Essays about: "Software Composition"

Showing result 1 - 5 of 98 essays containing the words Software Composition.

  1. 1. The association between obesity, low-grade inflammation, self-reported knee symptoms and radiographic knee osteoarthritis in individuals with knee pain : A longitudinal cohort study

    University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhet

    Author : Alma Buer; [2024]
    Keywords : osteoarthritis knee pain; artros knä smärta;

    Abstract : Abstract  Background One of the earliest signs of knee osteoarthritis (OA) is knee pain which correlates with inflammation and disease severity. Knee OA affects 260 million worldwide, and is in similarity with obesity, characterized by ongoing low-grade inflammation. READ MORE

  2. 2. Juice/JDC ion measurement perturbations caused by spacecraft charging in the solar wind and Earth’s magnetosheath

    University essay from Uppsala universitet/Institutionen för fysik och astronomi

    Author : Derek van Winden; [2024]
    Keywords : Juice; Jupiter Icy Moons Explorer; JDC; Jovian plasma Dynamics and Composition analyzer; Particle Environment Package; PEP; Jupiter; Ganymede; Callisto; Europa; solar wind; magnetosheath; spacecraft charging; Spacecraft Plasma Interaction Software; SPIS; charging; plasma; measurement perturbations; perturbation; distortion; particle detector; Institutet för Rymdfysik; IRF; Dublin Institute for Advanced Studies; DIAS; European Space Agency; ESA;

    Abstract :  In July 2031, a new chapter in the exploration of the Jovian system will begin with the arrival of the Jupiter Icy Moons Explorer (Juice) at Jupiter. Launched on April 14 2024 as part of ESA’s Cosmic Vision programme, the mission aims to study Jupiter and its icy Galilean moons Callisto, Europa, and Ganymede. READ MORE

  3. 3. Effect of Trace Elements on the Particle Size of Magnesium Silicide in Aluminium Extrusion : The Use of Thermo-Calc and DICTRA in order to Produce Aluminium more Efficiently

    University essay from KTH/Materialvetenskap

    Author : Gustav Boustedt; Johan Alexander Valentin Nygren; Gustav Strandgård; [2023]
    Keywords : Thermo-Calc; DICTRA; simulations; EN AW 6082; extrusion; particle precipitation; Mg2Si; sustainable; trace elements; aluminium;

    Abstract : This project is a feasibility study for Hydro Extrusion Sweden AB, a company that produces extruded aluminium profiles. The main purpose of this project was to analyse the difference of Mg2Si particle sizes in aluminium alloys when varying parameters, such as cooling rate and composition, in aluminium extrusion, particularly the EN AW 6082 alloy. READ MORE

  4. 4. Calibration of the Measurement System for Methane Pyrolysis in Rocket Nozzle Cooling Channels

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Jennifer Ly; [2023]
    Keywords : Correlational method; gas analysis; real time measurements; speed of sound; thermal conductivity; methane pyrolysis; rocket nozzle cooling; Korrelationsmetod; gasanalys; mätningar i real tid; ljudhastighet; värmeledningsförmåga; metanpyrolys; kylning av raketmunstycken iv;

    Abstract : Methane-based rocket propellant is gaining traction as a green technology with advantages in sustainability, cost-effectiveness, and performance. However, under high temperatures found in rocket nozzle cooling channels, methane can undergo thermal decomposition known as methane pyrolysis, resulting in the generation of hydrogen and solid carbon. READ MORE

  5. 5. Vulnerability Management of Open-Source Libraries

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Lokesh kumar Mekala; Sai krishna Kandukuri; [2023]
    Keywords : vulnerability management; software security; open-source software.;

    Abstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE