Browsing NTNU Open by Title
Now showing items 94210-94229 of 103755
-
Thomas Tellefsen i norsk og fransk musikkultur - en resepsjonshistorisk og verkanalytisk studie
(Doktoravhandlinger ved NTNU, 1503-8181; 2005:215, Doctoral thesis, 2005)Komponisten Thomas Dyke Acland Tellefsen (1823-1874) etterlot 44 opus med originalkomposisjoner. Flertallet av verkene er for klaver solo, men opuslisten inneholder også en relativt omfattende kammermusikkproduksjon og to ... -
Thoracic radiotherapy in limited disease small cell lung cancer
(Doctoral theses at NTNU;2017:7, Doctoral thesis, 2017)Norsk sammendrag: Lungekreft er den tredje hyppigste kreftformen, og den ledende årsaken til kreftrelaterte dødsfall. Småcellet lungekreft (SCLC) er den mest aggressive av to hovedtyper lungekreft, og forekommer nesten ... -
Thoracic Radiotherapy in Limited-Stage SCLC—a Population-Based Study of Patterns of Care in Norway From 2000 Until 2018
(Peer reviewed; Journal article, 2022)Introduction Twice-daily (BID) thoracic radiotherapy (TRT) of 45 Gy per 30 fractions is recommended for limited-stage (LS) SCLC, but most patients are treated with once-daily (OD) schedules owing to toxicity concerns ... -
Thoracoabdominal aortic aneurysm repair: Operative technique, pathophysiology and results of treatment
(Doktoravhandlinger ved NTNU, 1503-8181; 2006:98, Doctoral thesis, 2006) -
Thorium (Th) alteration veins in the Northern Trondheimfjord area
(Master thesis, 2017)Th-alteration of red carbonate veins within Ytterøy island in the northern Trondheimfjord area was investigated by focusing on field work, mineral chemistry and geochemistry. The principal aim of this thesis was to evaluate ... -
Thorsten Borring Olesen Den svære dans. Danmark og det europæiske samarbejde
(Journal article; Peer reviewed, 2023) -
Threat Analysis for Smart Homes
(Journal article; Peer reviewed, 2019)The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments ... -
Threat Analysis in Dynamic Environments: The Case of the Smart Home
(Chapter, 2019)The rapid advancement of information and communication technologies has fostered the development and deployment of complex interrelated systems, many of which also present highly dynamic operational characteristics. These ... -
Threat mitigation and national security: A mixed methods study of perceptions on cyber security information sharing among Norwegian organizations
(Master thesis, 2022)Norske virksomheter blir i økende grad utsatt for målrettede cyberangrep som forsterker behovet for en helhetlig tilnærming til nasjonal sikkerhet. I dagens cyberlandskap har nasjonal sikkerhet i stor grad blitt ... -
Threat mitigation and national security: A mixed methods study of perceptions on cyber security information sharing among Norwegian organizations
(Master thesis, 2022)Norske virksomheter blir i økende grad utsatt for målrettede cyberangrep som forsterker behovet for en helhetlig tilnærming til nasjonal sikkerhet. I dagens cyberlandskap har nasjonal sikkerhet i stor grad blitt ... -
Threat Modeling Framework for Smart Grids
(Master thesis, 2021)Det fremtidige strømnettet, ofte kalt det smarte strømnettet, er forventet å inkludere distribuerte strømproduksjon, toveis flyt av strøm, omfattende innsamling og prosessering av data og et stort antall enheter relatert ... -
Threat Modeling of a Smart Grid Secondary Substation
(Peer reviewed; Journal article, 2022)A full smart grid implementation requires the digitization of all parts of the smart grid infrastructure, including secondary electrical substations. Unfortunately, this introduces new security threats, which were not ... -
Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus
(Peer reviewed; Journal article, 2021)Cyber–Physical Systems (CPS) are distributed systems in which the state of the physical system is generally not observable in non-trivial cases, and where state transitions of this physical system can also occur without ... -
Threats to Bitcoin Software
(Master thesis, 2014)Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the ... -
Threats to validity of oral assessment in English
(Master thesis, 2018)Til tross for den økte oppmerksomheten på kvaliteten av vurdering i utdanning viser forskning at få studer har tatt for seg vurdering av muntlig kompetanse. Dette belyser nødvendigheten av å rette oppmerksomhet mot muntlig ... -
Three 10W C-band Power Amplifier Alternatives for use in TT&C-Transmitters
(Master thesis, 2015)This thesis describes the first stage in designing and realizing three 10W C-band power amplifier alternatives based on the GaN-technology for use in Kongsberg Norspace future TT&C-transmitters. The operational frequency ... -
Three Approaches in Computational Geometry and Topology: Persistent Homology, Discrete Differential Geometry and Discrete Morse Theory
(Master thesis, 2011)We study persistent homology, methods in discrete differential geometry and discrete Morse theory. Persistent homology is applied to computational biology and range image analysis. Theory from differential geometry is used ... -
Three children, two languages: the role of code selection in organizing conversation
(Doctoral thesis, 1997) -
Three classes of quadratic vector fields for which the Kahan discretization is the root of a generalised Manin transformation
(Peer reviewed; Journal article, 2019)Three classes of quadratic vector fields for which the Kahan discretization is the root of a generalised Manin transformation