Sökresultat:
1329 Uppsatser om Military security - Sida 32 av 89
HPM som luftvärnsvapen mot kryssningsmissiler, en möjlighet?
I denna uppsats undersöks huruvida HPM (High Power Microwaves) kan användas som enverkansform i framtida luftvärnssystem för att bekämpa kryssningsmissiler. Studien undersökervilket hot kryssningsmissiler kan utgöra, hur de är konstruerade och hur HPM kan påverka dem.Uppsatsen redogör för hur det nya luftvärnskonceptet är uppbyggt och vilka krav på förmågor somställs på framtida luftvärnssystem. Den undersöker även hur ett HPM-system är uppbyggt ochvilken verkan det kan ha på elektriska system i en kryssningsmissil. Vidare diskuteras vilkeneffekt tre olika HPM-system kan ha mot kryssningsmissiler kopplat till de krav som ställs iluftvärnskonceptet.Huvudslutsatsen indikerar att HPM-system kan ha verkan mot kryssningsmissiler. HPM-systemkan nyttjas främst i scenarier där det ställs höga krav på eldhastigheten mot kryssningsmissiler påkorta avstånd.
NATO operativa planeringsmodell (GOP) prövad i operation Weserübung-nord
C-uppsats som avhandlar de centrala begreppen i Guidelines for Operational Planning(GOP) (Centre of Gravity, Decisive Points, Direct and Indirect Approach, Culmination,Manoeuvre, Temp, Operational pause och Lines of operation) granskat i ett historisktperspektiv.Uppsatsen försöker verifiera hypotesen att Guidelines for operational planning (GOP)centrala begrepp fungerar och är applicerbara på alla operationer. Ett belägg för detta är attman kan identifiera begreppen i en historisk operation.Tyska väpnade styrkor från Wehrmacht, Kriegsmarine och Luftwaffe genomförde ett anfallöver havet och i luften mot Norge den 9 april 1940. Operationen var av tyskarna döpt tilloperation Weserübung-nord och var mycket vågad. I uppsatsen kommer denna operation attvara det historiska perspektivet.
ITS - Interaktivt textsystem
This report describes the creation of an interactive text system for storing, retrieval and publishing of texts, ITS.My task was to create a GUI together with a database capable of handling text, commenting of texts, references between texts, and the capability to associate images with texts.After enough texts have been inserted into the database, there shall be an ability to generate a report out of them.The report describes the methods used when the GUI was implemented, how the database was modelled and implemented, and how the security aspects where solved.The entire project is created with the help of Java, MySQL server, Connector/J and OpenSSL.Furthermore the functions of the GUI and the future of ITS is described..
Israel, en etnisk demokrati-En studie om Israels demokratiunderskott.
The state of Israel is known as the only democracy in the Middle East. The purpose of this study was to examine if there is aspects in the Israelis society that can be questioned in terms of liberal democracy.Areas of concerns in the study are the Israeli official policy's concerning inclusion and exclusion of their citizens in areas of property owning, personal status and the duty of military service.The results show that the Israeli society distinguishes their citizens in these areas by their ethnic origin, in favour for the Jewish population. The law prohibits changes in the states Jewish character. One clear example how this is presented is that a Jew is prohibited to marry a non-Jew. The results show also that this official policy by the Israeli state violates important principles of liberal democracy.
Lagring av flisade skogsbränslen : - med avseende på att minska energi- och kvalitetsförändringar
Computer based information systems play an important role in modern military combat vehicles. The crew needs to be able to quickly get information about both the vehicle and its outer surroundings in order to quickly make the correct decisions. In this report, we describe the development of a prototype new information system for the BvS10 vehicle, manufactured by BAE System Hägglunds AB in Örnsköldsvik.An important aspect of the system is the time it takes from the point that the information is generated by the vehicle sensors until it is presented to the user. The system must be able to ensure that it never displays information that is out of date. Thus, it is important to create a layer and component based architecture for the solution, making it possible to control, in detail, the information?s age as it moves through the system.
Cykelparkering i stadsmiljö : en redogörelse för cykelparkeringens komponenter
In recent years many cities have seen an increase in bicycle traffic. This is a development that benefits both the environment and the individual cyclist. When the need for bicycle parking is not met several problems arise such as an increase in bicycle thefts, jammed sidewalks and a decreased interest in using bicycles. My aim with this paper has been to answer the question of how to create parking facilities in an urban environment based on cyclists' needs. Through a literature survey, following the method "Trattmodellen" (the funnel model) the question has been answered and divided under the headings cyclist, bike, bicycle racks, bicycle garage and bicycle operators and hosts.
Ryskt luftmaktsanvändande i Georgien 2008 ? ett fall av Warden?
The Russian-Georgian war of 2008 drastically changed Europe´s and Sweden´s political climate.Russiashowed that it is capable of successfully completing complex campaigns including ground, naval and air assets. However, not much has been said about the theoretical framework and doctrine of the Russian military of today. Even less has been researched about Russian use of air power and applied air theory. Are air power assets still considered primarily as support of ground offensives or has the theoretical framework changed?John A.
Meditation och konflikthantering
Can meditation aid in a situation of conflict? This paper answers that question.The reason I chose to examine this topic is due to own positive experiences that convinced me of the link between meditation and conflict resolution. I wish to bring more light on this topic and to faciliate further research within the area.Through analyzing material on meditation, meditation and emotion and emotion and conflict, I find here that some of the effects of meditation has a positive effect on our emotions and also that we can work through meditation to learn about the way we act on our emotions and also how we can learn to act to our advantage. I also show how emotions play a vital role in conflicts between individuals and groups and that it is most urgent that we use what means we have to work conflict to our best use. I believe that conflict has it?s place in society and that good things can come from it, but that we can work with the conflict so that it does not escalate out of proportion.
Konrad Adenauers Europasyn. En idéanalys av memoarerna
This essay seeks to gain understanding on the thoughts of Konrad Adenauer regarding the future of Europe in the post-WWII era, and European integration in particular. The material used is his memoirs, which gives an insight into the part of his thought that he chose to share with the rest of the world. The essay uses an analytical framework of three theories, popular within the academic discipline of international relations: realism, liberalism and constructivism. The conclusion it draws is that none of the theories can in a satisfying way describe Adenauer?s thoughts, but rather that they all in some way describe certain elements of his thoughts.
Rysk vilseledning - ett gammalt koncept i ny uniform?
The Russian operation on the Crimean peninsula has been referred to as a victory enabled by the operationalization of the concept of New Generation Warfare. According to some military theorists, this concept and its operationalization cannot be characterized in terms of the traditional wars waged up to this point. It is, however, also argued that this new generation of warfare is primarily a new approach to strategy, a new way of applying traditional methods to achieve political goals. The purpose of this study is to discern whether Russia employed strategic deception in its operation in Crimea and if this is the case; what methods and principles were used and if these can be explained using a traditional view of deception. The application of theories on deception by Michael Dewar and Barton S.
Rättssäkerhet i barnavårdsutredningar : BBIC - ett nytt sätt att arbeta i socialtjänsten
AbstractThe Swedish National Board of Health and Welfare has since a year or so started to introduce a new way to work with childcare investigations within the social services. This new concept, BBIC, is meant to put the child?s needs in the first room rather than the grownup?s as it used to be before. This study is about to examine how BBIC affects the legal security of the children within these childcare investigations.BBIC was first developed in England after a massive criticism against the way that the foster home- and institutional care was handled. In Sweden, BBIC was first tested and developed into Swedish conditions in a few project municipalities for about five years but is now being introduced all over the country.
Design comparison between HiperLAN/2 and IEEE802.11a services
This paper is a study and comparison between the two Wireless LAN (WLAN) standards HiperLAN/2 and IEEE 802.11a. WLANs are used instead or together with ordinary LANs to increase mobility in for example an office. HiperLAN/2 is an European standard developed by ETSI and the IEEEs standard is American. A WLAN-card consists roughly of a Medium Access Control (MAC), Physichal layer (PHY) and an antenna. The antenna is the same for the different standards.
Skadlig kod och sårbarheter i Windows : En studie i virusens historia och nutidens olika säkerhetsrisker
I dag kan man oftast läsa om olika säkerhetshot och risker en datoranvändare måste tänka på för att inte ge någon utomstående möjlighet att komma åt känslig och/eller privat information. Här talas det om nya virus och nya typer av trojaner som sprids som epidemier över Internet, och i bland handlar det om ett spionprogram som följer med en nedladdad fil. Det är svårt att hålla reda på alla typer av skadlig kod som nämns fast med ökad förståelse ökar också chanserna för att klara sig från smitta. Det har visat sig att utvecklingen av skadlig kod är lika stark som den inom kommersiella mjukvaror. Från persondatorns uppkomst i början av 80-talet och fram till i dag, har utveckling skett i alla områden av den skadliga kod det handlar om strategi, syfte och framförallt ren kodkomplexitet.Dagens ledande leverantör av operativsystem och webbläsare, Microsoft, lovar allt mer sofistikerade säkerhetslösningar varje gång en ny version av ett program släpps.
Äldre militärteoriers giltlighet imodern sjökrigföring
The amounts of theories that deal with naval warfare are many. Several of those are developed under the previous century when tactics and technology were in the eve of development. Many of modern thinkers within science of war often refer to older but recognized theories. The purpose of this essay is to examine if the old but recognized theories are of current interest in modern naval warfare. The questions that are used in this essay are, what is the characteristics of the war of Yom Kippur with Mahan?s offensive and Corbett?s defensive as a starting-point and are there any of the theories that are prominent.
Valutariskhantering vid exportaffärer : - en studie av stora svenska exportföretag
AbstractBusiness, or business decisions always involves an endangerment from the company?s aspect, but when it comes to business with foreign countries the risk profile looks quite different from the profile the company has when its doing business inside the country. Therefore, it is extremely important for an export company or import company to carefully consider the risks that are enclosed with the deal, before he makes the decision to enter a deal. One of the most important risks a company have to considerate when doing business with foreign countries is the currency risk. A company is exposed to currency risk when either long-term or short-term changes in the exchange rate may affect the result of the company, competitive position and growth.