951 research outputs found

    Assessment of a Decision-Making Model for Monitoring the Success of a Project for Smart Buildings

    Get PDF
    Objective: To express the usage of intelligent concepts in the architectural building construction field that are primarily concerned with reducing building energy use. Improved energy-saving methods and the use of environmentally friendly design principles are essential in this field. This type of managerial decision-making is necessary for the success of these types of projects. Methods: monitoring the performance of intelligent buildings use the cost variance (CV) and schedule variation as standard metrics to track the progress of a project based on the save energy concept. Also, this research conducted a comparative study on Building Information Modelling (BIM) and (MCDM) decision-making limitations as presented in the article. Analysis: the conventional technique, on the other hand, is unable to offer data on variance from typical performance levels. The main point based on Delphi results of construction cost variables has been observed 19 effective factors. Finding and Novelty: The RII observed that the most effective aspects of an intelligent building are the number of floors in the building, the kind of structural design, and the size of the shadow cast on the surface of the building. The Multi-Criteria Decision Maker (MCDM) observed significant differences in planned value (PV) and actual value (AC) results. In addition, as a result of the current approach, it is possible to track project costs and timelines more precisely. Doi: 10.28991/CEJ-2023-09-01-010 Full Text: PD

    Decision Support System to Select the Most Effective Strategies for Mitigating the Urban Heat Island Effect Using Sustainability and Resilience Performance Measures

    Get PDF
    As climate change continues to alter the temperature of the cities, various urban heat island mitigation strategies (UHIMSs) are now needed to be employed to mitigate the effects of increasing temperatures. However, to ensure their resilience and sustainability, the effectiveness of such strategies should be evaluated using a set of criteria. According to a review of the literature, there is a need for a comprehensive model and performance assessment tool that considers the various characteristics and features that are significant in assessing whether the chosen strategies are viable candidates for minimizing the effects of urban heat island (UHI). As a result, the primary purpose of this study is to develop a decision support system (DSS) to assist decision-makers in reducing the effects of the UHI by allowing them to choose the most viable mitigation method/technique based on resiliency and sustainability concerns. The DSS would function as a performance measure selecting tool in form of a quick-selection-guide-sheet of most effective method(s)/technique(s). Therefore, this study has identified, categorized, and organized affecting parameters in a comprehensive hierarchical framework based on sustainability and resilience. The system starts by creating a list of objectives (sustainability andresilience), criteria (economic, environmental, social, vulnerability, and resistance to change), attributes, and the most used mitigation methods for the UHI effect. The system\u27s second component is the main engine (using the Weighted Scoring method (WSM)), which is responsible for determining the best mitigation strategies - the system\u27s predefined goal. The WSM is being used in this study to develop matrices to do a pairwise comparison of criteria, assign a relative weight to each criterion, score each strategy against each criterion, and calculate the weighted scores based on gathered data from experts elicitation exercises. Decision-makers can analyze the UHIMSs after the matrix has been set up with weighted scores to find the best method that fits their needs (system objective). The third key component is the user-friendly interface, which combines the previous two components of the system and applies spreadsheets to present the best feasible mitigation strategy. The contribution this study seeks is to develop a DSS resembling a knowledge-sharing platform to support stakeholders like urban planners, architects, decision-makers, and policymakers in the extraction of UHIMSs, and in a wide scope, the expected benefit would be more sustainable more resilient design. In addition, this study serves as a foundation for the establishment of a dynamic computer-based decision support system (DSS) for selecting the most efficient UHIMSs

    Method of Selecting and Sizing HVAC Systems for the Architectural Profession

    Get PDF
    This study is concerned with developing a method of selecting and sizing HVAC systems during the early phases of the architectural design process. The method is in the form of a design tool usuable by architects for early design decisions. The process involves using inital design program data to arrive at possible HVAC systems that may be incorporated into an architectural project. The approximate space allocations for HVAC equipment can then be derived from such selections as well as the magnitude of the heating and cooling loads. A discussion of the architectural design process is included in order to gain an understanding of how this design tool may be applied. Two diverse architectural project types are used to exemplify which is included in Appendix C of this thesis.Architectural Engineerin

    Reconfigurability in space systems : architecting framework and case studies

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Aeronautics and Astronautics, 2006.Includes bibliographical references (p. 247-257).Reconfigurability in engineered systems is of increasing interest particularly in Aerospace Systems since it allows for resource efficiency, evolvability, and enhanced survivability. Although it is often regarded as a desirable quality for a system, it has traditionally been difficult to quantitatively analyze its effects on various system properties in the early design stage. In order to allow for gaining an in-depth understanding of the various aspects of reconfigurability and its relationship with a system's architecture, a framework encompassing a set of definitions, metrics, and methods has been proposed. Two different modeling schemes, based on Markov models and controls theory, are first developed to show how the states and time aspects of reconfigurable systems can be naturally modeled and studied. An analytical model for quantifying the effect of reconfigurability on mission logistics, specifically spare parts demands, is formulated and it is shown through one specific example that reconfigurable parts can allow for 33-50% mass reduction. The system availability, however, becomes very sensitive to the reliability of the parts. Two case studies are then used for detailed illustration of the application of the developed framework.(cont.) In the first case study, the effect of reconfigurability on a fleet of planetary surface vehicles for a surface exploration mission are analyzed. It is found that a fleet of reconfigurable vehicles can allow for a mass savings of up to 27% and their expected transport capability degradation is almost three times lower as compared to a fleet of non-reconfigurable vehicles. In the second case-study, the reconfiguration of low earth-orbit communication satellite constellations is considered for evolving to higher capacity levels. It is found that reconfiguring a previously deployed constellation can be a viable option only for certain capacity levels and multi-payload launch capability scenarios. In addition to the high level 'ility' perspectives, a lower level design assessment is also carried out through a survey of 33 representative reconfigurable systems. It is found that on average, for commercial items the cost of reconfigurability is 35%, and the average useful state occupancy time is always at least 10 times the reconfiguration time of the system. Based on the illustrative results of the case studies, and generalization of empirical data, a few principles and guidelines for design for reconfigurability are proposed.by Afreen Siddiqi.Ph.D

    An informatics based approach to respiratory healthcare.

    Get PDF
    By 2005 one person in every five UK households suffered with asthma. Research has shown that episodes of poor air quality can have a negative effect on respiratory health and is a growing concern for the asthmatic. To better inform clinical staff and patients to the contribution of poor air quality on patient health, this thesis defines an IT architecture that can be used by systems to identify environmental predictors leading to a decline in respiratory health of an individual patient. Personal environmental predictors of asthma exacerbation are identified by validating the delay between environmental predictors and decline in respiratory health. The concept is demonstrated using prototype software, and indicates that the analytical methods provide a mechanism to produce an early warning of impending asthma exacerbation due to poor air quality. The author has introduced the term enviromedics to describe this new field of research. Pattern recognition techniques are used to analyse patient-specific environments, and extract meaningful health predictors from the large quantities of data involved (often in the region of '/o million data points). This research proposes a suitable architecture that defines processes and techniques that enable the validation of patient-specific environmental predictors of respiratory decline. The design of the architecture was validated by implementing prototype applications that demonstrate, through hospital admissions data and personal lung function monitoring, that air quality can be used as a predictor of patient-specific health. The refined techniques developed during the research (such as Feature Detection Analysis) were also validated by the application prototypes. This thesis makes several contributions to knowledge, including: the process architecture; Feature Detection Analysis (FDA) that automates the detection of trend reversals within time series data; validation of the delay characteristic using a Self-organising Map (SOM) that is used as an unsupervised method of pattern recognition; Frequency, Boundary and Cluster Analysis (FBCA), an additional technique developed by this research to refine the SOM

    Alternative energy design toolkit

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2004.Includes bibliographical references (p. 122-127).This thesis concerns the concepts, structure, and applications of the Alternative Energy Design Toolkit. The toolkit is aimed to provide a widely accessible, easy to use, flexible, yet powerful modeling environment for assisting design associated with renewable energy technologies. Exchanges of ideas and knowledge among the users are also highly encouraged and facilitated. The toolkit is composed of three important components: a collection of models that are fundamentals of renewable energy design, a modeling environment called DOME, which is used as the toolkit's enabler, and a supporting Web site. At the beginning, a comprehensive survey of existing tools for renewable energy design is presented. Then, the detailed descriptions and key capabilities of the toolkit's components are provided. In addition, a collection of solar energy models, which is the initial set of models in the toolkit, is also presented. The toolkit is utilized in two design scenarios: a design of a stand-alone PV system, and a trade-off analysis of a hybrid PV-diesel electricity system. In both design scenarios, the models in the toolkit are proven to be useful and convenient resources. The processes of making the representations of the systems are straight-forward, and the analysis mechanisms that the toolkit provides make the design process simple yet effective.by Sittha Sukkasi.S.M

    Vertical Greening Systems by Integrated Design Approach in Residential Buildings Towards mitigating Urban Heat Island effect the case study of Tehran, Iran

    Get PDF
    As urbanization grows, the results become more visible. Heat islands are formed due to the loss of green spaces and the consequent disruptive effects of climate change, especially in densely populated urban areas. These phenomena threaten and endanger human health. One solution to compensate for the scarcity of urban green space today is to construct urban green space within the house's walls to provide a suitable and desirable space. Vertical greening systems have recently been recognized and tested by scholars as one of the most effective methods for reducing the harmful impact of heating on the environment. Due to the beauty of this solution, it has also been considered by architectural designers, and today we are witnessing a growing trend of green-covered buildings. In this regard, the number of manufacturing companies is expanding and considering that this solution is in its first steps of growth and there is a need for further study. So, the standard process makes it more functional. This research aims to study the actual process and design of green walls. As a result, at the outset of the journey, the market's current and usable systems should be defined and segmented, followed by analyzing the design and manufacturing process's strengths and limitations. Then, by examining the divisions produced among scientists and companies, the final classification has been presented and analyzed in this study in order to standardize the production process. It should be remembered that businesses from various European, Asian, Australian, and American countries were surveyed to ensure that gaps existed. Based on the current system's flaws, a new Vertical Greening Integrated Approach (VGIS) approach was introduced to make it more popular, economical, and functional. Developing countries like Iran have a significant share in increasing the earth's temperature. However, because of the high price of this nature-based, it is less welcomed and used more as a decorative component in luxury buildings. Therefore, Tehran's study sample, one of the leading centers of pollution and population density and buildings, has been selected. Finally, based on the new approach, the selected green wall simulated on residential building in Tehran. Results show that this strategy's effectiveness was to lower the surface temperature by direct green facade about 10.95 °C and via felt-based living wall 13.95°C

    Systematic Characterization of Power Side Channel Attacks for Residual and Added Vulnerabilities

    Get PDF
    Power Side Channel Attacks have continued to be a major threat to cryptographic devices. Hence, it will be useful for designers of cryptographic systems to systematically identify which type of power Side Channel Attacks their designs remain vulnerable to after implementation. It’s also useful to determine which additional vulnerabilities they have exposed their devices to, after the implementation of a countermeasure or a feature. The goal of this research is to develop a characterization of power side channel attacks on different encryption algorithms\u27 implementations to create metrics and methods to evaluate their residual vulnerabilities and added vulnerabilities. This research studies the characteristics that influence the power side leakage, classifies them, and identifies both the residual vulnerabilities and the added vulnerabilities. Residual vulnerabilities are defined as the traits that leave the implementation of the algorithm still vulnerable to power Side Channel Attacks (SCA), sometimes despite the attempt at implementing countermeasures by the designers. Added vulnerabilities to power SCA are defined as vulnerabilities created or enhanced by the algorithm implementations and/or modifications. The three buckets in which we categorize the encryption algorithm implementations are: i. Countermeasures against power side channel attacks, ii. IC power delivery network impact to power leakage (including voltage regulators), iii. Lightweight ciphers and applications for the Internet of Things (IoT ) From the characterization of masking countermeasures, an example outcome developed is that masking schemes, when uniformly distributed random masks are used, are still vulnerable to collision power attacks. Another example outcome derived is that masked AES, when glitches occur, is still vulnerable to Differential Power Analysis (DPA). We have developed a characterization of power side-channel attacks on the hardware implementations of different symmetric encryption algorithms to provide a detailed analysis of the effectiveness of state-of-the-art countermeasures against local and remote power side-channel attacks. The characterization is accomplished by studying the attributes that influence power side-channel leaks, classifying them, and identifying both residual vulnerabilities and added vulnerabilities. The evaluated countermeasures include masking, hiding, and power delivery network scrambling. But, vulnerability to DPA depends largely on the quality of the leaked power, which is impacted by the characteristics of the device power delivery network. Countermeasures and deterrents to power side-channel attacks targeting the alteration or scrambling of the power delivery network have been shown to be effective against local attacks where the malicious agent has physical access to the target system. However, remote attacks that capture the leaked information from within the IC power grid are shown herein to be nonetheless effective at uncovering the secret key in the presence of these countermeasures/deterrents. Theoretical studies and experimental analysis are carried out to define and quantify the impact of integrated voltage regulators, voltage noise injection, and integration of on-package decoupling capacitors for both remote and local attacks. An outcome yielded by the studies is that the use of an integrated voltage regulator as a countermeasure is effective for a local attack. However, remote attacks are still effective and hence break the integrated voltage regulator countermeasure. From experimental analysis, it is observed that within the range of designs\u27 practical values, the adoption of on-package decoupling capacitors provides only a 1.3x increase in the minimum number of traces required to discover the secret key. However, the injection of noise in the IC power delivery network yields a 37x increase in the minimum number of traces to discover. Thus, increasing the number of on-package decoupling capacitors or the impedance between the local probing site and the IC power grid should not be relied on as countermeasures to power side-channel attacks, for remote attack schemes. Noise injection should be considered as it is more effective at scrambling the leaked signal to eliminate sensitive identifying information. However, the analysis and experiments carried out herein are applied to regular symmetric ciphers which are not suitable for protecting Internet of Things (IoT) devices. The protection of communications between IoT devices is of great concern because the information exchanged contains vital sensitive data. Malicious agents seek to exploit those data to extract secret information about the owners or the system. Power side channel attacks are of great concern on these devices because their power consumption unintentionally leaks information correlatable to the device\u27s secret data. Several studies have demonstrated the effectiveness of authenticated encryption with advanced data (AEAD), in protecting communications with these devices. In this research, we have proposed a comprehensive evaluation of the ten algorithm finalists of the National Institute of Standards and Technology (NIST) IoT lightweight cipher competition. The study shows that, nonetheless, some still present some residual vulnerabilities to power side channel attacks (SCA). For five ciphers, we propose an attack methodology as well as the leakage function needed to perform correlation power analysis (CPA). We assert that Ascon, Sparkle, and PHOTON-Beetle security vulnerability can generally be assessed with the security assumptions Chosen ciphertext attack and leakage in encryption only, with nonce-misuse resilience adversary (CCAmL1) and Chosen ciphertext attack and leakage in encryption only with nonce-respecting adversary (CCAL1) , respectively. However, the security vulnerability of GIFT-COFB, Grain, Romulus, and TinyJambu can be evaluated more straightforwardly with publicly available leakage models and solvers. They can also be assessed simply by increasing the number of traces collected to launch the attack

    The 45th Australasian Universities Building Education Association Conference: Global Challenges in a Disrupted World: Smart, Sustainable and Resilient Approaches in the Built Environment, Conference Proceedings, 23 - 25 November 2022, Western Sydney University, Kingswood Campus, Sydney, Australia

    Get PDF
    This is the proceedings of the 45th Australasian Universities Building Education Association (AUBEA) conference which will be hosted by Western Sydney University in November 2022. The conference is organised by the School of Engineering, Design, and Built Environment in collaboration with the Centre for Smart Modern Construction, Western Sydney University. This year’s conference theme is “Global Challenges in a Disrupted World: Smart, Sustainable and Resilient Approaches in the Built Environment”, and expects to publish over a hundred double-blind peer review papers under the proceedings
    • …
    corecore