271 |
Robust Optimization of Private Communication in Multi-Antenna SystemsWolf, Anne 02 June 2015 (has links)
The thesis focuses on the privacy of communication that can be ensured by means of the physical layer, i.e., by appropriately chosen coding and resource allocation schemes. The fundamentals of physical-layer security have been already formulated in the 1970s by Wyner (1975), Csiszár and Körner (1978). But only nowadays we have the technical progress such that these ideas can find their way in current and future communication systems, which has driven the growing interest in this area of research in the last years.
We analyze two physical-layer approaches that can ensure the secret transmission of private information in wireless systems in presence of an eavesdropper. One is the direct transmission of the information to the intended receiver, where the transmitter has to simultaneously ensure the reliability and the secrecy of the information. The other is a two-phase approach, where two legitimated users first agree on a common and secret key, which they use afterwards to encrypt the information before it is transmitted. In this case, the secrecy and the reliability of the transmission are managed separately in the two phases.
The secrecy of the transmitted messages mainly depends on reliable information or reasonable and justifiable assumptions about the channel to the potential eavesdropper. Perfect state information about the channel to a passive eavesdropper is not a rational assumption. Thus, we introduce a deterministic model for the uncertainty about this channel, which yields a set of possible eavesdropper channels. We consider the optimization of worst-case rates in systems with multi-antenna Gaussian channels for both approaches. We study which transmit strategy can yield a maximum rate if we assume that the eavesdropper can always observe the corresponding worst-case channel that reduces the achievable rate for the secret transmission to a minimum.
For both approaches, we show that the resulting max-min problem over the matrices that describe the multi-antenna system can be reduced to an equivalent problem over the eigenvalues of these matrices. We characterize the optimal resource allocation under a sum power constraint over all antennas and derive waterfilling solutions for the corresponding worst-case channel to the eavesdropper for a constraint on the sum of all channel gains. We show that all rates converge to finite limits for high signal-to-noise ratios (SNR), if we do not restrict the number of antennas for the eavesdropper. These limits are characterized by the quotients of the eigenvalues resulting from the Gramian matrices of both channels. For the low-SNR regime, we observe a rate increase that depends only on the differences of these eigenvalues for the direct-transmission approach. For the key generation approach, there exists no dependence from the eavesdropper channel in this regime. The comparison of both approaches shows that the superiority of an approach over the other mainly depends on the SNR and the quality of the eavesdropper channel. The direct-transmission approach is advantageous for low SNR and comparably bad eavesdropper channels, whereas the key generation approach benefits more from high SNR and comparably good eavesdropper channels. All results are discussed in combination with numerous illustrations. / Der Fokus dieser Arbeit liegt auf der Abhörsicherheit der Datenübertragung, die auf der Übertragungsschicht, also durch geeignete Codierung und Ressourcenverteilung, erreicht werden kann. Die Grundlagen der Sicherheit auf der Übertragungsschicht wurden bereits in den 1970er Jahren von Wyner (1975), Csiszár und Körner (1978) formuliert. Jedoch ermöglicht erst der heutige technische Fortschritt, dass diese Ideen in zukünftigen Kommunikationssystemen Einzug finden können. Dies hat in den letzten Jahren zu einem gestiegenen Interesse an diesem Forschungsgebiet geführt.
In der Arbeit werden zwei Ansätze zur abhörsicheren Datenübertragung in Funksystemen analysiert. Dies ist zum einen die direkte Übertragung der Information zum gewünschten Empfänger, wobei der Sender gleichzeitig die Zuverlässigkeit und die Abhörsicherheit der Übertragung sicherstellen muss. Zum anderen wird ein zweistufiger Ansatz betrachtet: Die beiden Kommunikationspartner handeln zunächst einen gemeinsamen sicheren Schlüssel aus, der anschließend zur Verschlüsselung der Datenübertragung verwendet wird. Bei diesem Ansatz werden die Abhörsicherheit und die Zuverlässigkeit der Information getrennt voneinander realisiert.
Die Sicherheit der Nachrichten hängt maßgeblich davon ab, inwieweit zuverlässige Informationen oder verlässliche Annahmen über den Funkkanal zum Abhörer verfügbar sind. Die Annahme perfekter Kanalkenntnis ist für einen passiven Abhörer jedoch kaum zu rechtfertigen. Daher wird hier ein deterministisches Modell für die Unsicherheit über den Kanal zum Abhörer eingeführt, was zu einer Menge möglicher Abhörkanäle führt. Die Optimierung der sogenannten Worst-Case-Rate in einem Mehrantennensystem mit Gaußschem Rauschen wird für beide Ansätze betrachtet. Es wird analysiert, mit welcher Sendestrategie die maximale Rate erreicht werden kann, wenn gleichzeitig angenommen wird, dass der Abhörer den zugehörigen Worst-Case-Kanal besitzt, welcher die Rate der abhörsicheren Kommunikation jeweils auf ein Minimum reduziert.
Für beide Ansätze wird gezeigt, dass aus dem resultierenden Max-Min-Problem über die Matrizen des Mehrantennensystems ein äquivalentes Problem über die Eigenwerte der Matrizen abgeleitet werden kann. Die optimale Ressourcenverteilung für eine Summenleistungsbeschränkung über alle Sendeantennen wird charakterisiert. Für den jeweiligen Worst-Case-Kanal zum Abhörer, dessen Kanalgewinne einer Summenbeschränkung unterliegen, werden Waterfilling-Lösungen hergeleitet. Es wird gezeigt, dass für hohen Signal-Rausch-Abstand (engl. signal-to-noise ratio, SNR) alle Raten gegen endliche Grenzwerte konvergieren, wenn die Antennenzahl des Abhörers nicht beschränkt ist. Die Grenzwerte werden durch die Quotienten der Eigenwerte der Gram-Matrizen beider Kanäle bestimmt. Für den Ratenanstieg der direkten Übertragung ist bei niedrigem SNR nur die Differenz dieser Eigenwerte maßgeblich, wohingegen für den Verschlüsselungsansatz in dem Fall keine Abhängigkeit vom Kanal des Abhörers besteht. Ein Vergleich zeigt, dass das aktuelle SNR und die Qualität des Abhörkanals den einen oder anderen Ansatz begünstigen. Die direkte Übertragung ist bei niedrigem SNR und verhältnismäßig schlechten Abhörkanälen überlegen, wohingegen der Verschlüsselungsansatz von hohem SNR und vergleichsweise guten Abhörkanälen profitiert. Die Ergebnisse der Arbeit werden umfassend diskutiert und illustriert.
|
272 |
Algorithms for the Maximum Independent Set ProblemLê, Ngoc C. 18 February 2015 (has links)
This thesis focuses mainly on the Maximum Independent Set (MIS) problem. Some related graph theoretical combinatorial problems are also considered. As these problems are generally NP-hard, we study their complexity in hereditary graph classes, i.e. graph classes defined by a set F of forbidden induced subgraphs.
We revise the literature about the issue, for example complexity results, applications, and techniques tackling the problem. Through considering some general approach, we exhibit several cases where the problem admits a polynomial-time solution. More specifically, we present polynomial-time algorithms for the MIS problem in:
+ some subclasses of $S_{2;j;k}$-free graphs (thus generalizing the classical result for $S_{1;2;k}$-free graphs);
+ some subclasses of $tree_{k}$-free graphs (thus generalizing the classical results for subclasses of P5-free graphs);
+ some subclasses of $P_{7}$-free graphs and $S_{2;2;2}$-free graphs; and various subclasses of graphs of bounded maximum degree, for example subcubic graphs.
Our algorithms are based on various approaches. In particular, we characterize augmenting graphs in a subclass of $S_{2;k;k}$-free graphs and a subclass of $S_{2;2;5}$-free graphs. These characterizations are partly based on extensions of the concept of redundant set [125]. We also propose methods finding augmenting chains, an extension of the method in [99], and finding augmenting trees, an extension of the methods in [125]. We apply the augmenting vertex technique, originally used for $P_{5}$-free graphs or banner-free graphs, for some more general graph classes.
We consider a general graph theoretical combinatorial problem, the so-called Maximum -Set problem. Two special cases of this problem, the so-called Maximum F-(Strongly) Independent Subgraph and Maximum F-Induced Subgraph, where F is a connected graph set, are considered. The complexity of the Maximum F-(Strongly) Independent Subgraph problem is revised and the NP-hardness of the Maximum F-Induced Subgraph problem is proved. We also extend the augmenting approach to apply it for the general Maximum Π -Set problem.
We revise on classical graph transformations and give two unified views based on pseudo-boolean functions and αff-redundant vertex. We also make extensive uses of α-redundant vertices, originally mainly used for $P_{5}$-free graphs, to give polynomial solutions for some subclasses of $S_{2;2;2}$-free graphs and $tree_{k}$-free graphs.
We consider some classical sequential greedy heuristic methods. We also combine classical algorithms with αff-redundant vertices to have new strategies of choosing the next vertex in greedy methods. Some aspects of the algorithms, for example forbidden induced subgraph sets and worst case results, are also considered.
Finally, we restrict our attention on graphs of bounded maximum degree and subcubic graphs. Then by using some techniques, for example ff-redundant vertex, clique separator, and arguments based on distance, we general these results for some subclasses of $S_{i;j;k}$-free subcubic graphs.
|
273 |
Physical Aspects of Min Oscillations in Escherichia ColiMeacci, Giovanni 20 December 2006 (has links)
The subject of this thesis is the generation of spatial temporal structures in living cells. Specifically, we studied the Min-system in the bacterium Escherichia coli. It consists of the MinC, the MinD, and the MinE proteins, which play an important role in the correct selection of the cell division site. The Min-proteins oscillate between the two cell poles and thereby prevent division at these locations. In this way, E. coli divides at the center, producing two daughter cells of equal size, providing them with the complete genetic patrimony. Our goal is to perform a quantitative study, both theoretical and experimental, in order to reveal the mechanism underlying the Min-oscillations. Experimentally, we characterize theMin-system, measuring the temporal period of the oscillations as a function of the cell length, the time-averaged protein distributions, and the in vivo Min-protein mobility by means of different fluorescence microscopy techniques. Theoretically, we discuss a deterministic description based on the exchange of Minproteins between the cytoplasm and the cytoplasmic membrane and on the aggregation current induced by the interaction between membrane-bound proteins. Oscillatory solutions appear via a dynamic instability of the homogenous protein distributions. Moreover, we perform stochastic simulations based on a microscopic description, whereby the probability for each event is calculated according to the corresponding probability in the master equation. Starting from this microscopic description, we derive Langevin equations for the fluctuating protein densities which correspond to the deterministic equations in the limit of vanishing noise. Stochastic simulations justify this deterministic model, showing that oscillations are resistant to the perturbations induced by the stochastic reactions and diffusion. Predictions and assumptions of our theoretical model are compatible with our experimental findings. Altogether, these results enable us to propose further experiments in order to quantitatively compare the different models proposed so far and to test our model with even higher precision. They also point to the necessity of performing such an analysis through single cell measurements.
|
274 |
以非派生和派生之優選理論來分析臺灣閩南語仔前變調以及暱稱仔詞綴變調 / The pre-a1 tone change and hypocoristic -a2 suffix tone change in Taiwan southern min: a parallel and serial OT analysis陳元翔, Chen, Yuan-hsiang Unknown Date (has links)
本篇論文嘗試以非派生和派生兩種不同結構基礎的優選理論來分析臺灣閩南語仔前變調以及暱稱仔詞綴變調。非派生的優選理論認為聲調改變僅需一個步驟就可以完成。仔前和暱稱仔詞綴音節本身都有兩種讀法,不同的變異體可透過共同音韻模型 (Cophonological model) 下的次文法,也就是制約的重新排序來解釋。本篇研究認為調素傳替與否是仔前音節不同聲調的來源,透過 SHARE (t) 和 NOLONG (t) 兩種制約的排序,可以預測調素是否傳替。另外,透過 SHARE,NOLONG 和 TONAL MARKEDNESS 三種制約的互動和階層性的排序,可以預測暱稱仔詞綴的變調兩讀。派生優選理論則認為仔前和暱稱仔詞綴的聲調變化是一種階段性,而且是一種趨向最佳化的改變,亦即每一個步驟的輸出值都比上一個步驟的還來的優質,為仔前和暱稱仔詞綴變調提供另一個理論詮釋的觀點。在派生優選理論的框架下,仔前變調需要三個步驟,亦即一般變調、調域傳替以及調素傳替的有無。暱稱仔詞綴變調也是需要三個步驟,第一是沒有聲調徵性的聲調加插;第二是調域傳替或是低調域加插;第三是調素傳替或是低聲調徵性的加插。同樣的, 透過 SHARE (t) 和 NOLONG (t) 的排序,可以預測仔前音節的不同聲調。透過 SHARE,NOLONG,TONAL MARKEDNESS 和 REGISTER MARKEDNESS 的排序, 可以預測暱稱仔詞綴的不同聲調。 / This thesis attempts to analyze the pre-a1 tone change and hypocoristic -a2 suffix tone change in Taiwan Southern Min from the perspective of Optimality Theory and Harmonic Serialism, a derivational version of Classic OT. Classic OT, which implements parallelism, explicates the tone change phenomenon in one-step fashion. The two tonal variants of the pre-a1 and -a2 syllables can be accounted for through the constraint re-ranking in Cophonology Theory. The interaction between SHARE (t) and NOLONG (t) determines whether the terminal toneme will perform spreading in the pre-a1 tone change. In the -a2 suffix tone change, the interaction amongst SHARE, NOLONG and TONAL MARKEDNESS determines whether -a2 will receive a tone spread from the neighboring TBU or associate with a default L. Harmonic Serialism, which assumes harmonic improvement over the course of serial derivation, provides an alternative treatment for the pre-a1 tone change and -a2 suffix tone change. In Harmonic Serialism, the pre-a1 tonal alternation proceeds with three steps, viz. regular tone sandhi, register spreading and terminal toneme spreading. -a2 suffix tone change also requires three steps in terms of Harmonic Serialism, that is, featureless tone insertion in the first step; register spreading or low register insertion in the second step; and toneme spreading or low tonal feature insertion in the final step. Likewise, the ranking conditions between SHARE (t) and NOLONG (t) predict whether toneme will spread in the pre-a1 tone change. In the -a2 suffix tone change, the alternative rankings among SHARE, NOLONG, TONAL MARKEDNESS and REGISTER MARKEDNESS decide the application of tone spreading or default L insertion.
|
275 |
台灣閩南語新調群分析 / Tone group parsing of Taiwan Southern Min楊雯婷, Yang, Wen-ting Unknown Date (has links)
本文調查年輕世代 (1988 至 1995 年間出生者) 閩南語的變調範域 (Tone Sandhi Domain),即調群 (Tone Group)。文中以「傳統調群」表文獻記載的變調範域,以「新調群」表本文重新調查的變調範域。論文的研究立基於音韻句法互動之上,並持間接指涉假設觀點,從韻律音韻學的角度出發,認為句法音韻間存有一韻律介面,且調群為此介面上的韻律單位:音韻詞組 (Phonological Phrase, ϕ)。
本文發現新調群與傳統調群的劃分相異。前人研究指出,調群邊界 (#) 標於音韻詞組右端,音韻詞組為一最大投射 XP,且不可為附加語及附著語。新調群僅部分可以傳統音韻詞組界定,其他則對應至句法上的主要語 X,以及附加語最大投射 XP。此外,新調群的邊界為選擇性地出現,具語言變異。新調群出現四種於傳統調群未見的劃分形式:依調群邊界前的語法單位分為主要語 X 類別:(1) V # NP # (2) V # QP # 及附加語 XP 類別: (3) QP # A # (4) AdvP # V #。
本文提出調群新定義,並以優選理論中的 ROE 模型進行分析,提出三個新制約:Align-R (XP-Fnc, ϕ)、ϕ-min 及 Align-R (X-head, ϕ)。Align-R (XP-Fnc, ϕ) 用以區分功能性投射與詞彙性投射;ϕ-min 限制音韻詞組至少含兩音節;Align-R (X-head, ϕ) 解釋調群邊界標註於主要語 X 右端。分析時著重制約 Align-R (XP-Fnc, ϕ) 、ϕ-min 及 Align-R (X-head, ϕ) 與切分線 | (Critical Cut-Off Line) 的關係。整體制約排序為:Ident-T-Rϕ | Align-R (XP-Fnc, ϕ) >> ϕ-min >> Align-R (X-head, ϕ) >> *T >> Align-R (XP-Lex, ϕ)。除信實性制約 Ident-T-Rϕ 之外,其他標記性制約皆列於切分線之下,預測語言變異。 / The goal of this thesis is to explore the tone sandhi domain, tone group (hereafter, TG), of Taiwan Southern Min of younger generation. A corpus is built and analyzed within the framework of Prosodic Theory, a derived theory from the Phonology-Syntax Interface Theory.
In the literature, TG boundary # was marked at the right edge of an XP which is neither an adjunct nor a clitic. However, the TG boundary # of younger generation is marked at the right edges of a maximal XP, an adjunctive XP and an X-head. Moreover, language variation is observed in the TG parsing: the presence of TG boundary # is optional. There are four TG parsings not observed in the literature: (1) V # NP # (2) V # QP # (3) QP # A # (4) AdvP # V #.
TG is redefined as a Phonological Phrase which syntactically corresponds to a maximal XP, an adjunct XP, an X-head but not to a clitic XP. The four TG parsings are then analyzed with Rank-Ordering Model of EVAL (ROE), a subtheory within the Optimality Theory domain which particularly addresses language variation. According to ROE, constraints on the right side of critical cut-off line participate in the prediction of variation. Three constraints involving in variation are proposed: Align-R (XP-Fnc, ϕ), ϕ-min and Align-R (X-head, ϕ). Align-R (XP-Fnc, ϕ) distinguishes lexical projection and functional projection, ϕ-min requires a Phonological Phrase to be minimally disyllabic, and Align-R (X-head, ϕ) predicts # to occur at the right edge of an X-head. The analysis centers around the three constraints’ relation with the critical cut-off line. The constraint rankings are: Ident-T-Rϕ | Align-R (XP-Fnc, ϕ) >> ϕ-min >> Align-R (X-head, ϕ) >> *T >> Align-R (XP-Lex, ϕ). Except for the faithfulness constraint Ident-T-Rϕ, the other markedness constraints are arranged at the right side of the cut-off line in order to predict language variation.
|
276 |
Etude mathématique et numérique de modèles de transport : application à la spintroniqueEl Hajj, Raymond 03 September 2008 (has links) (PDF)
Ce travail de thèse comporte trois parties. La partie principale s'intéresse au transport des courants polarisés en spin dans des matériaux à base de semi-conducteurs. Nous dérivons et analysons une hiérarchie des modèles allant du niveau microscopique au niveau macroscopique et tenant compte des différents mécanismes de rotation et de relaxation du vecteur spin dans les semi-conducteurs. Les mécanismes essentiels pris en compte sont les couplages spin-orbite et les interactions avec renversement de spin (spin-flip interactions). Une analyse semi-classique (via la transformation de Wigner) de l'équation de Schrödinger avec hamiltonien spin-orbite est présentée. Au niveau cinétique, l'équation de Vlasov (ou Boltzmann) spinorielle est une équation à valeur dans l'ensemble des matrices carrées d'ordre deux hermitiennes et positives. Partant ensuite de la spinor forme de l'équation de Boltzmann (avec différents opérateurs de collisions avec et sans renversement du vecteur spin) et par des techniques d'asymptotiques de diffusion, nous dérivons et analysons plusieurs modèles macroscopiques. Ils sont de type dérive-diffusion, SHE, Energie-Transport, à deux composantes ou spinoriels conservant des effets de rotation et de relaxation du vecteur spin. Nous validons ensuite ces modèles par des cas tests numériques. Deux applications numériques sont présentées : la simulation d'un transistor à effet de rotation de spin et l'étude de l'effet d'accumulation de spin à l'interface entre deux couches semi-conductrices différemment dopées. Dans la seconde partie, nous considérons une équation cinétique de type Boltzmann linéaire dans des domaines où un champ magnétique fort est appliqué. Nous étudions la limite de diffusion en supposant que le champ magnétique est unidirectionnel et tend vers l'infini. Le modèle obtenu est un modèle macroscopique constitué d'une équation diffusive dans la direction parallèle au champ magnétique et d'une dérive représentant l'effet centre-guide en présence d'un champ électrique dans la direction perpendiculaire. Le terme de diffusion contient des moyennes de giration de l'opérateur de collisions utilisé. Nous prouvons la convergence en utilisant des techniques d'entropie pour traiter le comportement diffusif, et en conjuguant par les rotations locales induites par le champ magnétique pour tenir compte des oscillations. Dans la troisième partie de cette thèse, Nous nous intéressons à la description du potentiel de confinement dans des gas d'électrons bidimensionnels. Nous étudions la limite faible longueur de Debye (ou faible température) du système de Schrödinger-Poisson unidimensionnel stationnaire sur un intervalle borné. Les électrons sont supposés dans un mélange d'états avec une statistique de Boltzmann (ou de Fermi-Dirac). En utilisant différentes reformulations du système comme des problèmes de minimisation convexe, nous montrons qu'asymptotiquement seul le premier niveau d'énergie est occupé. Le potentiel électrostatique converge vers une couche limite avec un profil calculé à l'aide d'un système de Schrödinger-Poisson sur le demi axe réel.
|
277 |
Förmågan till minröjning, en verklighet för framtidens jägargrupp : Ökad förmåga till problemlösning i dagens konfliktområden / Mine clearance capability, the Reality on the Future Ranger Squads : The increased ability to problem solving in today’s conflict areasHjulfors, David January 2009 (has links)
<p>I dagens konfliktområden är förekomsten av minor och oexploderad ammunition(OXA) ett vanligt förekommande problem för civilbefolkning samt de militära enheter som arbetar i området för att skapa stabilitet och säkerhet. Den här uppsatsen avhandlar möjligheten att lösa eventuella problem som har att göra med förekomsten av minor och OXA i ett missionsområde utan tillgång till stödresurser i form av min- och ammunitionsröjningsteam. Uppsatsens syfte är att undersöka om det är möjligt att tillföra minröjningskompetens på gruppnivå utan att tappa ursprunglig kompetens och fokus från huvudtjänsten. Uppsatsen tar även upp vilken lägsta nivå av utbildning som krävs för att kunna röja mineringar och OXA, samt hur man når upp till det målet. Uppsatsens frågeställning har varit: Går det att inom ramen för Jägarbataljon 09 utbilda en soldat som besitter kompetensen att kunna identifiera och röja mineringar samt OXA? Om ja, vilken utrustning bör tillföras? Mina slutsatser är att det är praktiskt möjligt genom att tillföra en min- och amröjledare på bataljons nivå. Min- och amröjledaren kan i sin tur utbilda och ge soldaterna den reella kompetens som behövs på enbart fyra veckor, ca 130h stimmar. Utbildningen som krävs är grundkursen Minröjning Manuella Metoder(MMM). För att fullt ut kunna nyttja förmågan krävs det att gruppen tillförs viss ammunitionsröjningsutrustning, bland annat extra tänd- och sprängmedel. Effekten man vinner på tillförsel av minröjningskompetensen är kopplat mot förbandets förmåga till okonventionellt uppträdande samt möjligheterna att ta ytterligare steg innanför motståndarens beslutscykel.</p> / <p>In today’s conflict areas the remnants of war, mines and unexploded ordnance (UXO) is a common problem for the civilian population. These remnants also pose a great threat for the military units who work in the area to create peace, stability and security for the people. The purpose of this essay is to discover if and how it is possible to solve eventual problems associated with remnants of war in conflict areas, without the support of Explosive Ordnance Disposal (EOD) teams. My research has explored if it is possible to implement mine clearance and ammunition disposal on a squad without loosing additional competence and focus from the squad’s main field of service. Additional research has been carried out to ascertain the lowest level of competence necessary to work within the field of mine clearance and ammunition disposal, and what education is needed. My thesis aims to answer, if it is possible within the frame of the Army Ranger Battalion 09, to educate a soldier on a squad to have the ability and competence to do work within the field of mine clearance and ammunition disposal? If yes, what additional equipment should be added to the squad, to be able to perform that task? My conclusion is that it is possible to achieve by adding a mine clearance and ammunition disposal leader to the Battalion staff who can educate, train and give the soldiers the proper education in four weeks (approximately 130h). The education required to achieve this goal is the course, Mine clearance Manuel Methods (MMM). To use this ability it is necessary to equip the group with some additional and specific disposal-equipment (i.e. extra explosives.) The main effort gained from implementing this ability on a ranger squad is the Ranger Battalion’s overall ability to operate and appear in unexpected areas, and to get inside the enemy’s OODA-LOOP.</p>
|
278 |
Förmågan till minröjning, en verklighet för framtidens jägargrupp : Ökad förmåga till problemlösning i dagens konfliktområden / Mine clearance capability, the Reality on the Future Ranger Squads : The increased ability to problem solving in today’s conflict areasHjulfors, David January 2009 (has links)
I dagens konfliktområden är förekomsten av minor och oexploderad ammunition(OXA) ett vanligt förekommande problem för civilbefolkning samt de militära enheter som arbetar i området för att skapa stabilitet och säkerhet. Den här uppsatsen avhandlar möjligheten att lösa eventuella problem som har att göra med förekomsten av minor och OXA i ett missionsområde utan tillgång till stödresurser i form av min- och ammunitionsröjningsteam. Uppsatsens syfte är att undersöka om det är möjligt att tillföra minröjningskompetens på gruppnivå utan att tappa ursprunglig kompetens och fokus från huvudtjänsten. Uppsatsen tar även upp vilken lägsta nivå av utbildning som krävs för att kunna röja mineringar och OXA, samt hur man når upp till det målet. Uppsatsens frågeställning har varit: Går det att inom ramen för Jägarbataljon 09 utbilda en soldat som besitter kompetensen att kunna identifiera och röja mineringar samt OXA? Om ja, vilken utrustning bör tillföras? Mina slutsatser är att det är praktiskt möjligt genom att tillföra en min- och amröjledare på bataljons nivå. Min- och amröjledaren kan i sin tur utbilda och ge soldaterna den reella kompetens som behövs på enbart fyra veckor, ca 130h stimmar. Utbildningen som krävs är grundkursen Minröjning Manuella Metoder(MMM). För att fullt ut kunna nyttja förmågan krävs det att gruppen tillförs viss ammunitionsröjningsutrustning, bland annat extra tänd- och sprängmedel. Effekten man vinner på tillförsel av minröjningskompetensen är kopplat mot förbandets förmåga till okonventionellt uppträdande samt möjligheterna att ta ytterligare steg innanför motståndarens beslutscykel. / In today’s conflict areas the remnants of war, mines and unexploded ordnance (UXO) is a common problem for the civilian population. These remnants also pose a great threat for the military units who work in the area to create peace, stability and security for the people. The purpose of this essay is to discover if and how it is possible to solve eventual problems associated with remnants of war in conflict areas, without the support of Explosive Ordnance Disposal (EOD) teams. My research has explored if it is possible to implement mine clearance and ammunition disposal on a squad without loosing additional competence and focus from the squad’s main field of service. Additional research has been carried out to ascertain the lowest level of competence necessary to work within the field of mine clearance and ammunition disposal, and what education is needed. My thesis aims to answer, if it is possible within the frame of the Army Ranger Battalion 09, to educate a soldier on a squad to have the ability and competence to do work within the field of mine clearance and ammunition disposal? If yes, what additional equipment should be added to the squad, to be able to perform that task? My conclusion is that it is possible to achieve by adding a mine clearance and ammunition disposal leader to the Battalion staff who can educate, train and give the soldiers the proper education in four weeks (approximately 130h). The education required to achieve this goal is the course, Mine clearance Manuel Methods (MMM). To use this ability it is necessary to equip the group with some additional and specific disposal-equipment (i.e. extra explosives.) The main effort gained from implementing this ability on a ranger squad is the Ranger Battalion’s overall ability to operate and appear in unexpected areas, and to get inside the enemy’s OODA-LOOP.
|
279 |
Djävulens lakejer : En komparativ studie av djävulsgestaltningen i NarniaböckernaSöderberg, Emma January 2010 (has links)
Det övergripande syftet i denna uppsats är att undersöka vad som tyder på att C.S. Lewis har influerats av den bibliska Djävulen i hans skildrande av två ondskefulla gestalter i Narnia. Dessa två karaktärer är den vita häxan och den vita häxan. I studien har jag valt att göra en komparativ undersökning av vilka kopplingar och likheter som finns mellan den bibliska djävulen och Lewis framställningar av den gröna respektive den vita häxan. Jämförandet bygger på en intertextuell, religiös grund med en hermeneutisk utgångspunkt där Bibeln och Holms djävulssymboler har fungerat som jämförelseunderlag. Fokus i denna granskning har legat på vilka samband skildringarna av Djävulen och häxorna förmedlar i form av symboler, handlingar och händelser. Sammanfattningsvis går att säga att parallellerna och likheterna är många och konkreta men att dessa influenser tar sig uttryck på olika sätt hos den gröna häxan respektive den vita häxan. Det framgår att den gröna häxan har fler kopplingar till djävulen genom symboler medan den vita häxan skildras mer sparsamt med symboliska uttryck. Den vita häxan tilldelas dock fler paralleller och samband med djävulen i form av handlingar och händelser. Samtidigt blir det tydligt att Lewis förmedlar kristna strukturer till kommande generationer genom sina karaktärer och berättelser om landet Narnia. Det bibliska jämförandet visar i detta fall på hur människor i en social konstruktion även införlivar nya medlemmar i kulturella inlärningssystem genom litteratur.
|
280 |
國語閩南口音中的單元音化與擦音卸解 / Monophthongization and Fricative Reconfiguration in the Taiwanese Accent of Mandarin吳耿彰, Wu, Keng-Chang Unknown Date (has links)
本論文觀察台灣地區國語閩南口音,也就是俗稱的「台灣國語」中展現的單元音化以及擦音卸解現象,建立「台灣國語語料庫」作為本論文分析的基礎,並且從優選理論的觀點探討這些台灣國語音韻現象。
根據「台灣國語語料庫」的數據顯示,韻核後介音 /j/ 以及 /w/ 容易被語者刪除,韻核前介音 /j/ 以及 /w/ 則傾向被語者保留。輕擦音 /f/ 在台灣國語中常被卸解為 /hw/。
本文的分析認為,國語閩南口音是一種方言的變異,反映了閩南語以及國語的部份制約排序。當語者表現出明顯的閩南語口音時,反映出閩南語的部份制約排序;而語者的閩南語口音較不明顯時,則反映了國語的部份制約排序。 / This thesis investigates monophthongization and fricative reconfiguration in the Taiwanese Accent of Mandarin (TM), and establishes the TM corpus as the base of phonological analysis. The Optimality Theory approach is adopted to account for the phonological phenomenon of TM.
As indicated by the TM corpus, the postnuclear glides /j/ and /w/ tend to be deleted in TM; the prenuclear glides /j/ and /w/ tend to be preserved in TM; and the fricative /f/ tend to reconfigurate as /hw/ in TM.
Our analysis considers that TM is a dialectal variation which reflects the subgrammars of Taiwanese and Mandarin. When the speaker shows a clear Taiwanese accent, the partially ordered ranking of Taiwanese is reflected; and when the speaker shows no obvious Taiwanese accent, the partially ordered ranking of Mandarin is reflected.
|
Page generated in 0.0242 seconds