Essays about: "Advantages and Disadvantages of operating system"

Showing result 1 - 5 of 27 essays containing the words Advantages and Disadvantages of operating system.

  1. 1. Unlocking the Potential of Solar-Hydro Hybrid Solutions: Feasibility and Economic Analysis

    University essay from Lunds universitet/Industriell elektroteknik och automation

    Author : Måns Rosberg; [2023]
    Keywords : Hydropower; Solarpower; Hybrid power production; Solar-hydro hybrid power; Reservoir storage; Energy storage; Pumped hydro power; Floating PV; PV; Photovoltaics; Technology and Engineering;

    Abstract : Hybrid solutions that combine multiple renewable energy sources, such as solar power and hydro power, are gaining popularity as a means of meeting the growing energy demands while minimising environmental impacts, but also as an opportunity of connecting solar power plants to the grid in areas where this might not be possible unless large investments are made. This master thesis aims to evaluate the feasibility and economic viability of integrating solar panels with an existing grid connection point at a hydro power plant, along with the introduction of an energy storage solution using a hydro power plant reservoir. READ MORE

  2. 2. Modelling the full-scale N2O emissions from wastewater treatment plants for identifying mitigation strategies

    University essay from Lunds universitet/Kemiteknik (CI)

    Author : Naga Deepika Peddamudium; [2023]
    Keywords : Modelling; simulation; ASM2dISS; N2O production pathways; N2O emission factor; mitigation strategies; water and environmental engineering; Technology and Engineering;

    Abstract : Nitrous oxide (N2O) emissions, which primarily originate from the biological nitrogen removal process, dominate the release of greenhouse gases (GHGs) in wastewater treatment plants (WWTPs). N2O production occurs through dynamic microbial pathways that have a significant impact on the environment compared with other GHG emissions. READ MORE

  3. 3. Improving the Robustness of Over-the-Air Synchronization for 5G Networks in a Multipath Environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anders Erninger; [2023]
    Keywords : Peak selection algorithms; Peak matching; Time alignment error; Over-the-air synchronization; Multipath environment; Toppvalsalgoritmer; Toppmatchning; Tidsfel; Luftburen synkronisation; Flervägsmiljö;

    Abstract : Synchronization between base stations is a fundamental part of any operating telecommunication system. With 5G and future generations of mobile networks, the data speeds are getting higher, which creates the need for fast and accurate synchronization. In wireless systems, the transmitted signals are affected by the environment. READ MORE

  4. 4. Flow batteries - Impact on fire safety

    University essay from Lunds universitet/Avdelningen för Brandteknik

    Author : Ajay Menon; [2022]
    Keywords : Flow battery; Flow battery types; Flow battery risks; Firefighting; Fire risk analysis; Safety hazards in flow batteries; Fire risks in lithium-ion battery; Safety hazard in lithium-ion battery; Application of battery storage systems; Safety reports.; Technology and Engineering;

    Abstract : The need for sustainable renewable energy has been increasing due to the negative impact of non-renewable energy sources. With the unstable and sporadic nature of sustainable renewable energy, flow batteries show immense potential in mitigating these issues. READ MORE

  5. 5. Digital incursion: Breaching the android lock screen and liberating data

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Tim Oskarsson; [2021]
    Keywords : Android forensics; Mobile forensics; Memory forensics; Device access; PIN; Pattern; Biometrics; Android Debug Bridge; TWRP; Frida.;

    Abstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE