• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 26
  • 19
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 59
  • 22
  • 14
  • 14
  • 14
  • 14
  • 13
  • 9
  • 9
  • 8
  • 6
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Polysialylated liposomes : preparation, characterisation and stability studies in vitro and in vivo

Zhang, Xiaoqin January 1999 (has links)
No description available.
2

Examining the Essentials of Stealth Game Design

Khatib, Youssef January 2013 (has links)
Through looking into the inner workings of stealth centric games, this paper aims to find out the essential components of this type of videogames. Examining the history of such games and the design principles of stealth centric games in relation to the participating player this paper will methodically examine games in the light of the arguments of industry professionals. After that a framework is extracted, identifying the principal core components of stealth centric game design.
3

A systems approach to understanding the strategic advantage of the F/A-22 and future stealth aircraft

Tatum, Kenneth R., January 2004 (has links) (PDF)
Thesis (M.A.A.S.) -- Air University, 2004. / Title from PDF title page (viewed on April 24, 2009). "June 2004." Includes abstract. Includes bibliographical references (leaves 84-88).
4

Extended surface flow and heat transfer studies

Robertson, Andrew J. January 1998 (has links)
No description available.
5

Stealth Marketing : The art of deceiving consumers

Petersson, Viktor, Svensson, Markus January 2010 (has links)
Bachelor Thesis in business administration, school of economics at Linnæus University, marketing, 2FE07E, Spring 2010   Authors: Viktor Pettersson and Markus Svensson Instructor: Mosad Zineldin   Title: Stealth Marketing The art of deceiving consumers   Background: Ethical aspects in promoting products are a concern when new methods are developed in order to reach consumers with marketing messages. Stealth marketing is one method developed and is based on not disclosing or revealing the true relationship to a marketing message. Furthermore, what impacts stealth marketing can have on brand image is questioned.   Purpose: Create an understanding for the importance of ethical considerations when using stealth marketing; furthermore determine if that could affect the brand image.   Delimitation: This thesis is focusing on the ethical aspects of stealth marketing, the legal aspects are not being considered.   Method: A quantitative research method was used in form of a survey with 249 respondents. The questions in the survey were based on theory and the results from the survey were analyzed in a program called SPSS. This was analyzed through three propositions and then compared to theory. The conclusion is answering the propositions, and either accepted or falsified.   Results, conclusions: It has been identified that consumers’ consider business ethics to be important. However, it did not have enough impact to make consumers’ boycott the products. It is also concluded that stealth marketing methods have a small negative impact on the brand image.   Suggestion for further research: A recommendation is to determine which techniques that are considered to be unethical business behaviour. Recommendations for further research are to focus on where the business ethical boarders are trespassed, and when a boycott of products occurs. Another interesting aspect for further research would be to examine if there is ethical differences and acceptable behaviour by a company, between an older and younger generation.
6

Smygteknik och smygtaktik  : om smygteknikens påverkan på sjötaktiken

Forslund, David January 2009 (has links)
<p>Uppsatsen gör en första ansats till redogörelse för smygteknikens taktiska implikationer.</p><p>Vilka möjligheter finns med smygtekniken mot en kvalificerad motståndare under väpnad strid? Detta koncentreras till tre olika områden: duellstrid, underrättelseinhämtning och vilseledning. Med avstamp i flottans gamla reglemente, TRFL, via litteratur i ämnet, och slutligen med intervjuer dras slutsatser på huruvida sjötaktiken påverkats, eller kan påverkas av signaturanpassningen.</p><p>Slutsatserna är, förutom att fortsatt forskning behövs på området, att det är av största vikt att fartygschef har adekvata beslutsunderlag angående fartygets signaturer, och att signaturanpassningen, rätt nyttjad, ger taktiska fördelar.</p> / <p>This study examines how stealth technology affects Swedish tactics in the naval arena. Could stealth technology improve the chances of successful naval warfare? This puts focus on three underlying questions: how stealth technology affects your odds, in a duel, in deceptive action, and during reconnaissance/information gathering?</p><p>This requires a description of stealth technology, benefits and disadvantages, and a thorough picture of Swedish naval tactics. With this in mind, an analysis is conducted where the benefits of stealth technology are compared with Swedish naval tactics. The main results of this study shows that, firstly, the subject needs more careful research, secondly that stealth technology gives, if properly used, a tactical advantage.</p>
7

Smygteknik och smygtaktik  : om smygteknikens påverkan på sjötaktiken

Forslund, David January 2009 (has links)
Uppsatsen gör en första ansats till redogörelse för smygteknikens taktiska implikationer. Vilka möjligheter finns med smygtekniken mot en kvalificerad motståndare under väpnad strid? Detta koncentreras till tre olika områden: duellstrid, underrättelseinhämtning och vilseledning. Med avstamp i flottans gamla reglemente, TRFL, via litteratur i ämnet, och slutligen med intervjuer dras slutsatser på huruvida sjötaktiken påverkats, eller kan påverkas av signaturanpassningen. Slutsatserna är, förutom att fortsatt forskning behövs på området, att det är av största vikt att fartygschef har adekvata beslutsunderlag angående fartygets signaturer, och att signaturanpassningen, rätt nyttjad, ger taktiska fördelar. / This study examines how stealth technology affects Swedish tactics in the naval arena. Could stealth technology improve the chances of successful naval warfare? This puts focus on three underlying questions: how stealth technology affects your odds, in a duel, in deceptive action, and during reconnaissance/information gathering? This requires a description of stealth technology, benefits and disadvantages, and a thorough picture of Swedish naval tactics. With this in mind, an analysis is conducted where the benefits of stealth technology are compared with Swedish naval tactics. The main results of this study shows that, firstly, the subject needs more careful research, secondly that stealth technology gives, if properly used, a tactical advantage.
8

Är "no news" verkligen "good news"? : En studie av hur tre svenska webbtidningar rapporterar om fem konflikter och hur teorierna CNN-effekten och Stealth Conflicts kan förklara detta / Is no news truly good news? : A study of how three Swedish web-based newspapers report about five conflicts and how this can be explained by using the two theories the CNN effect and Stealth Conflicts

Petersson, Anna, Norstedt, Anna January 2014 (has links)
Is there any truth in the saying “no news is good news” or is there a reason to question whether media actually do reflect the world’s worst conflicts proportionally? The communication technologies have seen major developments in recent years, and more and more people choose to read their news on the Internet. With smartphones and other devices, one could imagine that there would be easier to cover more conflict areas than ever – but is this what has happened? In this study we aimed to investigate how three chosen Swedish newspapers reflected five of the on-going conflicts of 2012 and how this can be explained with the theories; the CNN effect and Stealth Conflicts. We started out with studies of the two theories. The definition of “conflict” used in this study is Uppsala Conflict Data Program’s “war and minor conflict”. Then a quantitative study followed, where we used the three newspapers’ websites to search for articles about our chosen conflict areas: Algeria, Israel, Democratic Republic of Congo, Rwanda and Syria. The conclusion of this study is that there is, at least among our chosen newspapers, a disproportionate covering of the world’s conflicts, with the exception of Syria. This matches largely with how the two theories explain the media’s covering of conflicts, but we found a deeper explanation in the Stealth Conflict theory, though the CNN effect stood for interesting points as well. The theories could benefit from a merger since that would create a theory with a wider range of explanation tools of why the conflict news reports looks and works the way it does and of its consequences.
9

TELEMETRY CONSIDERATIONS WITH OPERATIONAL STEALTH VEHICLES

Reighter, Greg 10 1900 (has links)
International Telemetering Conference Proceedings / October 26-29, 1998 / Town & Country Resort Hotel and Convention Center, San Diego, California / Instrumenting the operational B-2 Strategic Bomber presents some unique problems. For example, the requirement to remain operational dictates that the aircraft must retain its stealth characteristics. This means traditional antennas cannot simply be attached to the airframe. A solution to this problem is an antenna designed with stealth, or Low Observable (LO), attributes. Stealth is not an absolute; it is relative. Therefore, antenna design becomes a balancing act between the LO relativity, antenna directivity, and antenna gain. Weapons testing is an additional concern, where instrumented ordinances transmit data that must be monitored real-time prior to launch. Stealth vehicles must carry weapons internally, restricting the Radio Frequency (RF) transmission of telemetered data from the weapon. With the development of future stealthy conveyances, such as the F-22, Joint Strike Fighter (JSF), ground, and ocean-going craft, these concerns will become even more prevalent.
10

Undercover Marketing : The method which lies beneath

Stenberg, Karolina, Pracic, Sabina January 2005 (has links)
<p>Background: A coming of age of a generation named Generation Y, which holds negative views on commercial messages, has resulted in the need of special marketing methods which are known to be more alternative. Guerrilla Marketing, being such a method holds beneath it Undercover Marketing which is another method and has the potential of reaching this generation.</p><p>Purpose: Our purpose is firstly to define a theoretical placement of Undercover Marketing, secondly to define the theoretical views on ethics regarding the mentioned term and thirdly to see if there is a future, a will, and knowledge for its usage within the Swedish community of marketing practitioners.</p><p>Method: The research for this thesis is done in a qualitative method through a series of interviews with four advertising firms and one freelance artdirector. The interviews were compared to each other and to the frame of reference during the analysis in order to create a more complete picture.</p><p>Results: In this thesis we have seen that there is a future in the use of Undercover Marketing as it can prove to be the only method able to reach Gen Y. However it must follow certain rules to succeed and companies must take certain factors into consideration prior to attempting a marketing campaign including this particular method.</p>

Page generated in 0.0208 seconds