SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Norsell Martin Professor) "

Sökning: WFRF:(Norsell Martin Professor)

  • Resultat 1-7 av 7
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Persson, Björn, 1986- (författare)
  • Assessment of Aircraft Radar Cross-Section for Detection Analysis
  • 2016
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Hiding from and surprising an opponent are tactics that have been used in warfare throughout history. They were features that aircraft originally possessed when they were first used in military operations. However, development of military technology is an endless struggle between advances in technology and counter technology. During World War II this struggle led to the development of a new technology called radar, which was designed to detect sea vessels and aircraft at a distance and deny them the element of surprise. This laid the foundation for modern air defenses and simultaneously created a need for aircraft to penetrate such defenses. Central to the tactics and technological development that followed from the deployment of radar on the modern battlefield is the radar cross-section (RCS) of aircraft, which dictates the range at which aircraft can be detected by radar. In this thesis some aspects of the RCS of aircraft in radar detection are investigated. A combination of experimental measurement of aircraft and digital model development of the RCS of aircraft has been used.From flight experiments, the uncertainty in aspect angle to a threat sensor, due to aircraft dynamics, is quantified for various aircraft. In addition, the RCS fluctuation behavior of a military jet trainer is investigated by dynamic in-flight measurement. The monostatic and bistatic RCS of an F-117 are modeled and findings show that spline interpolation provides superior accuracy when interpolating the RCS data. Smooth and conservative RCS models are suggested and a new RCS sampling scheme is presented. A model based on experimental data is suggested for determining the range of aspect angles that an aircraft is likely to orient towards a threat sensor, and experimental RCS data is compared to the classical Swerling radar target models.Possible consequences for military operations and the design of military systems are discussed and considerations for modeling the interaction between air defenses and aircraft penetrating those defenses are given.  This thesis should be of interest to military actors and the defense industry, since the analyses of the ability to detect aircraft using radar are important for military operations and their planning.
  •  
2.
  • Foyer, Pernilla (författare)
  • Early Experience, Maternal Care and Behavioural Test Design : Effects on the Temperament of Military Working Dogs
  • 2015
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Domestication has resulted in animals with broad variations between as well as within breeds, which allows for the selection and breeding of animals for preferred traits. This selection has affected both the genotypes and phenotypes of animals. In dogs, it has allowed for breeding for different purposes, such as companionship or the performance of specific tasks, e.g., herding, hunting, searching and protecting. Each of these types of working dogs has specific traits that are, in part, controlled by genes; however, genes are not solely responsible for the variations in the traits of an individual. The environment also plays a role, which has been studied in rodents and primates in recent decades. For instance, it has been shown that the amount of maternal care that a rat receives as a pup affects its temperament later in life; the more maternal care, i.e., licking, grooming and arched-back nursing (LG-ABN), that a rat receives, the more stress resistant, less reactive and more explorative it will be as an adult. However, the question is whether this is also true for dogs, and the investigation of how temperament in dogs is affected by environmental factors early in life is the main objective of this thesis. Three of the studies presented in this thesis focused on investigating the general parameters, particularly maternal care, that influences offspring behaviour to contribute to the understanding of temperament development in military working dogs. One of these studies concentrated on the environmental factors that influence dogs early in life, and the results indicated that some factors, such as parity, litter size and birth season, affect temperament later in life. Another study investigated how females take care of their young, and the results demonstrated that females consistently vary in their maternal style during the first three weeks postpartum and that this variation affects the temperament of the offspring. The third study focused on factors in the home environment, and the results showed that dogs approved through the evaluative temperament test were significantly associated with being hyperactive or restless and having difficulty settling down in the home environment. However, those dogs were also left home alone for more hours in a day than non-approved dogs. To be able to operate functionally, a military working dog needs to possess certain traits, or a certain temperament, and a vital characteristic is the way it responds to and copes with stress. This was investigated during an evaluative temperament test used to select dogs suitable for further training. Surprisingly, the results showed that the dogs approved for further training had significantly higher levels of salivary cortisol both before and after the test compared with the non-approved dogs. These findings may be of profound importance for understanding individual variations in behaviour and improving breeding schemes for working dogs.
  •  
3.
  • Sigholm, Johan (författare)
  • Secure Tactical Communications for Inter-Organizational Collaboration : The Role of Emerging Information and Communications Technology, Privacy Issues, and Cyber Threats on the Digital Battlefield
  • 2016
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The development within the area of information and communications technology (ICT) has been rapid during the last couple of decades. Advancements in mobile technology, such as smartphones and other portable devices with embedded sensors, rapid expansion of communications infrastructure, and increased spectrum utilization, has had a major impact on civilian society, but increasingly also on professional organizations such as the Swedish Armed Forces. While this technology allows for enhanced capabilities in the areas of command and control, situational awareness, and information management, it also leads to new challenges in such areas as cyber security and privacy. For armed forces in many parts of the world, being able to deploy in new types of missions, such as humanitarian assistance and response operations due to natural or man-made disasters, is an increasingly sought-after capability. Such operations commonly require collaboration amongst several heterogeneous organizations, which in turn requires technical as well as organizational interoperability. While the actors must be able to share certain information efficiently, with regards to integrity and availability, sensitive or classified information must be safeguarded in terms of confidentiality.This thesis is concerned with studying emerging ICT for use on the battlefield of tomorrow, investigating how it can lead to more effective operations, and what preconditions that must be met in order for the technology to be of utility for inter-organizational collaboration. In particular, the thesis studies how an acceptable level of information security can be upheld in interconnected tactical communications networks. It is found that Mobile Ad-hoc Networks, Software-Defined Radio and Cognitive Radio are emerging technologies that, while still immature, can contribute to improved capabilities for communications, command and control, and information collection. Furthermore, Hastily Formed Networks is found to be an effective framework for collaboration between heterogeneous actors. However, in order for emerging ICTs to provide military utility, several non-technical requirements must be met. These include usability, trust, legality, cost, and verifying that the technology is in accordance with current military doctrine. Antagonistic as well as unintentional threats must also be mitigated, including information leaks caused by cyberattacks or insiders, and possible consequences of reduced user privacy.Besides to the Swedish Armed Forces, this thesis should be of interest to armed forces of comparable countries, and for professional organizations faced with similar challenges. Among the drawn conclusions, the thesis recommends continuously evaluating emerging ICT in support of new capabilities, through academic research as well as internal concept development. Adopting an incremental and modular process is also recommended when developing or procuring new ICT systems, instead of making long-term investments in proprietary technology. Furthermore, a focus should be put on promoting military requirements in future civilian ICT standards. In this way development costs can be reduced, while facilitating tactical use of commercial off-the-shelf products. Regarding information security in tactical networks for inter-organizational collaboration the thesis concludes that employing best-effort methods could allow for efficient information exchange between actors, while upholding acceptable risk levels regarding data leakage.
  •  
4.
  • Bang, Martin (författare)
  • Military intelligence analysis : institutional influence
  • 2017
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Intelligence is vital for the outcome of battles. As long as humans wage war, there will be a need for decision support to military and civilian leaders regarding adversaries or potential adversaries. However, the production of intelligence is neither easy nor without pitfalls. There is a need to better understand the predicaments of intelligence analysis.Intelligence is bureaucratically produced as well as socially constructed and created in a distinct cultural context. The ‘institution’ captures these three aspects of influence. Therefore, with a particular focus on military intelligence, this thesis aims to deepen the understanding regarding institutional influence on intelligence assessments. The literature regarding intelligence has grown steadily over the last three decades. However, theories and frameworks aimed to understand the phenomenon are still sparse. This is even more true for literature regarding contemporary military intelligence. This thesis intends to contribute to bridging these research gaps. This is done by studying the Swedish military intelligence institution from several different perspectives: its rules-in-use, shared beliefs, and the incoming stimuli primarily related to conducting threat assessments.More precisely the thesis investigates the use of quantitative methods, doctrines (i.e. the formal rules), and shared beliefs connected to epistemological assumptions and threat assessments. The main contribution of this thesis is that it establishes and describes a casual link between a military intelligence institution and an assessment, by drawing upon rulesin-use and belief systems and their effect on the mental model and consequently the perception of the situation connected to a cognitive bias, and thereby its effect on a given assessment. The thesis makes an effort to render intelligence studies more generalizable, by way of adopting the Institutional Analysis and Development (IAD) framework. The metatheoretical language of the IAD is a promising avenue for explaining and describing the institutional influence on intelligence assessments.
  •  
5.
  • Liwång, Hans (författare)
  • Risk-based ship security analysis : a decision-support approach
  • 2015
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The protection of shipping does not come without hazards and threats for military forces, individual civilian ship operators and crews. With particular focus on security threats, this thesis is about how to prepare for such operations without introducing unnecessary risks, i.e., supporting conscious risk-taking related to ship security. It examines both civilian and military aspects of maritime security and therefore draws from the experience of both fields.Maritime safety regulations, guidelines and methods have a history and culture of systematic research, development and implementation. In contrast, international security is highly politicised and therefore less transparent. Unfortunately, comprehensive studies of ship security risk are rare. Moreover, applying risk-based approaches to security areas requires special considerations, and the limited research in this field has led to a knowledge gap.To reduce the identified challenges with respect to security risk analysis, the goal of this thesis is to improve security decision support by defining an approach to ship security analysis. To increase overall safety, this approach must facilitate compromises between traditional maritime safety and maritime security. Accordingly, the objective is to develop an approach that is both systematic and gives the decision maker an appropriate picture of the security risks. To examine the requirements for a security decision-support approach, the work in the appended papers studies both threats to naval vessels and the security threat posed to commercial vessels by pirates. The results of the studies can be used to further develop military doctrines and civilian guidelines.This study shows that the description and quantification of the (concept of) operation in the risk analysis is central for implementing both security and naval ship survivability. In addition, the crew’s risk perception, procedural safeguards and how the implemented risk controls are perceived have an important role not only in risk analysis but also in deciding the effectiveness of implemented controls. It is also concluded that only using expected values—not collecting and using uncertainties—in the analysis can lead to misleading results. Therefore, the uncertainty treatment offered by a quantitative approach is crucial for risk understanding, especially if the aim is to find robust control options or to support the development of a resilient culture.
  •  
6.
  • Liwång, Hans, 1974- (författare)
  • Risk-based ship security analysis – an approach based on civilian and military methods
  • 2012
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The demands on maritime operations today are increasingly higher in terms of control, efficiency and cost. The margins for accidents and security incidents are therefore decreasing. In the area of ship safety the regulations, guidelines and methods have a history and culture of systematic research, development and implementation. In contrast, international security is highly politicized and therefore not as transparent. The result is that a tradition of ship security is not as well established.The overall aim of this thesis is to propose a method for ship security analysis that increases the overall safety of the crew and the ship. The objective is to develop a method that is systematic in order to ensure that assessment and response are complete and effective, and that the process is documented to provide evidence of decision-making.The method used is probabilistic risk assessment where quantitative analysis is central. The proposed approach is consistent with the requirements of maritime safety work. However, in the work here, the proposed methods are specifically tested for security cases. This is because hazards (without intent) and threats (with intent) evolve in different ways into risk. Therefore, they must be analysed differently in order to capture the causal relationship.The proposed approach consists of three steps: the first step consists of a threat description that documents qualitative and quantitative aspects that together describe how the threat most likely will act in relation to the ship’s vulnerability; the second step uses the threat description to define the system studied as well as the scenarios that collectively describe the harmful consequences; the third step evaluates the risk with tools from probabilistic risk assessment.The overall conclusion is that the proposed method brings the procedure and results of ship security analysis into the open and therefore allows for criticism, improvements and shared risk knowledge, not possible with less structured methods. The results also show that the calculated probabilities agree with available statistics, which indicates that the analysis succeeds in describing the central causal relationships of the scenarios modelled.
  •  
7.
  • Stensson, Patrik (författare)
  • The Quest for Edge Awareness, Lessons not yet learned : PhD Thesis on practical and situated usefulness of advanced technological systems among inescapable uncertainties and competing interests in a world of dynamic changes
  • 2014
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • This thesis problematizes the concept of usefulness, in part by taking questions to the extreme. The starting point is the contemporary view of usefulness, a view that remains within a traditional paradigm of technical rationality in which important aspects are disregarded or not perceived because they are not part of the equation. For scrutiny of technological usefulness that is a socially situated phenomenon regarding physical systems, neither interpretivist nor positivist research approaches are sufficient. Both views are required. Critical Realism supports such duality, facilitating the combination of elements from different paradigms, and provides methodological guidelines for doing this. The critical realist approach makes it possible to transcend the boundaries of technical rationality and contribute an alternative definition of usefulness that takes into account also the situated, the contextual, and the unpredictable. The aim is that this definition will contribute to a transformation of society.Concepts related to usefulness, such as predictability, controllability, effectiveness, and safety, are revisited, redefined, or complemented. Underlying aspects and mechanisms are explored and tensions identified, resulting in a theoretical contribution with models and frameworks explaining what is argued to be the true nature of usefulness. Potentiality is suggested as a complementary concept to effectiveness, similar to how resilience complements safety. Situated usefulness is then defined using these four concepts. The phenomenon known as situation awareness is scrutinized as well, and complemented by system awareness and the thesis title concept, edge awareness.Four cases, two airline crashes and two nuclear power plant events, and three future scenarios, constitute the empirical contribution. The analysis shows that the contributed frameworks and redefinition of usefulness facilitate different or extended explanations of all four events, and that future cases lack considerations of situated usefulness. Research implications center on the human role and our responsibilities in relation to the technology that we use, and on the meaning of concepts defining this role. We are situated human beings. Our role is to be involved and responsible, a role requiring awareness and controllability. The escalating ubiquity and the character of computerized technological systems make therefore the quest for edge awareness more important than ever.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-7 av 7

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy