Essays about: "Disturbances"

Showing result 11 - 15 of 665 essays containing the word Disturbances.

  1. 11. Control of carbon dioxide capture from biomass CHP plants : Designing a suitable control system to realize the flexible operation of the CO2 capture system

    University essay from Mälardalens universitet/Akademin för ekonomi, samhälle och teknik

    Author : Tanmmay Rout; [2023]
    Keywords : Carbon capture; biomass fired combined heat and power plant; MEA based chemical absorption; flue gas; dynamic operation; PI controllers;

    Abstract : This degree project studies the integration of carbon capture system into biomass fired combined heat and power (bio-CHP) plants. The key disturbances from bio-CHP plants include flue gas flow rate, carbon dioxide (CO2) concentration and available heat for the reboiler because the use of versatile biomass and the dynamic operation of CHP plants results in large fluctuations in the properties of flue gas and the heat input for CO2 capture. READ MORE

  2. 12. Wrist Angle Estimation Using Two Wearable Inertial Measurement Units

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Arvin Razavi; [2023]
    Keywords : IMU wrist angle estimation; Wrist absolute angle; IMU-based human motion capture; orientation filter; Complementary filter; Kalman filter; IMU handledsvinkeluppskattning; handleds absolutvinkel; IMU-baserad mänsklig rörelsefångst; orienteringsfilter; komplementfilter; Kalman-filter;

    Abstract : Hand-intensive work is closely related to the prevalence of upper body and hand/wrist work-related musculoskeletal disorders (WMSDs) in office work, manufacturing, service industries, as well as the healthcare industry. Some risk factors include vibrations, forceful exertions, heavy manual handling, repetitive motions, and prolonged nonneutral wrist postures. READ MORE

  3. 13. Robust light source detection for AUV docking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Joar Edlund; [2023]
    Keywords : Autonomous Underwater Vehicle; Docking; Detection; Poseestimation; Visual Navigation; Autonoma Undervattensfordon; Dockning; Detektering; Positionsestimering; Visuell Navigation;

    Abstract : For Autonomous Underwater Vehicles (AUVs) to be able to conduct longterm surveys, the ability to return to a docking station for maintenance and recharging is crucial. A dynamic docking system where a slowly moving submarine acts as the docking station provides increased hydrodynamic control and reduces the impact of environmental disturbances. READ MORE

  4. 14. Antarctic Subglacial Lakes as Environmental Analogues for Possible Hidden Biospheres on the Moons Europa and Enceladus

    University essay from Uppsala universitet/Institutionen för geovetenskaper

    Author : Jonas Fahlman; [2023]
    Keywords : astrobiology; icy moons; subglacial lakes; ice dynamics; thermal regimes; extremophiles; anthropogenic contamination; astrobiologi; ismånar; subglaciala sjöar; is-dynamik; termiska regimer; extremofiler; antropologisk kontaminering;

    Abstract : The evolving science of astrobiology for the search for life beyond Earth has put focus on the possibility of subsurface bodies of liquid water beneath the surface of icy moons within our Solar System. Specifically, the Jovian moon of Europa and the Saturnian moon of Enceladus show telling characteristics of endogenous heating through their complex tidal resonances with their parent planets – suggesting the presence of oceans of liquid water and therefore a potential for astrobiology. READ MORE

  5. 15. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE