Essays about: "Vulnerability Assessment"
Showing result 1 - 5 of 134 essays containing the words Vulnerability Assessment.
-
1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE
-
2. Assessment and evaluation of heterogeneity in data from immune infiltration spatial niches in lung cancer
University essay from Lunds universitet/Matematisk statistikAbstract : The protein biomarker expressions in three types of sampled immune INFILTration spatial niches in lung cancer tissue were measured using the new technology Digital Spatial Profiler (DSP). The three types of immune INFILTration that were observed in lung tumors were STROMA identified as immune cells separate from tumor cells, Tertiary lymphoid structures (TLS) identified as dense structures of organized immune cells and finally Infiltraterate where immune cells dispersed among and in direct contact with tumor cells (INFILT). READ MORE
-
3. A Climate, Land, Energy, and Water Nexus Assessment of Ethiopia
University essay from KTH/EnergisystemAbstract : Ethiopia is a landlocked country located in northeast Africa with a predominantly rural population dependent on rainfed agriculture and traditional biomass. The Ethiopian economy is growing fast and as it continues to grow, so does the demand for water, food, and energy. READ MORE
-
4. Assessing Supply Chain Resilience to Mitigate Supply Chain Risks : A case study of the inbound logistics @ Volvo CE
University essay from Linköpings universitet/Logistik- och kvalitetsutvecklingAbstract : In recent years, the frequency of disruptive events in supply chains has increased. This is partly due to the fact that supply chains are more globalized and more complex, with deeper tiering among suppliers. This makes the supply chain more vulnerable to risks. READ MORE
-
5. HackerGraph : Creating a knowledge graph for security assessment of AWS systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE