85 resultados para sun bears
Resumo:
Variantti A.
Resumo:
Invokaatio: Sun Theo!
Resumo:
Invokaatio: Sun Theo.
Resumo:
Variantti A.
Resumo:
Invokaatio: Sun Theo.
Resumo:
Variantti A.
Resumo:
Invokaatio: Sun Theo.
Resumo:
Invokaatio: Sun boetheiak harti tou uperohou Theou.
Resumo:
The European ambitious targets to increase the share of renewable generation pose a challenge to the generation adequacy. Many European member states are concerned that energy-only markets alone might not be able to deliver sufficient capacity required to meet the future electricity demand and back up shortfalls of energy from renewable energy sources (RES) during periods of low wind and sun. Many EU members consider to re-design their energy-only markets and establish different forms of capacity remunerative mechanisms (CRMs) to maintain the security of supply. There is a certain concern that market design changes at the level of EU member countries might conflict with the European goal of a single market. As soon as many European markets are highly interconnected, uncoordinated CRMs might create negative crossborder effects and hinder the achievement of the Internal Electricity Market in Europe. The pros and cons of capacity markets are well examined at the national level. However, the cross-border effects of capacity markets within the European market aiming at higher integration have received less attention. This doctoral dissertation examines the cross-border effects of unilateral implementation of CRMs applying both theoretical and case study analyses. The results show that capacity remunerative mechanisms (CRMs) may cause negative cross-border effects, especially if they are implemented unilaterally.
Resumo:
Phenomena in cyber domain, especially threats to security and privacy, have proven an increasingly heated topic addressed by different writers and scholars at an increasing pace – both nationally and internationally. However little public research has been done on the subject of cyber intelligence. The main research question of the thesis was: To what extent is the applicability of cyber intelligence acquisition methods circumstantial? The study was conducted in sequential a manner, starting with defining the concept of intelligence in cyber domain and identifying its key attributes, followed by identifying the range of intelligence methods in cyber domain, criteria influencing their applicability, and types of operatives utilizing cyber intelligence. The methods and criteria were refined into a hierarchical model. The existing conceptions of cyber intelligence were mapped through an extensive literature study on a wide variety of sources. The established understanding was further developed through 15 semi-structured interviews with experts of different backgrounds, whose wide range of points of view proved to substantially enhance the perspective on the subject. Four of the interviewed experts participated in a relatively extensive survey based on the constructed hierarchical model on cyber intelligence that was formulated in to an AHP hierarchy and executed in the Expert Choice Comparion online application. It was concluded that Intelligence in cyber domain is an endorsing, cross-cutting intelligence discipline that adds value to all aspects of conventional intelligence and furthermore that it bears a substantial amount of characteristic traits – both advantageous and disadvantageous – and furthermore that the applicability of cyber intelligence methods is partly circumstantially limited.