Essays about: "Value Configuration"

Showing result 1 - 5 of 130 essays containing the words Value Configuration.

  1. 1. Solar Photovoltaic Thermal Collectors and Ground Source Heat Pumps for Commercial Buildings : Case study in Sweden

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Doris Dijak; Elin Torstensson; [2023]
    Keywords : Ground Source Heat Pump; Photovoltaic Thermal Collectors; Borehole Thermal Energy Storage; Free Cooling.; Bergvärmepumpssystem; Termiska Solceller; Borrhålsbaserade Termiska Energilager; Frikyla.;

    Abstract : In order to reduce emissions from the building sector, which stands for than a fifth of the global energy consumption today, efficient and fossil free heating and cooling systems are of importance. This study investigates the combination of solar photovoltaic thermal collectors and ground source heat pump systems in order to regenerate energy to the ground in combination with free cooling. READ MORE

  2. 2. Second Life Applications for Degraded EV Batteries : Evaluating Benefits Basedon Remaining Useful Life and Battery Configurations

    University essay from Linköpings universitet/Fordonssystem

    Author : Sandberg Elis; [2023]
    Keywords : ;

    Abstract : This thesis explores the potential of second-life electric vehicle batteries, which are no longer suitable for electro-mobility, to provide energy storage solutions. The study iden- tifies two potential applications for second-life batteries: charging stations and residential PV energy storage systems. READ MORE

  3. 3. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  4. 4. Capturing the XR Market: Examining Strategies to Reach the Broader Market - An exploratory study of commercialization of XR enabled by 5G

    University essay from Lunds universitet/Produktionsekonomi

    Author : Terese Hilmersson; Ebba Lindström; [2023]
    Keywords : XR technologies; HMD; B2C commercialization; value capturing; revenue models; ecosystem mapping; adoption network; high- tech innovations; Technology and Engineering;

    Abstract : Living to some extent in a partly or fully virtual reality is a scenario that may not be as far in the future as many may think, and the development of technologies that enable this is fully underway. This thesis investigates the commercialization of extended reality (XR) technologies in the consumer market and what may facilitate and hinder this commercialization. READ MORE

  5. 5. Identification of restoration hotspots in landscape-scale green infrastructure planning based on model-predicted connectivity forest

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Xiaoming Wang; [2023]
    Keywords : boreal forest; conservation; restoration; connectivity; green infrastructure; GIS; Sweden; Earth and Environmental Sciences;

    Abstract : Boreal forest landscapes have undergone severe anthropogenic fragmentation and their enormous values concerning, e.g., ecosystem service, biodiversity and culture are hazarded. READ MORE