Essays about: "Thesis of energy security"

Showing result 21 - 25 of 213 essays containing the words Thesis of energy security.

  1. 21. A changing energy security environment – a review of alternative energy carriers for light duty vehicles

    University essay from Försvarshögskolan

    Author : Julia Nilsson; [2023]
    Keywords : Supply chain; Logistic; Energy security; Light duty vehicle;

    Abstract :   The increasing energy demand and its impact on the climate around the world has evoked several sectors´ efforts in order to develop and implement sustainable technologies. Political incentives and companies go toward great changes when it comes to reduction of energy sources from fossil-origins in order to reduce greenhouse gas emissions and achievement of energy security. READ MORE

  2. 22. Study Of Universal Islanding Detection Techniques In Distributed Generation Systems

    University essay from Linnéuniversitetet/Institutionen för fysik och elektroteknik (IFE)

    Author : Ochai Ochalla Danladi; [2023]
    Keywords : Distributed Generation; Islanding; Quality Factor; Resonance Frequency; Low Voltage; Medium Voltage; Electronic Power Converter; Inverter;

    Abstract : Energy security, global warming, and climate change have been a major source of global discussions and development. Likewise, the rising cost of electricity for consumers and exponential demand for energy are major factors driving the incremental growth and integration of sustainable forms of energy generation into power the system cycle. READ MORE

  3. 23. Simulation of Quantum Cascade Lasers

    University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Matematisk fysik

    Author : Zakaria Mohamed; [2023]
    Keywords : Quantum Cascade Lasers; Simulations; Numerical Methods; Computational Models; Heterostructures; Physics and Astronomy;

    Abstract : This thesis aimed to contribute to the improvement of Quantum Cascade Lasers (QCLs) by focusing on the effective determination of quantum levels in these devices. The current method relies on an outdated Fortran code, which poses challenges when integrating into optimization schemes. READ MORE

  4. 24. Securing LwM2M with Mbed TLS in Contiki-NG

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jayendra Ellamathy; [2023]
    Keywords : ;

    Abstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE

  5. 25. Evaluating the Ownership of Personal data in the Cloud by Optimizing the IT Architecture : Applying a reference architecture to make the ownership of personal data more clear within an organization

    University essay from Uppsala universitet/Datalogi

    Author : Tilda Myrsell; Sofie Hulteberg; [2023]
    Keywords : Cloud computing; reference architecture; personal data; international standard ISO IEC 17789; data security; data ownership;

    Abstract : ​​Cloud computing is an area that many companies use in order to stay in line with technological development. To keep these systems productive and easily managed, a reference architecture can be used as a framework and also as a manual on how to structure an organization to suit its specific needs and goals. READ MORE