Essays about: "Dominance"
Showing result 16 - 20 of 458 essays containing the word Dominance.
-
16. Roadblocks and gateways in the human domain : A cognitive interoperability framework for allies and partners
University essay from FörsvarshögskolanAbstract : This thesis contributes to our understanding of cognitive interoperability by explor-ing barriers, facilitators, and contextual factors to create a framework. With the ad-vent of the cognitive domain in warfighting, the adversary pursuit of military strate-gic advantage through cognitive science demands that we seize the initiative and seek cognitive superiority with allies and partners. READ MORE
-
17. German coal exit : an argumentative discourse analysis of storylines and discourse coalitions
University essay from SLU/Dept. of Urban and Rural DevelopmentAbstract : Germany passed a Coal Phase-out Act in 2020 to reduce carbon emissions and to achieve the objec-tives of the Paris Agreement, at a time when Germany was already phasing out nuclear energy. Thus, Germany faces a dual challenge: not only to break its dependence on coal as a resource, but also the overlap of the phase-outs of nuclear and coal energy. READ MORE
-
18. Resursförsvar hos hund – orsaker och förebyggande
University essay from SLU/Dept. of Animal Environment and HealthAbstract : Hundaggression är ett allvarligt problem dels i form av nedsatt välfärd hos hunden som uppvisar aggressivt beteenden, dels för omgivningen då det kan leda till bitskador på människor och andra djur. Detta gör att hundaggression är bland det farligaste problembeteende hos hundar som ägare står inför. READ MORE
-
19. Land grabbing in Ghana - A false promise? : Neo-colonialism or a development opportunity?
University essay from Jönköping University/HLK, Globala studierAbstract : A global land rush developed during the last decade, spared primiarly by the sharp rise inglobal food prices between 2007 and 2008. The inceased international food prices resulted inincreased interest from foreign actors to invest in agricultural land in developing countries inthe global south. READ MORE
-
20. LSTM-attack on polyalphabetic cyphers with known plaintext : Case study on the Hagelin C-38 and Siemens and Halske T52
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Polyalphabetic cyphers have been used for centuries and well into the 1970s to transmit all kinds of messages. Since then, computers and modern cryptography have taken over making bruteforce attacks unfeasible when designed properly. READ MORE