Essays about: "SSO"

Showing result 1 - 5 of 25 essays containing the word SSO.

  1. 1. Damping of sub-synchronous control interactions with a STATCOM : Wind farms & series compensated power lines

    University essay from Uppsala universitet/Institutionen för elektroteknik

    Author : Leonardo Alvarez Urrutia; [2022]
    Keywords : Sub-Synchronous Control Interactions; Power Systems; STATCOM; Network Stability; Doubly-Fed Induction Generator; Impedance-Based Stability Analysis;

    Abstract : The power converter is one of the key components in power system applications such as high voltage direct current (HVDC) systems and the grid connection of intermittent sources such as wind and solar power. However, the increased penetration of converter-based generation introduces challenges, such as sub-synchronous interaction between the converter control system and the grid. READ MORE

  2. 2. Mitigating SSCI in a hybrid wind and PV farm utilizing PV-STATCOM : A Swedish case study

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Isabelle Löfgren; [2022]
    Keywords : impedance analysis; PV-STATCOM; SSCI; SSO; SSR; sub-synchronous control interaction;

    Abstract : The share of electricity generation in the power system being based on power electronics is increasing, which will impact the system in different ways, such as an increased risk for undesired interactions. An example is doubly fed induction generator (DFIG) based windfarms which have been shown to present negative resistance in (parts of) the sub-synchronous range (i. READ MORE

  3. 3. Secure IPC To Enable Highly Sensitive Communication In A Smartphone Environment With A BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE

  4. 4. Implementation of a component to manage authorization for a web application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Victor Kai Oscar Paulsen; [2021]
    Keywords : SSO; Auth; Spring Boot; Okta; Web Application; Security; OAuth2.0; OIDC; Authorization code flow; API.; Technology and Engineering;

    Abstract : Examensarbetet utfördes i samarbete med Klarna i Giessen med syftet att utveckla en komponent i en del av en webbapplikation som hanterar autentisering. Komponenten skulle interagera med auktoriseringstjänsten försedd från Okta tillsammans med korrekt auktoriseringsflöde som en lösning för tillåten användning av webbapplikationen. READ MORE

  5. 5. Secure IPC to Enable Highly Sensitive Communication in a Smartphone Environment with a BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE