Dissertations / Theses on the topic 'Operation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Operation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Boqvist, Mary. "Psykologiska operationer : utvecklingen efter operation Desert Shield/Desert Storm." Thesis, Swedish National Defence College, Swedish National Defence College, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-118.
Full textGenom massmedierna kan hela samhällen bli influerade. Med tanke på medieteknikutvecklingen så har det varit intressant att ta reda på om medietekniken har bidragit till utvecklingen av psyops användande. Med medieperspektivet som bakgrund har uppsatsen svarat på om det första informationskriget, Operation Desert Shield/Desert Storm, har följts upp med ännu mer användande av psyops.
Med slutsatser så som att psyops har fått en mer framträdande roll i krigföringen och att förändringarna kan härledas till medieteknikutvecklingen kan också frågeställningen besvaras.
Slutsatsen är att Operation Desert Shield/Desert Storm har följts upp med ännu mer användande av psyops. Med medietekniken som bakgrund är denna en av anledningarna till att psyops utvecklats men också vice versa.
För att besvara dessa frågor har en faktainhämtning gjorts på området för att sedan kunna jämföra de olika operationernas mål, medel och metoder.
Rahmström, Jan. "NATO operativa planeringsmodell (GOP) prövad i operation Weserübung-nord." Thesis, Försvarshögskolan, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1879.
Full textAvdelning: ALB - Slutet Mag 3 C-upps.Hylla: Upps. ChP 00-02
Hagman, Hans-Christian. "UN-NATO operational co-operation in peacekeeping 1992-1995." Thesis, King's College London (University of London), 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.300811.
Full textGustafsson, Fredrik. "Logistiska flaskhalsar vid en expeditionär operation." Thesis, Swedish National Defence College, Swedish National Defence College, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-181.
Full textFörsvarsmaktens förändring genom reformarbetet mot ett insatt insatsförsvar, har lett till ett fokus mot delvis nya uppgifter. Expeditionära operationer är en sådan uppgift, som innebär förändrade krav och förmågor på materiel och personal. Problemet, som uppsatsen vill belysa, är att vid planering och genomförande är taktiska uppgifter i operationsområdet dimensionerande i för hög grad. På det viset läggs inte tillräcklig kraft på hur förbandet ska komma på plats och hur bäst förutsättningar för uthållighet ska säkerställas över tiden. Det är därför angeläget att en noggrann analys genomförs i planläggningsskedet, så att egna kritiska sårbarheter kan identifieras.
Syftet med uppsatsen är att undersöka vilka kritiska sårbarheter som är tydligast ur ett logistiskt perspektiv, vid en vald expeditionär operation. Innebörden är att identifiera de kritiska sårbarheterna som uppstod och de som skulle ha kunnat påverka den expeditionära operationens målsättning.
Den expeditionära operationen som behandlas är den svenska insatsen i Tchad 2008. Analysverktyget som används för att genomlysa den är en operationalisering av Milan Vegos operationella faktorer tid, rum och styrka.
Resultatet pekar på tre områden som kritiska sårbarheter. De identifierades vid deployering och redeployering, inom hälso- och sjukvården samt av att förbandet inte klarade att hantera den omfattande mängden materiel och förnödenheter.
The Swedish Armed Forces have, as a consequence of the transformation, focused on partly new tasks. Expeditionary operations are one of these tasks, which denote changed demands on equipment and necessary competence of the personnel. The problem this study will try to clarify is the risk within focus too much on the tactical task in the area of operations. In that way the planning doesn't evaluate the needs in its entirety. To overlook details in the deployment and the endurance in the area could create critical vulnerabilities already in the planning of the operation.
The purpose of this study is to investigate the most obvious critical vulnerabilities, in a logistic perspective, during a chosen expeditionary operation. Both to identify the critical vulnerabilities arisen and those which could have had an affect on the aim of the expeditionary operation.
The expeditionary operation is the case-study of the Swedish participation in EUFOR Chad/CAR 2008. The tool that is used to analyze the case-study is the author's interpretation of Milan Vegos operational factors time, space and force.
The result of the study shows three areas as critical vulnerabilities. They were identified at deployment and redeployment, within the medical service and that the force couldn't manage to deal with the amount of equipment and supplies
Julia, Anderson Anna Ansin. "Operation Information." Thesis, Linnéuniversitetet, Institutionen för hälso- och vårdvetenskap (HV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35077.
Full textWoodhouse, Jennifer May. "Operation Belladonna." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15801/1/Jennifer_Woodhouse_Thesis.pdf.
Full textWoodhouse, Jennifer May. "Operation Belladonna." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15801/.
Full textThornhill, Seth. "Budgeting facilities operation costs using the facilities operation model." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5612.
Full textE) uses the FOM for the same purpose. It then compares the two processes against historical data from Fiscal Year 2007-2010 to study how the DoN could use the FOM within the Program Objectives Memorandum (POM) development process. The results show the Navy would be well advised to continue its current methods to develop the POMs. The FOM is still in the process of development, and the methods used by the Navy today are providing more accurate, consistent forecasts for facility operations.
Jaoul, Mathieu. "Study of HBT operation beyond breakdown voltage : Definition of a Safe Operating Area in this operation regime including the aging laws." Thesis, Bordeaux, 2020. http://www.theses.fr/2020BORD0029.
Full textThe development of new BiCMOS technology will be possible, thanks to the SiGe:CHBTs technological improvements to reach dynamic performance beyond 0.5 THz. Animportant aspect to be investigated is the Safe Operating Area (SOA) beyond the traditionalBVCEO. In fact, due to the complexity of future architectures of HBTs (likethe B55X from STMicroelectronics) and their nanoscale size, an increase of the wear-outmechanisms occurring in these transistors is expected. In addition, because of the increasingdependence of circuit design on software tools, it is expected that additional effortswill be required to develop more predictive compact models. Thus, the SOA sub-projectis designed to describe the functional safety area of nanoscale SiGe:C HBTs allowing thecompact model to take into account critical aspects.After a short introduction, a precise description of the transistor operations beyondthe breakdown voltage is detailed in the second chapter. The compact model HICUM isimproved to account for the mechanisms occurring in this region to accurately model theavalanche regime and the pinch-in effect. This new model is validated on TCAD simulationsand through electrical measurements on different devices, architecture, geometriesand temperatures.In the third chapter, the investigation is deepen towards the device border’s operation.A study of the pinch-in effect and the snapback behavior is therefore realized to understandthe operation limitations at high currents and voltages and a stable operation regime isintroduced.In the fourth chapter, accelerated aging tests are carried out at the boundaries of thesafe operating area to submit the transistor to thermal and hot carriers stresses during itsoperation. An aging model is developed to account for the wear-out mechanism occurringin that regime.To conclude, this work allowed to increase the modeling of SiGe HBTs at high voltagesand currents accounting for the wear-out mechanisms occurring in that operation regime
Robinson, Dawn M. "Helping Veterans of Operation Enduring Freedom and Operation Iraqi Freedom." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6739.
Full textSchneider, Ulrich Johannes. "Repräsentation und Operation." Universitätsbibliothek Leipzig, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-149263.
Full textHultberg, Niklas. "Operation Rolling Thunder." Thesis, Försvarshögskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-4096.
Full textDenna uppsats ger en förklaring av John A. Warden IIIs teori om nyttjande av luftmakt och de begrepp som utgör grunden för denna. Frågan om grundbegreppen går att återfinna inom ramarna för ett otraditionellt krig tas upp. USAs förmåga till luftmakt är stor, men med rätt sorts krigföring kan även denna makt tvingas överge sina militära och politiska mål genom utmattning över en längre tidsperiod eftersom det blir allt dyrare, både ekonomiskt, politiskt och moraliskt, att föra krig. Här avhandlas operationen Rolling Thunder och John A. Warden IIIs teoris anknytning till denna enorma bombkampanj. Inledningsvis återfinns en innehållsanalys av John. A. Warden IIIs litteratur, vilket utmynnar i fem begrepp: Luftrumskontroll, tyngdpunkter, flyganfall på djupet, fienden som ett system och parallell attack. Efter det följer en innehållsanalys av relevant litteratur inom ramen för en fallstudie om Rolling Thunder och slutligen påträffas en komparativ analys mellan de två resultaten och en efterföljande diskussion knyter an till problemformuleringen och försöker utröna resultatet av undersökningen och om syftet med uppsatsen uppfyllts. I genomförandefaserna av Operation Rolling Thunder är det möjligt att urskilja vissa av Wardens centrala begrepp och tankar om luftmaktens nyttjande, men hans teori som helhet går inte att återfinna i genomförandet av Rolling Thunder. Trots att de fyra faserna åskådliggör en upprepad förändring i strategi, användes aldrig Wardens teori om fienden som ett system.
Wetterholm, Carola. "Jagad : Operation Charlie." Thesis, Linnéuniversitetet, Institutionen för film och litteratur (IFL), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-95642.
Full textMcGinley, Susan. "Operation Cool Shade." College of Agriculture, University of Arizona (Tucson, AZ), 2003. http://hdl.handle.net/10150/295850.
Full textTheron, Jenny. "The commodification and commercialisation of peace operations and security co-operations : a case study of Operation Rachel /." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/2505.
Full textPeace operations and security co-operations are expensive. Even though there are a variety of factors that influences peace agents when they consider approving a new, expanding an existing, or closing down a peace operation or security co-operation, one of these factors is the cost factor. If we were to isolate the cost factor it would follow that a reduction in the cost of peace operations and security co-operations, are likely to contribute to peace agents being more willing to approve new, expand existing or to give existing missions more time to consolidate before closing them down. There are a variety of ways how the cost of peace operations or security co-operations can be lowered. This thesis suggests an alliance with the private sector in the form of corporate sponsorships. In short, that peace operations and security co-operations be commodified and commercialised. This would entail introducing corporate sponsorship of some of the commodities that are used in peace operations and security co-operations, followed by the corporate sponsor using their involvement in the peace operation or security co-operation to their commercial advantage. The commodification and commercialisation of peace operations and security co-operations should result in the relevant operations and co-operations benefiting in a cost-effective as well as practical effectiveness sense, whereas the private sponsor should benefit in either or both a financial (profit) or an image-making sense. The psychological theory supporting such an argument is that of social identity theory. This theory explains how positive connotations made with peacemaking in warlike conditions will motivate industries to use this opportunity to show that their products can succeed in such demanding circumstances. Accordingly, social identity theory provides us with evidence as to how the commercialisation and commodification of peace operations and security co-operations can succeed. We also support our argument by providing a case study, Operation Rachel, which serves as a successful example of an operation that was (partially) commodified and commercialised. Operation Rachel, which can be seen as either or both a peace operation and security co-operation, shows that in the case of security co-operations, these operations should be presented as peace operations during the commodification and commercialisation processes.
Rupkalvis, James A. "The Operation Joint Endeavor deployment : transportation lessons learned and impact on subsequent operations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA390857.
Full textPeftitsi, Soumela. "Operation of the expanded Blue Metro Line in Stockholm." Thesis, KTH, Transportplanering, ekonomi och teknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191164.
Full textMcLay, Keith Andrew John. "Combined operations : British naval and military co-operation in the wars of 1688-1713." Thesis, University of Glasgow, 2003. http://theses.gla.ac.uk/1269/.
Full textOlonisakin, Olufunmilayo Titilayo. "Peace creation and peace support operations : an analysis of the ECOMOG operation in Liberia." Thesis, King's College London (University of London), 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.310492.
Full textLindqvist, Stefan. "The enemy as a system, LuFTMAKT för den operativa nivån : en teori prövande undersökning av John Wardens luftmaktsteori på de operativa framgångarna i Operation Desert Storm och Operation Unified Protector." Thesis, Försvarshögskolan, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9228.
Full textFlesland, Synnøve Mangerud. "Gas Turbine Optimum Operation." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for energi- og prosessteknikk, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-12409.
Full textAwad, Bieshoy Awad Boutros. "Operation of Energy MicroGrids." Thesis, Cardiff University, 2010. http://orca.cf.ac.uk/54179/.
Full textBoonyasana, Kwanruetai. "World electricity co-operation." Thesis, University of Leicester, 2013. http://hdl.handle.net/2381/27793.
Full textLindeblad, Stephan. "Internationell operation - Nationellt intresse." Thesis, Försvarshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-2756.
Full textThe end of the Cold War meant fundamentally changed conditions for policymaking in security matters for most states. Before, the world was divided between two blocks with two ruling superpowers in a constant tug-of-war, whiles we today have another reality with many different alliances and asymmetric threats of different kinds. This security transformation have also affected the academic study of international relations and in particular during the 90th many scholars declared the victory of the liberal perspective over realism. This thesis is a case study of the European Unions first naval operation, EUNAVFOR – Operation Atalanta and in particular the Swedish participation in this operation. The purpose of the study is to look for the motives in the decisions on different levels, from the UN security council, to the EU council and the Swedish parliament, and to analyze those motives according to the to major perspectives in IR-studies. The thesis show that truth lies somewhere in between this two opposing perspectives. Both viewpoints result in a number of assumptions and simplifications that lead to blind spots in the study. Not until the two perspectives are compared with each other the whole picture will emerge. Sweden’s participation in operation Atalanta can be explained both with strictly national motives and with a concept of shared responsibility within the international community.
Chittratanawat, Sarawoot. "Operation based facilities design /." free to MU campus, to others for purchase, 2001. http://wwwlib.umi.com/cr/mo/fullcit?p3025611.
Full textKingdon, Lorraine B. "A World-Class Operation." College of Agriculture, University of Arizona (Tucson, AZ), 1990. http://hdl.handle.net/10150/295618.
Full textLetourneau, Brian. "Alcohol Misuse Among Operation Enduring Freedom and Operation Iraqi Freedom Military Healthcare Professionals." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/cps_stuetd/119.
Full textEryuzlu, Menevse. "Two Generalizations of the Filippov Operation." TopSCHOLAR®, 2016. http://digitalcommons.wku.edu/theses/1593.
Full textBASTOS, CAMILA CRISPIM. "OPERATIONAL RISK MEASUREMENT AND ASSESSMENT: A CASE STUDY OF HEDGE OPERATION IN PETROLEUM INDUSTRY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2010. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=17095@1.
Full textBefore 1990, market and credit risk measures were the major sources of academic research in finance field, motivated by finance industry. However as a consequence of recent financial scandals in the banking industry, involving fraud and human errors, which caused catastrophic losses and even bankruptcy of many institutions around the world, a new and unexplored kind of risk has started to be studied which is called the operational risk. It is defined as the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events. Due to its risk characteristics, it is present in all kind of industry but most academic researches and methodologies are developed for financial institutions. After an extensive search, we didn’t find bibliographic references similar to those in banking sector which could elucidate the operational risk management level of maturity for other sectors. We could not even find a commom definition and classification of operational risks for other industries. Thus, this work intends to explore frameworks and methodologies, developed by financial industry for evaluation and measurement of operational risk, to see how this method can be extended for other industries. Additionally, we applied these concepts and methodologies for a sector of an oil and gas company.
Dunert, Henrik. "Den nekande operationskonsten : En jämförande fallstudie mellan Operation Enduring Freedom och Operation Iraqi Freedom." Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6788.
Full textUppsatsen skriven VT 2017 under Termin 4 Officersprogrammet 15-18 med inriktningmot flyg. Examen genomförs VT 2018.
Robertsen, Tom A. "Transforming Norwegian Special Operation Forces." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FRobertsen.pdf.
Full textDunbäck, Otto, and Simon Gidlöf. "Verification of hybrid operation points." Thesis, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-19932.
Full textThis thesis is an approach to improve a two-mode hybrid electric vehicle, which is currently under development by GM, with respect to fuel consumption. The study is not only restricted to the specific two-mode HEV but also presents results regarding parallel as well as serial HEV’s. GM whishes to verify if the online-based controller in the prototype vehicle utilizes the most of the HEV ability and if there is more potential to lower the fuel consumption. The purpose is that the results and conclusions from this work are to be implemented in the controller to further improve the vehicle’s performance. To analyze the behavior of the two-mode HEV and to see where improvements can be made, models of its driveline and components are developed with a focuson losses and efficiency. The models are implemented in MATLAB together with an optimization algorithm based on Dynamic Programming. The models are validated against data retrieved from the prototype vehicle and various cases with different inputs is set up and optimized over the NEDC cycle. Compensation for cold starts and NOx emissions are also implemented in the final model. Deliberate simplifications are made regarding the modeling of the power split’s functionality due to the limited amount of time available for this thesis. The optimizations show that there is potential to lower the fuel consumptionfor the two-mode HEV. The results are further analyzed and the behavior of the engine, motors/generators and battery are compared with recorded data from a prototype vehicle and summarized to a list of suggestions to improve fuel economy.
Øien, Henrik Aksel. "Energy efficient operation of ships." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for marin teknikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-16232.
Full textGustafsson, Camilla, and Anna Jansson. "Smakförändringar efter gastric bypass-operation." Thesis, Uppsala universitet, Institutionen för kostvetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-167528.
Full textZhang, Ji. "Vibratory analysis of tillage operation." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq23896.pdf.
Full textChoi, Daniel C. B. "SEDO, semantic error diagnostic operation." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0020/MQ48445.pdf.
Full textFenner, Joel S. "Multi-Systems Operation and Control." NCSU, 2000. http://www.lib.ncsu.edu/theses/available/etd-20000406-165232.
Full textThe typical process modeling and control approach of dealingwith each manufacturing process stage in isolation is re-evaluated anda new approach is developed for the case of a series ofprocess stages and the case of several similar processesoperating in parallel at different sites. The serialmulti-stage modeling framework uses the possible correlationbetween stages as a tool to achieve tighter control of anonstationary process line. The case of several similarprocesses operating in parallel at different sites is termedglobal manufacturing. Global manufacturing allows updatedestimation of the sensitivity or slope parameters over thecourse of the process in some cases since the site effectcauses a spread in the range of the inputs. This spreadin the inputs provides an opportunity for stable sensistivityestimates without perturbing the process as is usuallynecessary. The Bayesian parallel site estimation procedure isshown to have broad application to any scenario where thedata is collected at various related but not identical sites.Specifically, uniformity modeling is explored using theBayesian estimation procedure. The multi-systems operation and controlmethodologies developed for the serial and global manufacturingcases provide valuable tools for the improvement ofmanufacturing processes in many industries.
Hronopoulos, Sophia. "Operation Pbsuccess : the covert crusade /." Title page, contents and introduction only, 1989. http://web4.library.adelaide.edu.au/theses/09AR/09arh873.pdf.
Full textSendil, Halil. "Operation Of Water Distribution Networks." Master's thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615484/index.pdf.
Full textLoland, Kari Medby. "Wind Turbine in Yawed Operation." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elkraftteknikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13437.
Full textMATSUBARA, Shigeki, and Yoshihide KATO. "Incremental Parsing with Adjoining Operation." Institute of Electronics, Information and Communication Engineers, 2009. http://hdl.handle.net/2237/15001.
Full textVeal, Gareth John. "CO2 market design and operation." Thesis, Lancaster University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.588508.
Full textTalley, Betty E., and Karen J. Vigneron. "Joint operation planning and execution." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23941.
Full textThe intent of this research is to facilitate understanding of the joint planning process. The thesis consolidates a detailed description of the joint operation planning process with an indepth narrative of the Joint Operation Planning and Execution System (JOPES). The most current information available is provided on JOPES which Is still under development and continues to evolve. The role of defense transportation in joint operations planning and execution is emphasized.. An appendix contains a user's manual for the JOPED Computer-Assisted Instruction simulator which operates on a microcomputer. IT is specifically tailored for novices and those desiring to learn more about JOPES.
Garner, William Howard. "Iteration of the power operation." Virtual Press, 1995. http://liblink.bsu.edu/uhtbin/catkey/941367.
Full textDepartment of Mathematical Sciences
Bjerkholt, Runa Folvik. "Analysis of ROV Lift Operation." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for marin teknikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26074.
Full textOlsen, Tommy, and Marius Thormodsen. "Forging Norwegian Special Operation Forces." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42699.
Full textThis thesis seeks to answer how leadership can unify the Norwegian Special Operation Forces and improve its organizational efficiency. From January 1, 2014, the two Norwegian special operations commands, Forsvarets Spesialkommando (FSK) and Marinejegerkommandoen (MJK), were joined in one service-like combatant command: Forsvarets Spesialstyrker (FS). FSK and MJK each have a long history, and their legacy and culture sit in their hearts. The two units are, in many ways, alike, but their differences have been highlighted when it comes to the future of the Norwegian Special Operation Forces. This thesis uses relevant literature, the authors’ personal experiences, and statistical analysis of precollected survey data to answer the research question. It offers an overview of the Norwegian Special Operation Forces’ history, maps the current organizational culture, and suggests a leadership approach to unify the two units and the newly established joint command staff in order to improve organizational efficiency. The aim is to provide recommendations to assist with the process of forging a highly capable Norwegian Special Operation Forces for the 21st century.
Roper, Elizabeth Ann. "Oncogene co operation in keratinocytes." Thesis, University College London (University of London), 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271485.
Full textPreminger, Omer. "Agreement as a fallible operation." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/68196.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student submitted PDF version of thesis.
Includes bibliographical references (p. 195-207).
In this thesis, I argue that the obligatory nature of agreement in [phi]-features (henceforth, [phi]-agreement) cannot be captured by appealing to "derivational time-bombs"-elements of the initial representation that cannot be part of a well-formed, end-of-the-derivation structure, and which are eliminated by the application of [phi]-agreement itself (as in Chomsky's 2000, 2001 uninterpretable features approach, for example). Instead, it requires recourse to an operation- one whose invocation is obligatory, but whose successful culmination is not enforced by the grammar. I then discuss the implications of this conclusion for the analysis of defective intervention by dative nominals. These results lead to a novel view of the interaction of '-agreement with case, furnishing an argument that both '-agreement and so-called "morphological case" must be computed within the syntactic component of the grammar. Finally, I survey other domains where the same operations-based logic proves well-suited to model the empirical state of affairs; these include Object Shift, the Definiteness Effect, and long-distance wh-movement. The thesis examines data from the Kichean languages of the Mayan family (primarily from Kaqchikel), as well as from Basque, Icelandic, and French.
by Omer Preminger.
Ph.D.
Foo, Ming Qing. "Secure electric power grid operation." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/106964.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 87-91).
This thesis examines two problems concerning the secure and reliable operation of the electric power grid. The first part studies the distributed operation of the electric power grid using the power flow problem, which is vital to the operation of the grid. The power flow problem is a feasibility problem for finding an assignment of complex bus voltages that satisfies the power flow equations and is within operational and safety limits. For reliability and privacy reasons, it is desirable to solve the power flow problem in a distributed manner. Two novel distributed algorithms are presented for solving convex feasibility problems for networks based on the Method of Alternating Projections (MAP) and the Projected Consensus algorithm. These algorithms distribute computation among the nodes of the network and do not require any form of central coordination. The original problem is equivalently split into small local sub-problems, which are coordinated locally via a thin communication protocol. Although the power flow problem is non-convex, the new algorithms are demonstrated to be powerful heuristics using IEEE test beds. Quadratically Constrained Quadratic Programs (QCQP), which occur in the projection sub-problems, are studied and methods for solving them efficiently are developed. The second part addresses the robustness and resiliency of state estimation algorithms for cyber-physical systems. The operation of the electric power grid is modeled as a dynamical system that is supported by numerous feedback control mechanisms, which depend heavily on state estimation algorithms. The electric power grid is constantly under attack and, if left unchecked, these attacks may corrupt state estimates and lead to severe consequences. This thesis proposes a novel dynamic state estimator that is resilient against data injection attacks and robust to modeling errors and additive noise signals. By leveraging principles of robust optimization, the estimator can be formulated as a convex optimization problem and its effectiveness is demonstrated in simulations of an IEEE 14-bus system.
by Ming Qing Foo.
S.M.
Damberg, Carl-Magnus. "Operation Fenix : En teoriprövande fallstudie." Thesis, Försvarshögskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-4057.
Full text