5,503 research outputs found

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Proceedings of the 10th International congress on architectural technology (ICAT 2024): architectural technology transformation.

    Get PDF
    The profession of architectural technology is influential in the transformation of the built environment regionally, nationally, and internationally. The congress provides a platform for industry, educators, researchers, and the next generation of built environment students and professionals to showcase where their influence is transforming the built environment through novel ideas, businesses, leadership, innovation, digital transformation, research and development, and sustainable forward-thinking technological and construction assembly design

    Digitalization and Development

    Get PDF
    This book examines the diffusion of digitalization and Industry 4.0 technologies in Malaysia by focusing on the ecosystem critical for its expansion. The chapters examine the digital proliferation in major sectors of agriculture, manufacturing, e-commerce and services, as well as the intermediary organizations essential for the orderly performance of socioeconomic agents. The book incisively reviews policy instruments critical for the effective and orderly development of the embedding organizations, and the regulatory framework needed to quicken the appropriation of socioeconomic synergies from digitalization and Industry 4.0 technologies. It highlights the importance of collaboration between government, academic and industry partners, as well as makes key recommendations on how to encourage adoption of IR4.0 technologies in the short- and long-term. This book bridges the concepts and applications of digitalization and Industry 4.0 and will be a must-read for policy makers seeking to quicken the adoption of its technologies

    Beam scanning by liquid-crystal biasing in a modified SIW structure

    Get PDF
    A fixed-frequency beam-scanning 1D antenna based on Liquid Crystals (LCs) is designed for application in 2D scanning with lateral alignment. The 2D array environment imposes full decoupling of adjacent 1D antennas, which often conflicts with the LC requirement of DC biasing: the proposed design accommodates both. The LC medium is placed inside a Substrate Integrated Waveguide (SIW) modified to work as a Groove Gap Waveguide, with radiating slots etched on the upper broad wall, that radiates as a Leaky-Wave Antenna (LWA). This allows effective application of the DC bias voltage needed for tuning the LCs. At the same time, the RF field remains laterally confined, enabling the possibility to lay several antennas in parallel and achieve 2D beam scanning. The design is validated by simulation employing the actual properties of a commercial LC medium

    Machine learning and mixed reality for smart aviation: applications and challenges

    Get PDF
    The aviation industry is a dynamic and ever-evolving sector. As technology advances and becomes more sophisticated, the aviation industry must keep up with the changing trends. While some airlines have made investments in machine learning and mixed reality technologies, the vast majority of regional airlines continue to rely on inefficient strategies and lack digital applications. This paper investigates the state-of-the-art applications that integrate machine learning and mixed reality into the aviation industry. Smart aerospace engineering design, manufacturing, testing, and services are being explored to increase operator productivity. Autonomous systems, self-service systems, and data visualization systems are being researched to enhance passenger experience. This paper investigate safety, environmental, technological, cost, security, capacity, and regulatory challenges of smart aviation, as well as potential solutions to ensure future quality, reliability, and efficiency

    Emerging Power Electronics Technologies for Sustainable Energy Conversion

    Get PDF
    This Special Issue summarizes, in a single reference, timely emerging topics related to power electronics for sustainable energy conversion. Furthermore, at the same time, it provides the reader with valuable information related to open research opportunity niches

    Digital twins in the construction industry: a comprehensive review of current implementations, enabling technologies, and future directions

    Get PDF
    This paper presents a comprehensive understanding of current digital twin (DT) implementations in the construction industry, along with providing an overview of technologies enabling the operation of DTs in the industry. To this end, 145 publications were identified using a systematic literature review. The results revealed eight key areas of DT implementation including (i) virtual design, (ii) project planning and management, (iii) asset management and maintenance, (iv) safety management, (v) energy efficiency and sustainability, (vi) quality control and management, (vii) supply chain management and logistics, and (viii) structural health monitoring. The findings demonstrate that DT technology has the capacity to revolutionise the construction industry across these areas, enabling optimised designs, improved collaboration, real-time monitoring, predictive maintenance, enhanced safety practices, energy performance optimisation, quality inspections, efficient supply chain management, and proactive maintenance. This study also identified several challenges that hinder the widespread implementation of DT in construction, including (i) data integration and interoperability, (ii) data accuracy and completeness, (iii) scalability and complexity, (iv) privacy and security, and (v) standards and governance. To address these challenges, this paper recommends prioritising standardised data formats, protocols, and APIs for seamless collaboration, exploring semantic data modelling and ontologies for data integration, implementing validation processes and robust data governance for accuracy and completeness, harnessing high-performance computing and advanced modelling techniques for scalability and complexity, establishing comprehensive data protection and access controls for privacy and security, and developing widely accepted standards and governance frameworks with industry-wide collaboration. By addressing these challenges, the construction industry can unlock the full potential of DT technology, thus enhancing safety, reliability, and efficiency in construction projects

    Quantum coherent manipulation of spin information in molecular nanomagnets

    Get PDF
    Los sistemas cuánticos de dos niveles basados en estados de espín, conocidos como ``qubits de espín'', son bloques prometedores para el desarrollo de tecnologías cuánticas. Entre las distintas plataformas físicas, los qubits de espín definidos en imanes de molécula única (SMM) son candidatos prometedores porque su estructura electrónica puede ajustarse fácilmente mediante ingeniería química (es decir, el Hamiltoniano de espín molecular puede modificarse con facilidad). Sin embargo, los qubits moleculares de espín generados en SMM se enfrentan a varios retos: coherencia cuántica frágil, control coherente insuficiente de los estados de espín y generación de entrelazamiento entre los qubits de espín para aplicaciones de procesamiento de información cuántica. Para abordar estos retos y lograr la manipulación coherente de la información de espín, necesitamos comprender la relación entre los estados de espín, los movimientos moleculares (vibraciones o fonones) y la polarización de la carga (por ejemplo, la generada por un campo E externo). La presente Tesis explora la relación entre los estados de espín, las vibraciones y la polarización desde una perspectiva teórica. Inicialmente, estudiamos la interacción entre los estados de espín y las vibraciones (acoplamiento vibrónico) como una fuente importante de disipación de información de espín. En particular, se emplea un modelado detallado de los acoplamientos vibrónicos, apoyado por pruebas experimentales, para descifrar las vías de decoherencia en diferentes SMM. Nuestros resultados revelan que sólo algunas distorsiones moleculares asociadas a determinados modos vibracionales son capaces de acoplarse fuertemente a grados de libertad de espín y, por tanto, promover la decoherencia. Además, también identificamos que los espectros dispersos entre los estados de espín y fonón son cruciales para preservar las superposiciones cuánticas durante más tiempo. En segundo lugar, presentamos un estudio exhaustivo del control coherente de los estados de espín mediante campos eléctricos en un sistema qubit molecular que presenta transiciones de reloj (HoW10). Este control coherente se modela evaluando el acoplamiento espín-eléctrico (SEC); es decir, encontrando una relación entre los estados de espín, la polarización de la carga y las distorsiones moleculares. El fuerte SEC observado en HoW10 es suficiente para permitir el direccionamiento selectivo de los espines mediante un campo E local a nivel práctico. Por último, exploramos la posibilidad de construir una puerta de entrelazamiento de dos qubits en un par de dos reloj-qubit acoplados dipolarmente (HoW10--HoW10), donde el campo eléctrico se utiliza para controlar localmente los estados de los qubits. El trabajo presentado en esta Tesis avanza en la comprensión de los qubits de espín moleculares para su potencial aplicación en el procesamiento cuántico de la información.Quantum two-level systems based on spin states known as ``spin-qubits’’ are promising building blocks for the development of quantum technologies. Among different physical platforms, spin-qubits defined in single-molecule-magnets (SMMs) are promising candidates because their electronic structure can be easily tuned by chemical engineering (i.e., the molecular spin Hamiltonian can be easily modified). However, molecular spin qubits generated in SMMs faces several challenges: fragile quantum coherence, insufficient coherent control over spin states and generation of entanglement between the spin-qubits for quantum information processing applications. To address these challenges and achieve the coherent manipulation of spin information, we need to understand the relationship between spin states, molecular motions (vibrations or phonons) and charge polarization (e.g., that generated by an external E-field). The current Thesis explores the relationship between spin states, vibrations and polarization from a theoretical perspective. Initially, we study the interaction between spin states and vibrations (vibronic coupling) as an important source of spin information dissipation. In particular, a detailed modelling of vibronic couplings, supported by experimental evidence, is employed to decipher the decoherence pathways in different SMMs. Our outcomes reveal that only some molecular distortions associated to certain vibrational modes are able to strongly couple to spin degrees of freedom and, thus, promoting decoherence. Additionally, we also identified that sparse spectra between spin and phonon states are crucial to preserve quantum superpositions longer times. Secondly, we present a comprehensive study of coherent control over spin states using electrical fields in a molecular qubit system that exhibits clock transitions (HoW10). This coherent control is modelled by evaluating the spin-electric coupling (SEC); that is, finding a relation between spin states, charge polarization, and molecular distortions. The strong SEC observed in HoW10 is sufficient to allow selective addressing of the spins using a local E-field at practical level. Finally, we explore the possibility of constructing two-qubit entanglement gate in a pair of two dipolar-coupled clock-qubit (HoW10--HoW10), where electrical field is used to locally control the qubit states. The work presented in this Thesis advances the understanding of molecular spin qubits for their potential application in quantum information processing

    Adaptation of the human nervous system for self-aware secure mobile and IoT systems

    Get PDF
    IT systems have been deployed across several domains, such as hospitals and industries, for the management of information and operations. These systems will soon be ubiquitous in every field due to the transition towards the Internet of Things (IoT). The IoT brings devices with sensory functions into IT systems through the process of internetworking. The sensory functions of IoT enable them to generate and process information automatically, either without human contribution or having the least human interaction possible aside from the information and operations management tasks. Security is crucial as it prevents system exploitation. Security has been employed after system implementation, and has rarely been considered as a part of the system. In this dissertation, a novel solution based on a biological approach is presented to embed security as an inalienable part of the system. The proposed solution, in the form of a prototype of the system, is based on the functions of the human nervous system (HNS) in protecting its host from the impacts caused by external or internal changes. The contributions of this work are the derivation of a new system architecture from HNS functionalities and experiments that prove the implementation feasibility and efficiency of the proposed HNS-based architecture through prototype development and evaluation. The first contribution of this work is the adaptation of human nervous system functions to propose a new architecture for IT systems security. The major organs and functions of the HNS are investigated and critical areas are identified for the adaptation process. Several individual system components with similar functions to the HNS are created and grouped to form individual subsystems. The relationship between these components is established in a similar way as in the HNS, resulting in a new system architecture that includes security as a core component. The adapted HNS-based system architecture is employed in two the experiments prove its implementation capability, enhancement of security, and overall system operations. The second contribution is the implementation of the proposed HNS-based security solution in the IoT test-bed. A temperature-monitoring application with an intrusion detection system (IDS) based on the proposed HNS architecture is implemented as part of the test-bed experiment. Contiki OS is used for implementation, and the 6LoWPAN stack is modified during the development process. The application, together with the IDS, has a brain subsystem (BrSS), a spinal cord subsystem (SCSS), and other functions similar to the HNS whose names are changed. The HNS functions are shared between an edge router and resource-constrained devices (RCDs) during implementation. The experiment is evaluated in both test-bed and simulation environments. Zolertia Z1 nodes are used to form a 6LoWPAN network, and an edge router is created by combining Pandaboard and Z1 node for a test-bed setup. Two networks with different numbers of sensor nodes are used as simulation environments in the Cooja simulator. The third contribution of this dissertation is the implementation of the proposed HNS-based architecture in the mobile platform. In this phase, the Android operating system (OS) is selected for experimentation, and the proposed HNS-based architecture is specifically tailored for Android. A context-based dynamically reconfigurable access control system (CoDRA) is developed based on the principles of the refined HNS architecture. CoDRA is implemented through customization of Android OS and evaluated under real-time usage conditions in test-bed environments. During the evaluation, the implemented prototype mimicked the nature of the HNS in securing the application under threat with negligible resource requirements and solved the problems in existing approaches by embedding security within the system. Furthermore, the results of the experiments highlighted the retention of HNS functions after refinement for different IT application areas, especially the IoT, due to its resource-constrained nature, and the implementable capability of our proposed HNS architecture.--- IT-järjestelmiä hyödynnetään tiedon ja toimintojen hallinnassa useilla aloilla, kuten sairaaloissa ja teollisuudessa. Siirtyminen kohti esineiden Internetiä (Internet of Things, IoT) tuo tällaiset laitteet yhä kiinteämmäksi osaksi jokapäiväistä elämää. IT-järjestelmiin liitettyjen IoT-laitteiden sensoritoiminnot mahdollistavat tiedon automaattisen havainnoinnin ja käsittelyn osana suurempaa järjestelmää jopa täysin ilman ihmisen myötävaikutusta, poislukien mahdolliset ylläpito- ja hallintatoimenpiteet. Turvallisuus on ratkaisevan tärkeää IT-järjestelmien luvattoman käytön estämiseksi. Valitettavan usein järjestelmäsuunnittelussa turvallisuus ei ole osana ydinsuunnitteluprosessia, vaan otetaan huomioon vasta käyttöönoton jälkeen. Tässä väitöskirjassa esitellään uudenlainen biologiseen lähestymistapaan perustuva ratkaisu, jolla turvallisuus voidaan sisällyttää erottamattomaksi osaksi järjestelmää. Ehdotettu prototyyppiratkaisu perustuu ihmisen hermoston toimintaan tilanteessa, jossa se suojelee isäntäänsä ulkoisten tai sisäisten muutosten vaikutuksilta. Tämän työn keskeiset tulokset ovat uuden järjestelmäarkkitehtuurin johtaminen ihmisen hermoston toimintaperiaatteesta sekä tällaisen järjestelmän toteutettavuuden ja tehokkuuden arviointi kokeellisen prototyypin kehittämisen ja toiminnan arvioinnin avulla. Tämän väitöskirjan ensimmäinen kontribuutio on ihmisen hermoston toimintoihin perustuva IT-järjestelmäarkkitehtuuri. Tutkimuksessa arvioidaan ihmisen hermoston toimintaa ja tunnistetaan keskeiset toiminnot ja toiminnallisuudet, jotka mall-innetaan osaksi kehitettävää järjestelmää luomalla näitä vastaavat järjestelmäkomponentit. Nä-istä kootaan toiminnallisuudeltaan hermostoa vastaavat osajärjestelmät, joiden keskinäinen toiminta mallintaa ihmisen hermoston toimintaa. Näin luodaan arkkitehtuuri, jonka keskeisenä komponenttina on turvallisuus. Tämän pohjalta toteutetaan kaksi prototyyppijärjestelmää, joiden avulla arvioidaan arkkitehtuurin toteutuskelpoisuutta, turvallisuutta sekä toimintakykyä. Toinen kontribuutio on esitetyn hermostopohjaisen turvallisuusratkaisun toteuttaminen IoT-testialustalla. Kehitettyyn arkkitehtuuriin perustuva ja tunkeutumisen estojärjestelmän (intrusion detection system, IDS) sisältävä lämpötilan seurantasovellus toteutetaan käyttäen Contiki OS -käytöjärjestelmää. 6LoWPAN protokollapinoa muokataan tarpeen mukaan kehitysprosessin aikana. IDS:n lisäksi sovellukseen kuuluu aivo-osajärjestelmä (Brain subsystem, BrSS), selkäydinosajärjestelmä (Spinal cord subsystem, SCSS), sekä muita hermoston kaltaisia toimintoja. Nämä toiminnot jaetaan reunareitittimen ja resurssirajoitteisten laitteiden kesken. Tuloksia arvioidaan sekä simulaatioiden että testialustan tulosten perusteella. Testialustaa varten 6LoWPAN verkon toteutukseen valittiin Zolertia Z1 ja reunareititin on toteutettu Pandaboardin ja Z1:n yhdistelmällä. Cooja-simulaattorissa käytettiin mallinnukseen ymp-äristönä kahta erillistä ja erikokoisuta sensoriverkkoa. Kolmas tämän väitöskirjan kontribuutio on kehitetyn hermostopohjaisen arkkitehtuurin toteuttaminen mobiilialustassa. Toteutuksen alustaksi valitaan Android-käyttöjärjestelmä, ja kehitetty arkkitehtuuri räätälöidään Androidille. Tuloksena on kontekstipohjainen dynaamisesti uudelleen konfiguroitava pääsynvalvontajärjestelmä (context-based dynamically reconfigurable access control system, CoDRA). CoDRA toteutetaan mukauttamalla Androidin käyttöjärjestelmää ja toteutuksen toimivuutta arvioidaan reaaliaikaisissa käyttöolosuhteissa testialustaympäristöissä. Toteutusta arvioitaessa havaittiin, että kehitetty prototyyppi jäljitteli ihmishermoston toimintaa kohdesovelluksen suojaamisessa, suoriutui tehtävästään vähäisillä resurssivaatimuksilla ja onnistui sisällyttämään turvallisuuden järjestelmän ydintoimintoihin. Tulokset osoittivat, että tämän tyyppinen järjestelmä on toteutettavissa sekä sen, että järjestelmän hermostonkaltainen toiminnallisuus säilyy siirryttäessä sovellusalueelta toiselle, erityisesti resursseiltaan rajoittuneissa IoT-järjestelmissä
    corecore