Search for dissertations about: "signature management"
Showing result 1 - 5 of 15 swedish dissertations containing the words signature management.
-
1. On the Military Utility of Spectral Design in Signature Management : a Systems Approach
Abstract : There is an ongoing duel between military sensor development and developments in signature management. The last decade, with warfare characterized by joint expeditionary operations and asymmetry, has favored sensors. READ MORE
-
2. Cardiovascular morbidity and metabolic signature in patients with rheumatoid arthritis
Abstract : Background and objectives: Rheumatoid arthritis (RA) is a chronic systemic inflammatory disease with excess risk for cardiovascular morbidity and mortality. The treatment of RA by anti-inflammatory drugs has dramatically been improved over the resent decades. READ MORE
-
3. Ligand-based Methods for Data Management and Modelling
Abstract : Drug discovery is a complicated and expensive process in the billion dollar range. One way of making the drug development process more efficient is better information handling, modelling and visualisation. The majority of todays drugs are small molecules, which interact with drug targets to cause an effect. READ MORE
-
4. Navigating Open Polities for Change in Swedish Bilateral Development Cooperation Projects
Abstract : International development cooperation is undergoing a transformation, driven by the urgent need for more effective, holistic approaches to address enduring global challenges. This thesis explores the paradigmatic shift towards complex adaptive systems (CAS) thinking in Swedish bilateral development cooperation project management, in response to these challenges. READ MORE
-
5. A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures
Abstract : Information Technology (IT) is a cornerstone of our modern society and essential for governments' management of public services, economic growth and national security. Consequently, it is of importance that IT systems are kept in a dependable and secure state. READ MORE