Essays about: "Change detection"
Showing result 1 - 5 of 326 essays containing the words Change detection.
-
1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE
-
2. Effect of training and feeding on saliva concentrations of cartilage oligomeric matrix protein neo-epitope (COMP664) and neuropeptide Substance P in horses
University essay from SLU/Dept. of Biomedical Sciences and Veterinary Public HealthAbstract : Osteoarthritis (OA) is a low-grade inflammatory disease associated with subsequent lameness and chronic joint pain. Lameness caused by degenerative joint disorders is perceived as one of the most common clinical problems for the equine athlete, advocating the severity of OA as a welfare and clinical issue. READ MORE
-
3. Time Series Forecasting on Database Storage
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Time Series Forecasting has become vital in various industries ranging from weather forecasting to business forecasting. There is a need to research database storage solutions for companies in order to optimize resource allocation, enhance decision making process and enable predictive data storage maintenance. READ MORE
-
4. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE
-
5. N-body simulations of exoplanets and their moons
University essay from Lunds universitet/Astrofysik; Lunds universitet/Fysiska institutionenAbstract : The planet-planet interactions in a many-planet system cannot be analytically calculated. Instead, they have to be investigated by using an N-body simulation. I discuss three questions about the N-body interactions in planetary systems: The first two are on the system 55 Cnc, a system with five known planets around a K-type star. READ MORE