Essays about: "negative information technology"

Showing result 26 - 30 of 337 essays containing the words negative information technology.

  1. 26. Mitigating SSCI in a hybrid wind and PV farm utilizing PV-STATCOM : A Swedish case study

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Isabelle Löfgren; [2022]
    Keywords : impedance analysis; PV-STATCOM; SSCI; SSO; SSR; sub-synchronous control interaction;

    Abstract : The share of electricity generation in the power system being based on power electronics is increasing, which will impact the system in different ways, such as an increased risk for undesired interactions. An example is doubly fed induction generator (DFIG) based windfarms which have been shown to present negative resistance in (parts of) the sub-synchronous range (i. READ MORE

  2. 27. Digital communication in the sales process : The influence of digital communication and the rationale behind using it

    University essay from Umeå universitet/Företagsekonomi

    Author : Niklas Hanssen; Johan Sundström; [2022]
    Keywords : Digital communication: Sales process: Digital communication influence;

    Abstract : Digital communication has shifted the way that communication takes place for many companies. The amount of technological communication platforms and tools available are high and are also still increasing which also entails that many companies have several ways to communicate available. READ MORE

  3. 28. In-Vehicle Information Systems : A Study on the Interaction between Driver and Automotive Head-Up Display System

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Shishengxiong Zhong; [2022]
    Keywords : In-Vehicle Information Systems; Automotive Head-Up Display System; Human-Computer Interaction; Augmented Reality; Interaction; Information; Safety; Focused-Ethnographic Research.;

    Abstract : Head-up display (HUD) systems are systems that present data on a transparent display without requiring the user of the system to look away from their viewpoints. Although, HUD systems are not a new technology, as they have been initially developed in 1950s for military aircrafts, the last decade are also used in the automotive industry. READ MORE

  4. 29. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  5. 30. Discovering the Project Manager Identity : Construct Versus Acquisition

    University essay from Karlstads universitet/Handelshögskolan (from 2013)

    Author : PETER MOUYIASIS; [2022]
    Keywords : Project Manager Identity; peak performance; endless curiosity; psychological shield; Projektledare; identitet; induktion; topprestation; oändlig nyfikenhet; psykologisk sköld;

    Abstract : Aim and Background: This study aims to explore and answer how the Project Manager Identity is constructed and/or acquired from a social science, behavioristic perspective. On this account eleven project manager professionals and scholars have been selected to participate, due to their rich experience in the field and their highly exciting profiles as to share insights and knowledge. READ MORE