarsförmåga." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10016.

Full text
Abstract:
The strategic decision-making mechanisms a state has at its disposal to shape and develop its military means of power are complex. Perceptions of the outside world may be particularly problematic because perceptions of threats change. Political decisions which aim to create robust and long-term security strategies where several factors must be taken into account that are largely determined by the interests of other actors can be difficult to understand and explain. The investment in defence set out in Swedish Defence Bill 2020 is a paradigm shift from reducing to enlarging the armed forces This involves a continued investment into a dedicated professional defence, but in combination with conscription, new establishment of regiments, more military units and increased materiel investment. The purpose of this study is to, examine the driving forces and explanatory factors linked to this paradigm shift, where political decisions to enlarge the military are in focus and examined using Graham Allison and Philip Zelikow's three theoretical perspectives on strategic decision-making. The results of this study clearly show that the dominant driving force for the re-expansion of Sweden's defence capability was the deteriorating external situation, which was evident in terms of all three theoretical perspectives. It is also possible to see traces of other driving forces in the bill, such as long-termism, sustainability and the degree of detailed control of the Armed Forces, which demonstrates the complexity of political decision-making about the creation of military power.
APA, Harvard, Vancouver, ISO, and other styles
32

Alexander, Rodney T. "Can the analytical hierarchy process model be effectively applied in the prioritization of information assurance defense in-depth measures? - a quantitative study." Thesis, Capella University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10257625.

Full text
Abstract:

Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection systems, and password procedures across their enterprises to plan strategically and manage IT security risks. This quantitative study explores whether the analytical hierarchy process (AHP) model can be effectively applied to the prioritization of information assurance defense in-depth measures. In response to these threats, the President, legislators, experts, and others have characterized cybersecurity as a pressing national security issue. The methods used in this study consisted of emailing study participants a survey requesting that they prioritize five defense in-depth information assurance measures, anti-virus, intrusion detection, password, smart-cards, and encryption, with a range of responses from 1-5 using a Likert scale to consider standard cost, effectiveness, and perceived ease of use in terms of protection of organizational computing devices. The measures were then weighted, based on ranking. A pair-wise comparison of each of the five measures were then made using AHP to determine whether the Likert scale and the AHP model could be effectively applied to the prioritization of information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that AHP does not affect the relationship between the information technology analysts’ prioritization of five defense in-depth dependent variables and the independent variables of cost, ease of use, and effectiveness in protecting organizational devices against cyber-attacks.

APA, Harvard, Vancouver, ISO, and other styles
33

Guild, Jennifer A. "Scripting quality of security service (QoSS) safeguard measures for the suggested INFOCON system." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1188.

Full text
Abstract:
Approved for public release, distribution is unlimited
The existing INFOCON system is an information warning system that the DOD maintains. It is not formally correlated to other warning systems, such as DEFCON, FPCON/THREATCON, WATCHCONs, SANS INFOCON, or the Homeland Security Advisory System Threat condition. The criteria for each INFOCON level are subjective. The INFOCON recommended actions are a mix of policy and general technical measures. The INFOCON system vaguely follows the Defense in Depth network defense methodology. This thesis examines the foundations for the existing INFOCON system and presents an evolved INFOCON system. The focus will be on the security of the DOD information infrastructure and the accomplishment of the mission, as well as the usability and the standardization of the INFOCON warning system. The end result is a prototype that is a set of predefined escalation scripts for the evolved INFOCON system's safeguard measures.
Civilian, Federal Cyber Service Corps, Naval Postgraduate School
APA, Harvard, Vancouver, ISO, and other styles
34

Kullander, Nathalia. "En analys kring det civila försvaret på lokal nivå. : En jämförande studie mellan Värmland och Örebros resurser och samarbetsförmågor." Thesis, Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85130.

Full text
Abstract:
The purpose of this essay is to study the civil defense work in Värmland and Örebro, connected to their resources whithin the respective county. To get a clear picture of how the counties are equipped when it comes to a crisis I have been focusing on the necessary principle connected to civil defense. The study also includes their work with the confederation of enterprise, warehousing and cyber security. To be able to see if they have the potential to collaborating with their resources. I use Emerson's theory of collaborative governance to see if Värmland and Örebro have the potential to work together during a conceivable crisis. Which is about cross-border governance where public and non-public actors prepare overall decisions. When I read about previous research regarding civil defense, I saw Lunde Saxis report Nordic Defense cooperation after the Cold war. And then I got the idea of studying the cooperation between Värmland and Örebro County. Like his theory, it is most optimal if two smaller actors merge during a crisis instead of managing it individually. The counties cannot challenge each other, but they can complement each other during a crisis. The thesis has a larger issue that is linked to the purpose of looking at the potential for collaboration within the theory Collaborative governance:- Can Emerson's theory of Collaborative Governance be established in today's civil defense at the local level?In order to be able to answer that question, the essay will have three sub-questions based on answering whether Örebro and Värmland have opportunities to find possible collaboration with each other.- Are there co-operation capabilities between the two counties according to Collaborative governance?- What assets do the two counties have at their disposal in civil defense?- Do the counties have physical proximity to the various assets required for a stable civil defense?The thesis concludes that the two counties have good conditions for coping with a crisis with their resources available, and that there is great potential for developing new methods and establishing more working methods linked to business, warehousing and cyber security. Collaboration can take place within Emerson's theory, the counties have good chances of collaborating within collaborative governance.Keywords- Civil Defense, The Confederation Of Enterprise, Warehousing, Cyber Security, Cooperation, Collaborative Governance.
APA, Harvard, Vancouver, ISO, and other styles
35

Nolan, Heather R. "Understanding Outcomes in the Giant Omphalocele Population: An In-depth Look at a Single Center Comprehensive Experience." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1554120110247392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Elman, Kim. ""NI ÄR PROPAGANDA!" : Ett bidrag till det psykologiska försvaret." Thesis, Försvarshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5843.

Full text
Abstract:
This study investigates the possibility of implementing national psychological defence measures utilizing social media. These measures are understood as an exercise of political power and are contextualised in the contemporary global information arena using Castells theory of communication power in the network society, while employing PSYOPS methodology to further understand the tactical dimensions. It also attempts to evaluate the prevalence of ”filter bubbles” and the potential hindrance such may be to successful implementation. Results show that key audiences can be reached and effectively influenced through the use of social media advert targeting systems and open source, fact-based information campaigns.
APA, Harvard, Vancouver, ISO, and other styles
37

Andersson, Daniel, and Jesper Sparre. "Svenskt-finskt armésamarbete på taktisk nivå : – Vad finns det för förutsättningar?" Thesis, Högskolan i Halmstad, Akademin för ekonomi, teknik och naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42444.

Full text
Abstract:
Försvarssamarbetet mellan Sverige och Finland har accelererat under de senaste åren. Sist ut och kanske även den mest komplicerade delen i detta samarbete är samarbetet mellan de båda ländernas arméer. Markförbandens unika kontext sätter den mänskliga interaktionen i centrum då stora mängder människor, fordon och system skall ledas och samordnas i tid och rum på en begränsad geografisk yta. När denna verksamhet involverar två försvarsmakter uppstår en interaktion som är intressant att studera. Ur ett arméperspektiv belyser studien de förutsättningarna och de faktorer som påverkar det svensk-finska militära samarbetet, med den taktiska nivån som utgångspunkt. Studien baseras på intervjuer med officerare från både svenska och finska försvarsmakten, och tar upp och förklarar både faktorer som förenar och driver samarbetet framåt respektive faktorer som försvårar samarbetet. Slutsatserna i studien förklaras kring en modell som beskriver de faktorer som i störst utsträckning påverkar samarbetet samt hur dessa förhåller sig till sin kontext. Studien visar att det finns olikheter mellan försvarsmakterna som påverkar samarbetet, men också aspekter som stärker det gemensamma arbetet. Sammantaget pekar studien på fem faktorer inom olika områden som har tydlig påverkan på samarbetet. Faktorerna påverkar samarbetet på olika sätt med olika påverkansgrad på olika nivåer i organisationen. Samarbetets drivkraft är starkt knutet till den tydliga politiska viljan. Den svenska och finska ledningskulturen skiljer sig år vilket återspeglas på alla nivåer men är tydligast och får störst påverkan på den lägre nivån. Språket är en skiljande faktor. Lösningen med ett gemensamt arbetsspråk är logisk men studien visar att det innebär utmaningar av större dimension än vid första anblick. Att bygga ett samarbete utan avtalade förpliktelser gör att tillit och förtroende får en betydande roll. För ett samarbete mellan arméstridskrafter är vikten av ett ledningsstödsystem central. Det gemensamma arbetet inom ledningssystemområdet kan skapa dessa förutsättningar. Olikheterna till trots så har Sverige och Finland redan ett väl fungerande samarbete, vilket nutida erfarenheter visar bland annat från våra gemensamma beredskapsförband och internationella insatser. Man har också genom tydlig målsättning och ambition mycket goda förutsättningar att fördjupa samarbetet ytterligare.
The defence cooperation between Sweden and Finland has accelerated during the last couple of years. Last into the cooperation, and maybe the most complex part is the cooperation between the two armies. The unique context of land forces puts human interaction in focus when large amounts of people, vehicles and technical systems are to be commanded and coordinated in time and in a limited geographical space. When this type of action involves two defence forces the dynamics that occurs is worth studying. This thesis project studies the conditions and factors that affect the Swedish-Finnish defence cooperation on a tactical level, from an Army perspective. The study explains both the driving and the constricting factors in the cooperation. The research is based on interviews with Swedish and Finnish army officers. Conclusions are drawn supported by a model built on the factors that are most influential on the cooperation and how these factors apply to the context of the cooperation. The thesis shows that there are differences between the two defence forces that affect the cooperation, but it also shows aspects that strengthens the efforts. The factors have different effects and different impact depending on the organisational level in the defence forces. The conclusions points to five strong factors in different areas that influence the cooperation. The main drive has a strong connection to the political will. Swedish and Finnish leadership culture is diversified, this shows and has the greatest impact on lower organisational levels. Language is a dividing factor. It is a logical solution to use a common working language, but this study shows that the common language results in great challenges. Building a cooperation without obligations means that trust and confidence are of substantial importance. In a cooperation between Armies a common command and control system is vital. The collaboration on system development can set the condition for a common command and control system. Even though this study found differences it also found a working cooperation. Proof of this is our bilateral high readiness units and international operations. Through clear and common goals and ambitions there are prerequisites for an even deeper cooperation.
Yhteenveto Ruotsin ja Suomen puolustusyhteistyö on edennyt nopeasti viime vuosina. Viimeinen ja ehkä monimutkaisin osa tätä yhteistyötä on molempien maiden maavoimien välinen yhteistyö. Maavoimien yksikköjen ainutlaatuisuus asettaa keskeiseksi ihmisten vuorovaikutuksen, jossa suuria määriä ihmisiä, ajoneuvoja ja järjestelmiä on johdettava ja koordinoitava aikaan ja paikkaan rajoitetulla maantieteellisellä alueella. Kun tähän toimintaan liittyy kahden maan puolustusvoimaa, muodostuva dynamiikka on pohdinnan arvoinen. Maavoimien näkökulmasta tutkimuksessa tuodaan esiin olosuhteet ja tekijät, jotka vaikuttavat Ruotsin ja Suomen väliseen sotilaalliseen yhteistyöhön, lähtökohtana taktinen taso. Tutkimuksessa tarkastellaan ja selitetään sekä yhteistyötä yhdistäviä ja eteenpäin vieviä tekijöitä että yhteistyön vaikeuttavia tekijöitä. Tutkimus perustuu sekä Ruotsin että Suomen armeijan upseerien haastatteluihin. Tutkimus perustuu johtopäätöksiin mallista joka kuvaa tekijöitä jotka vaikuttavat yhteistyöhön eniten ja miten nämä liittyvät sen kontekstiin. Tutkimus osoittaa, että asevoimien välillä on eroja jotka vaikuttavat yhteistyöhön, mutta myös aspekteja jotka vahvistavat yhteistä työtä. Kaiken kaikkiaan tutkimus osoittaa viisi tekijää eri alueilla, joilla on selvä vaikutus yhteistyöhön. Tekijät vaikuttavat yhteistyöhön eri tavoin ja erilaisilla vaikutustasoilla organisaation eri tasoilla. Yhteistyön liikkeellepaneva voima liittyy kiinteästi selkeään poliittiseen tahtoon. Ruotsin ja Suomen johtamiskulttuuri eroavat, mikä heijastuu kaikilla tasoilla, mutta on selkein ja vaikuttaa enempi alemmalla tasolla. Kieli on erottava tekijä. Yhteinen työkieli on ratkaisuna looginen, mutta tutkimus osoittaa, että se asettaa suurempia haasteita kuin ensi silmäyksellä voisi todeta. Yhteistyön rakentaminen ilman sopimusvelvoitteita tarkoittaa, että luottamuksella on merkittävä rooli. Komentotukijärjestelmän merkitys on keskeinen maavoimien yhteistyölle. Yhteinen työskentely johtamisjärjestelmän alueella voi luoda nämä olosuhteet. Eroista huolimatta Ruotsilla ja Suomella on jo hyvin toimiva yhteistyö, jonka nykypäivän kokemukset osoittavat esimerkiksi yhteisistä valmiusjoukoista ja kansainvälisistä rauhanturvaamis- ja kriisinhallintatehtävistä. Selkeät tavoitteet ja pyrkimykset luovat myös erittäin hyvät edellytykset syventää yhteistyötä entisestään.
APA, Harvard, Vancouver, ISO, and other styles
38

Fredin, Fredrik, and Peter Johnsson. "Förutsättningar för det nya nationella försvaret : En fallstudie av plutonchefskapet vid den 161.strilbataljonen." Thesis, Högskolan i Halmstad, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-36975.

Full text
Abstract:
Omvärldsförändringar har inneburit att regeringen gett Försvarsmakten en ny inriktning med ett ökat fokus på förmågan att försvara Sverige. Syftet med denna studie är att skapa förståelse för förutsättningarna för chefskapet på plutonsnivån i det nationella försvaret och utveckla kunskap om vilka förutsättningar plutoncheferna har att möta de krav som det nya nationella försvaret ställer. Studien är genomförd med en induktiv kvalitativ fallstudiedesign med en hermeneutisk ansats. Det empiriska materialet baseras på data från 12 intervjuer med plutonchefer och data från undersökning av centrala Försvarsmaktsdokument. Resultatet visar att plutonchefensrollen karaktäriseras av en balansgång mellan rollen som chef och rollen som administratör, där administrationen väger över på bekostnad av krigföringsförmåga och ledarskap. Chefernas uppfattning om det nationella försvarets krav överensstämmer väl med de övergripande styrdokumenten men en tydlig sammanställning av kraven saknas vilket leder till osäkerhet. Plutonchefernas förutsättningar för att uppfylla det nya försvarets krav påverkas av deras möjlighet att balansera mellan uppgifter och tillgängliga resurser, vilket beror på avsaknad av administrativt stöd och brist på ledning. Studien har identifierat ett motsatsförhållande mellan två samtidigt pågående organisationsförändringar. Fenomenet som vi har valt att kalla paradoxförändring, innehåller en rollinriktad förändring mot chefen som administratör och en attitydinriktad förändring mot krigsförbandschef i det nya nationella försvaret.
The changes in the strategical environment have resulted in the government giving the Swedish defense forces a new national alignment, towards the capability of national defense. The purpose of this study is to build understanding of the conditions for platoon level leadership in the new national defense and to develop knowledge of the conditions the platoon commanders have been given to meet the demands by the new national defense. The research has been carried out by an inductive quantitative case study design with a hermeneutic approach. The empirical data is based on twelve interviews with platoon leaders and a study of official defense force documents. The research shows that the role of the platoon leader is characterized by balancing the role as commander and the role of administrator, were the administration weighs over on the expense of the capability of warfare and leadership. The platoon commander’s perception of the demands of the national defense complies with official defense force documents, but the absence of a clear compilation of the demands leads to some uncertainty. The platoon commander’s conditions to fulfill the demands of the new national defense is determined by their ability to balance tasks and available resources. This in turn is due to absence of administrative support and command. The research has identified a contradiction between two simultaneously ongoing organizational changes. The phenomenon that we have chosen to call the paradox change, contains one role-orientated change towards the commander as an administrator and one character-oriented change towards combat commander in the new national defense.
Uppdragsutbildning för Försvarsmakten
APA, Harvard, Vancouver, ISO, and other styles
39

Phalama, Mmabore S. H. "Factors affecting implementation of enterprise applications integration (EAI) with special reference to corruption and fraud in DOD." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20253.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2012.
ENGLISH ABSTRACT: Corporate mergers and partnerships are common in today’s competitive environment and inevitably require organisations to integrate information and telecommunication systems when such unisons take place. One of the most important challenges in each enterprise, especially forced by global markets and the resulting competition, is the capability to efficiently interact, collaborate and exchange information with business partners and within an organisation. Many software systems within organisations are not integrated into a homogeneous structure and therefore the sharing and exchange of information, not being synchronised, leads to possible misappropriation of such information. These isolated systems in organisations, could consequently become possible platforms for corruption and fraud, leading to increase in computer crime. While key risk areas remain, new dangers are emerging. Government stakeholders require departments to be accountable and responsible, which underpins the sharing and exchanging of relevant information, which in turn necessitates the integration of inter- as well as intra-departmental systems. If corruption and fraud is committed in these departments the impact may be significant, including damage to their reputation and image and even detrimental to service delivery to communities. Government and law enforcement agencies all over the world are faced with challenges of combating corruption and fraud. Fighting corruption and fraud committed via computers necessitates the need to close the gaps created by computers which were designed without consideration for future integration. Hence organisations should seek a way to link systems that were developed in isolation in order to simplify and automate business processes to the greatest extent possible. The aim of this study is to discuss factors affecting the implementation of application systems in large organisations with special reference to the South African Department of Defence (SA DOD). Current systems will be studied and a possible approach on how the DOD Vehicle Management Systems could be integrated will be recommended. This study introduces and defines the problem, describes different research methodologies including the methodology that was used. The topics of corruption and fraud, electronic commerce and e-government will be explored through intensive research of the extant literature, drawing interpretations to be applied to the empirical data gathered on fraud and corruption in DOD and on their ITC systems. Finally the findings and recommendations of this research, based on the theoretical and empirical data, will be presented.
AFRIKAANSE OPSOMMING: Korporatiewe oornames en vennootskappe is algemeen in vandag se kompeterende omgewing. Dit is dus onvermydelik dat daar van ondernemings verwag word om informasie en telekommunikasie stelsels te integreer by die paasvind van sulke verbintenisse. Een van die mees belangrike uitdagings in elke onderneming, veral in die lig van globale markte met die gevolglike kompeterende uitdagings, is die vermoë vir effektiewe interaksie, samewerking en uitruil van inligting met besigheidsvennote en ook in die onderneming self. Talle sagteware stelsels in ondernemings is nie geïntegreer in ʼn homogene struktuur nie en gevolglik, omdat dit nie gesinkroniseer is nie, lei die deel en uitruil van informasie tot moontlike wederregtelike toe-eiening van sulke informasie. Sulke geïsoleerde stelsels in ondernemings kan dus die platvorms word van korrupsie en bedrog en lei tot ʼn verhoging van rekenaarmisdywe. Terwyl sleutel risiko areas steeds van toepassing is, is daar ook weer nuwe gevare wat te voorskyn kom. Die Staat se aandeelhouers vereis dat departemente aanspreeklik en verantwoordelik sal wees wat die belangrikheid van die deel en uitruil van inligting onderstreep en wat op sy beurt weer die integrasie van inter- asook intradepartementele stelsels noodsaak. As misdaad en korrupsie gepleeg word in hierdie departemente mag die impak betekenisvol wees. Dit sluit in skade aan hul reputasie en beeld en kan selfs dienslewering aan gemeenskappe belemmer. Om korrupsie en bedrog wat met rekenaars gepleeg word te beveg, is dit nodig om die gapings toe te maak wat deur ontwerpe geskep is sonder dat toekomstige integrasie inaggeneem is. Ondernenings moet dus ‘n manier soek om stelsels te koppel wat in isolasie ontwikkel was met die doel om besigheidsprosesse tot die grootste moontlike mate te vereenvoudig en te outomatiseer. Die doel van hierdie studie is om die faktore te ondersoek wat die implementering van stelsels beïnvloed in groot ondernemings met spesifieke verwysing na die Suid Afrikaanse Departement van Verdediging (SA DVV). Huidige sisteme sal bestudeer word en ʼn moontlike benadering sal aanbeveel word oor hoe die DVV se Voertuig Bestuurstelsels geintegreer kan word. In hierdie studie word die besiheids- asook die navorsings-probleem gedefineer. Die onderwerpe van korrupsie en bedrog, elektroniese handel en e-regering sal ondersoek word deur intensiewe navorsing van bestaande literatuur te doen. Dit word aangevul deur vertolkings van die hierdie toepaslike literatuur gepaard met empiriese data versameling oor bedrog en korrupsie in die DVV en die Departement se “ITK” stelsels. As finale stap sal die bevindings en aanbevelings van hierdie navorsing, gebasseer op teoretiese en impiriese data, aangebied word.
APA, Harvard, Vancouver, ISO, and other styles
40

Hodžic, Faris. "Vliv míry zadluženosti na výši veřejných výdajů v resortu obrany ve vybraných členských státech NATO." Doctoral thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-165928.

Full text
Abstract:
The defense spending plays a significant role in the decision-making process of setting up a defense policy. The economy of a state, its performance and development rank among the main factors that influence the size of this public expenditure. At a time of economic stagnation in the Western European countries, the ongoing public debt crisis affects to a ever growing extent all areas of public spending, including the defense. This work aims to contribute to the current knowledge in the field of defense economy and public finance by investigating the influence of the state debt on defense spending. The first part of the work is dedicated to defining the economy of defense and providing a brief summary of its historical development, followed by a discussion of defense as a pure public good. This chapter analyzes the issue of public debt and explains how the major schools of economic theory approach this problem. The second part outlines the previous research in the field of defense spending and debt, their development and the potential relationship with macroeconomic variables. The third chapter presents and discusses the results of empirical research that is based on the theoretical assumptions and models introduced in the first two chapters. The analysis was performed on time series from the period of 1978 to 2011 (34 years) for seven NATO member states: Belgium, Denmark, France, Italy, Netherlands, UK and USA. The empirical analysis was performed by the statistical methods of regression and panel regression. The primary hypothesis on the existence of a relationship between the public debt and defense spending was confirmed and the partial hypothesis that this relationship is negative was refuted.
APA, Harvard, Vancouver, ISO, and other styles
41

Rutkowski, Mitchell M. "Growth Parameter Dependence and Correlation of Native Point Defects and Dielectric Properties in BaxSr1-xTiO3 Grown by Molecular Beam Epitaxy." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1366299175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Junior, Reinaldo Squillante. "Controle relacionado à segurança nas indústrias de processos: uma abordagem integrada de modelos de acidentes, defesa em profundidade e diagnosticabilidade segura." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/3/3152/tde-10082017-110852/.

Full text
Abstract:
A questão da segurança funcional das indústrias de processos vem recebendo uma atenção crescente pela comunidade científica mundial, uma vez que se observa a possibilidade de ocorrências de acidentes e as consequências indesejadas que estes acidentes têm provocado. Essas indústrias podem ser consideradas como parte de uma classe de sistemas denominados Sistemas Críticos, que são caracterizados pela possibilidade de ocorrência de falhas críticas, que resultam em acidentes com perdas de vidas humanas, danos ao meio ambiente e perdas financeiras envolvendo custos significativos de equipamentos e propriedades. Estes fatos justificam a necessidade de uma nova abordagem no que se refere ao design de processos, design de controle de processos, análise e controle de riscos e avaliação de riscos. Um dos desafios pertinentes à segurança funcional está associado a como vincular os cenários de acidentes aos requisitos para projetos de sistemas de controle relacionados à segurança das indústrias de processos de forma sistemática. Por sua vez, a possibilidade de ocorrência de eventos críticos e/ou eventos indesejados não observados ou ocultos, como fatores relevantes associados à evolução da sequência de eventos que culmina na ocorrência de um acidente. Neste contexto, o desafio está em aprimorar a eficácia destes sistemas de controle, que envolve o desenvolvimento de uma solução capaz de supervisionar o processo de evolução de falhas críticas, a fim de se garantir um nível de segurança funcional adequado e que esteja em conformidade com as normas internacionais aplicáveis IEC 61508 e IEC 61511. Portanto, estas considerações trazem novos requisitos para o projeto de sistemas de controle desta natureza, capaz de englobar modelos de acidentes e processos de evolução de falhas críticas. Uma solução é a consideração das abordagens de prevenção e mitigação de falhas críticas de forma integrada e interativa. Além disso é necessário abordar novas técnicas e conceitos para que se possa desenvolver um sistema de controle capaz de rastrear e atuar nos processos de evolução de falhas desta natureza. Uma possibilidade consiste em considerar o princípio de defesa em profundidade aliado à propriedade de diagnosticabilidade segura. O atendimento a este novo conjunto de requisitos não é trivial e se faz necessário integrar diferentes formalismos para o desenvolvimento de soluções adequadas. Portanto, este trabalho apresenta uma metodologia para o projeto de um sistema de controle baseado no conceito de segurança funcional para indústrias de processos, e que propõe: (i) uma arquitetura de controle para prevenção e mitigação de falhas críticas, (ii) extensão da classificação de barreiras de segurança focando na automação via sistemas instrumentados de segurança (SIS) (iii) framework para a síntese de sistemas de controle relacionados à segurança baseado em modelos de acidentes e que contempla os seguintes métodos: (a) elaboração do HAZOP, (b) construção de modelos de acidentes, (c) integração dos modelos de acidentes com o HAZOP e (d) geração dos algoritmos de defesa para a prevenção e mitigação de falhas críticas, a partir de técnicas de modelagem usando extensões da rede de Petri: Production Flow Schema (PFS) e Mark Flow Graph (MFG). A metodologia proposta foi verificada, a partir de exemplos de aplicação investigados na literatura.
The issue of the functional safety of process industries has been receiving increasing attention from the world scientific community, since it has stated the possibility of occurrences of the accidents and the related undesired consequences. These industries can be considered as part of a system class called critical systems, which are characterized by the occurrence of critical faults, which can result in accidents involving loss of life, damage to the environment, and financial losses involving equipment and property. These facts justify the need for a new approach that addresses: process design, process control design, risk analysis and control, and risk assessment. One of the challenges related to functional safety is associated with how to integrate accident scenarios to the requirements for the design of safety-related control systems of the process industries in a systematic way. Furthermore, there is the possibility of the occurrence of the unobserved or hidden undesired and / or critical events, as relevant factors associated to the evolution of the sequence of the events that corroborates in the occurrence of an accident. In this context, the challenge is to improve the effectiveness of these control systems, which involves the development of a solution capable of supervising the process of evolution of the critical and / or undesired events, in order to guarantee an adequate level of functional safety, and that complies with the applicable international standards IEC 61508 and IEC 61511. Therefore, these considerations bring new requirements for the design of control systems of this nature, capable of encompassing the accident models and the critical fault evolution processes. One solution is to consider critical fault prevention and mitigation approaches in an integrated and interactive way. In addition, it is necessary to addresses new techniques and concepts in order to develop a control system capable of tracking and acting in the evolution processes of faults of this nature. One possibility is to consider the principle of defense-in-depth coupled with the property of safe diagnosability. The fulfillment of this new set of requirements is not trivial and it is necessary to integrate different formalisms for the development of adequate solutions. Therefore, this work presents a methodology for the design of a safety-related control systems based on the concept of functional safety for the process industries, which proposes: (i) a control architecture for the prevention and mitigation of the critical faults, (ii) an extension of the classification of the safety barriers focusing on automation via safety instrumented system (SIS), (iii) a framework for the synthesis of the safety-related control systems based on accident models and which includes the following methods: (a) elaboration of the HAZOP study, (b) construction of the accident models, (c) integration of the accident models with the HAZOP study, and (d) generation of the defense algorithms for the prevention and mitigation of the critical faults, via modeling techniques using extensions of the Petri net: Production Flow Schema (PFS) and Mark Flow Graph (MFG). The proposed methodology was verified, from application examples investigated in the literature.
APA, Harvard, Vancouver, ISO, and other styles
43

Lambach, Mark D. "Distribution of Chondrocyte Cell Death in Medial and Lateral Femoral Condyles in Porcine Knees after Sub-impact Loading." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1338354533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Lin, Chung-Han. "The Effects of Thermal, Strain, and Neutron Irradiation on Defect Formation in AlGaN/GaN High Electron Mobility Transistors and GaN Schottky Diodes." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1371466261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Khazaka, Rami. "From atomic level investigations to membrane architecture : an in-depth study of the innovative 3C-SiC/Si/3C-SiC/Si heterostructure." Thesis, Tours, 2016. http://www.theses.fr/2016TOUR4023/document.

Full text
Abstract:
Le polytype cubique du carbure de silicium (3C-SiC) est un matériau très prometteur pour les applications MEMS. En plus de sa tenue mécanique et chimique, il peut être épitaxié sur des substrats Si de faible coût. De plus, l'hétéroépitaxie multiple, c’est-à-dire quand on empile plusieurs couches Si et 3C-SiC peut ouvrir des pistes pour de nouveaux dispositifs à base de 3C-SiC. Vue la complexité de développer de telles hétérostructures, nous avons procédé à l'amélioration de la qualité de chaque couche séparément. De plus, nous avons mené une étude approfondie sur la nature des défauts dans chaque couche. Après le développement de l'hétérostructure complète, nous avons procédé à la fabrication de microstructures à base de cet empilement. Nous présentons une méthode inédite pour former des membranes de 3C-SiC auto-supportées. Cette technique simplifie considérablement le procédé de fabrication de membranes tout en réduisant le temps de fabrication et le coût. En outre, elle aide à surmonter plusieurs problèmes techniques
Due to its outstanding physico-chemical properties, the cubic polytype of silicon carbide (3C-SiC) gained significant interest in several fields. In particular, this material emerged as a potential candidate to replace Si in MEMS devices operating in harsh environment. The development of 3C-SiC/Si/3C-SiC heterostructures on top of Si substrate can pave the road towards original and novel MEMS devices profiting from the properties of the 3C-SiC. However, such epitaxial system suffers from wide range of defects characterizing each layer. Thus, we first tried to improve the quality of each layer in this heterostructure. This was achieved relying on two levers; (i) the optimization of the growth parameters of each layer and (ii) the understanding of the nature of defects present in each layer. These two key points combined together allowed an in-depth understanding of the limit of improvement of the overall quality of this heterostructure. After the development of the complete heterostructure, the fabrication of 3C-SiC microstructures was performed. Furthermore, we presented an unprecedented method to form free-standing 3C-SiC membranes in-situ during its growth stage. This novel technique is expected to markedly simplify the fabrication process of suspended membranes by reducing the fabrication time and cost
APA, Harvard, Vancouver, ISO, and other styles
46

Riberg, Joakim, and Johan Selin. "Det moderna kriget och de hybrida hoten : Ett problem för Sveriges nationella säkerhetsstrategi?" Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-39726.

Full text
Abstract:
Under 2014 genomförde Ryssland framför ögonen på resten av världen en annektering av Krimhalvön i Ukraina. Västvärlden var i det som närmast kan beskrivas som en chock över detta offensiva beteende. Utan någon förvarning så flyttade Ryssland med stöd av "små gröna män" fram sina positioner på Krimhalvön. En ny taktik användes och strider blandades med andra medel och metoder i det som populärt kan uttryckas som gråzonen. Denna undersökning besvarar följande problemformulering med stöd av en kvalitativ textanalys i form av en dokumentundersökning. Utifrån ett säkerhetsstrategiskt perspektiv; Hur kan problamtiken med hybrida hot i gråzonen beskrivas och hur omhändertas dessa i den nationella säkerhetsstrategin? Genom att läsa i empiri och teori om gråzon, hybrida hot och säkerhetsstrategier skapar sig författarna en modell för analys. Denna analysmodell används sedan för att analysera den (Svenska) nationella säkerhetstrategin som publicerades 2017. Analysmodellen grundar sig på de av Treverton identifierade hybrida hoten: Desinformation, cyberattacker, ekonomiska påtryckningar, irreguljära beväpnade styrkor, reguljära beväpnade styrkor.Undersökningen visar att den nationella säkerhetsstrategin, trots en bristande tydlighet inom vissa områden och en bristande balans mellan mål, metoder och medel, identifierar och ger styrningar för omhändertagandet av de identifierade hybrida hoten. Vidare visar säkerhetsstrategin på en bred förståelse och tolkning av begreppen hybrida hot och gråzonen, utan att försöka definiera dessa komplexa begrepp. Då analysmodellen appliceras, belyses en möjlig hotbild; miljöhot. Resultaten av analysen visar också att det kan vara klokt att beskriva just de samtida hoten och utnyttjande av dessa, istället för att argumentera avseende definitioner. Författarna menar att det är av större vikt att skapa en större förståelse för fenomenen, i syfte att åstadkomma en allomfattande ansats för att motverka de verkliga effekterna av hoten.
In 2014 Russia, in front of the rest of the world, claimed and performed an annexing of Crimea. The larger parts of the western world were left in shock. Without any acknowledgment Russia moved forward with “little green men” and implied a different tactic. It was not officially war and nor peace, the fighting and the action took place in what was popularly named as the gray zone. This thesis is answering the following questions by using a qualitative document examination. From a strategic security perspective: How can the problem regarding hybrid threats in the gray zone be described and how does the national Swedish strategy respond to these threats? By reading and concluding existing theory about hybrid threats within the gray zone the authors have created their own model of analysis to utilize on the Swedish National Security Strategy. The model of analysis consists of the five main hybrid threats chosen from the theory presented by Treverton: Disinformation, Cyber-attacks, Economic pressure, Irregular armed forces and Regular forces.The thesis concludes that although unclear and found lacking in coherence regarding ends, ways and means; the National Security Strategy addresses and gives guidance on how to counter the effects of the above-mentioned threats. The Security Strategy also shows a consciousness regarding the complexity of the hybrid threats and the gray zone, without trying to define the actual area or methods utilized. When looked at through the model of analysis, it also highlights a possible new threat to be considered; environmental threats. The results of the analysis also indicate that it might be wise to use the term contemporary threats and the utilization of these, instead of arguing about definitions. The authors argue that it is of greater importance to create a larger understanding of the phenomena, in order to counter the actual effects by employing a truly comprehensive approach.
APA, Harvard, Vancouver, ISO, and other styles
47

Píchalová, Nikol. "Rozpočtová politika vlády ČR v letech 2008-2013." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-194061.

Full text
Abstract:
Diploma thesis deals with analysis of income and expenditure aspect of state budget, deficit and public debt during 2008-2013 period, following Global financial and economic crisis and its induced governmental countermeasures. It then explains Goal oriented budgeting implementation process into Ministry of defense for the same period. The first chapter is dedicated to explaining theoretical background of budgeting process and enumeration of basic budgeting methods. The second part deals with state budget, concrete income and expense analysis including state deficit and public debt. The last chapter describes Goal oriented budgeting implementation process into Ministry of defense and evaluation of its basic problems. The conclusion of the thesis combines the acquired knowledge and sets conclusions and recommendations.
APA, Harvard, Vancouver, ISO, and other styles
48

Žák, Tomáš. "Návrh schématu zajištěného napájení jaderného bloku pro řešení projektových i nadprojektových havárií." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220178.

Full text
Abstract:
The present Master´s thesis aims at designing an evolutionary scheme of secured power supply at nuclear power plants with VVER 440 reactors during design basis accidents as well as design extension conditions. In the first part of this thesis, concepts relating to the defence in depth of nuclear reactors, operating modes of the blocks as well as types and possibilities of electrical power supply and electric circuits of the block are defined. Although the present thesis deals with PWR 440 in general, special emphasis is put on the Czech NPP in Dukovany, where there are four PWR 440 reactors in operation, and on the possibilities for enhancing the defence in depth in this area. The second part of the thesis deals with the difference in station blackout definitions before and after Fukushima; not only the differences in situation evaluation are dealt with, but a solution is also proposed to make the system of secured power supply system during design basis accidents as well as design extension conditions more robust. This option has been selected out of a number of possibilities based on the evaluation of reliability, availability and cost-effectiveness of the proposal.
APA, Harvard, Vancouver, ISO, and other styles
49

Walia, Piyush. "The Effect of Combined Bony Defects on the Anterior Stability of the Glenohumeral Joint and Implications for Surgical Repair." Cleveland State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=csu1440173026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Lahidji, Reza. "Incertitude, causalité et décision : Le cas des risques sociaux et du risque nucléaire en particulier." Phd thesis, HEC, 2012. http://pastel.archives-ouvertes.fr/pastel-00718790.

Full text
Abstract:
La probabilité et la causalité sont deux outils indispensables à la prise en compte des situations de risque social. Lesrelations causales sont le fondement des représentations à partir desquelles on peut évaluer le risque et concevoirdes actions de prévention, de mitigation ou d'indemnisation. La probabilité permet de quantifier cette évaluation et de calibrer ces actions. Dès lors, il semble non seulement naturel, mais nécessaire d'expliciter la place de la causalité et de la probabilité dans la définition d'un problème de décision en situation de risque social. C'est l'objet de cette thèse.Un tour d'horizon de la terminologie du risque et des logiques d'intervention publique dans différentes catégories de risque social nous permettent de mieux comprendre la notion et les problèmes soulevés par sa représentation. Nous approfondissons notre analyse dans le cas de la sûreté nucléaire, en examinant en détail les méthodes et doctrinesdéveloppées dans ce domaine et leur évolution au cours du temps, ce qui nous conduit à formuler différentesobservations au sujet des évaluations de risque et de sûreté.En généralisant la notion d'intervention dans les réseaux bayésiens, nous développons une forme de réseau bayésien causal qui répond à nos besoins. Nous parvenons, par son biais, à une définition du risque qui semble pertinente pour un grand nombre de situations. Nous proposons ensuite des applications simples de ce modèle à certains aspects de l'accident de Fukushima et d'autres problèmes de sûreté nucléaire. Outre certains enseignements spécifiques, ceci nous amène à souligner la nécessité d'une démarche systématique d'identification des incertitudes dans ce domaine.Étendu en direction de la théorie de la décision, notre outil débouche naturellement sur un modèle de décision dynamique dans lequel les actes causent les conséquences et sont causalement liés entre eux. Il apporte en outre une interprétation causale au cadre conceptuel de Savage et permet d'en résoudre certains paradoxes et clarifier certains aspects. Il conduit enfin à envisager la question de l'ambigüité comme incertitude concernant la structure causale d'un problème de décision, ce qui correspond à une vision courante du principe de précaution.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography