Essays about: "disadvantages of technologies"

Showing result 1 - 5 of 75 essays containing the words disadvantages of technologies.

  1. 1. Unlocking the Potential of Solar-Hydro Hybrid Solutions: Feasibility and Economic Analysis

    University essay from Lunds universitet/Industriell elektroteknik och automation

    Author : Måns Rosberg; [2023]
    Keywords : Hydropower; Solarpower; Hybrid power production; Solar-hydro hybrid power; Reservoir storage; Energy storage; Pumped hydro power; Floating PV; PV; Photovoltaics; Technology and Engineering;

    Abstract : Hybrid solutions that combine multiple renewable energy sources, such as solar power and hydro power, are gaining popularity as a means of meeting the growing energy demands while minimising environmental impacts, but also as an opportunity of connecting solar power plants to the grid in areas where this might not be possible unless large investments are made. This master thesis aims to evaluate the feasibility and economic viability of integrating solar panels with an existing grid connection point at a hydro power plant, along with the introduction of an energy storage solution using a hydro power plant reservoir. READ MORE

  2. 2. Exploring the Advantages, Disadvantages, and Challenges of Implementing a Hybrid LiFi and WiFi Network : A Systematic Literature Review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Jonas Ingemarsson; [2023]
    Keywords : LiFi; WiFi; VLC; hybrid; network; LiFi; WiFi; VLC; hybrid; nätverk;

    Abstract : I takt med att efterfrågan på trådlös kommunikation med hög hastighet ökar och det ökande antalet enheter som är trådlöst anslutna har forskare börjat utforska kompletterande teknologier. Hybridnätverk bestående av LiFi och WiFi är en kombination av Light-Fidelity och Wireless-Fidelity som kombinerar dataöverföring över både radiovågor och ljus. READ MORE

  3. 3. Pre-study for SMR and Nuclear Establishment in Norway

    University essay from Lunds universitet/Institutionen för energivetenskaper

    Author : Johan Stefan Nordström; [2023]
    Keywords : Energy mapping; Nuclear power; SMR; small modular reactors; siting; Norway; Energy; Technology and Engineering;

    Abstract : Norway has Europe’s highest share of renewable electricity production and the lowest power sector emissions. Thanks to the country’s stable power production, Norway has affordable and stable access to electricity, leading to industries choosing to relocate to the country. READ MORE

  4. 4. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Panagiotis Vlachos; [2023]
    Keywords : Vulnerability management; Cyber threat intelligence; Common vulnerability scoring system; Exploit prediction scoring system;

    Abstract : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. READ MORE

  5. 5. Edge Computing Security for IoT : A Systematic Literature Review

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Albin Johnsson; Adam Nordling; [2023]
    Keywords : ;

    Abstract : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. READ MORE