557 research outputs found

    Technology Trends and Opportunities for Construction Industry and Lifecycle Management

    Get PDF
    Master's thesis in for Offshore Technology: Industrial Asset ManagementThe purpose of the report is to highlight methods that can make it easier for the construction industry and industry in general to benefit from new technology. The report is intended as a reference to technological solutions that along with some techniques, can streamline workflow for multiple tasks in planning, design, and operation and maintenance management. The problems focused on is how to: • Simplify the procurement and tracing of documentation • Optimize building stages, design, and Life Cycle Management (LCM) • Provide interactions between disciplines and employees using different software Scientific Platform are based on literature within technology trends. Some history and trends in digital technology are presented. Definition of roles and general terms related to documentation is derived from Norsk Standard and is interpreted on this basis. The report charts the use of individual software and technical setup of digital tools within CAD-engineering (Computer Aided Design), HDS-technology (High Definition Surveying), and gaming technology. This technology combined with cloud-services to support planning, design and management of building stages. Later to support LCM of facilities and businesses' ERP-systems (Enterprise Resource Planning). Use of Robotic Process Automation (RPA) and Artificial Intelligence (AI), for document control tasks. The result of the report is that several suppliers provide services and products accessible through web. Setup and implementation will require some work and knowledge for business and organizations, but the gain largely seems to justify the use of resources for this purpose. Particularly through IOT-interactions (Internet of Things), cloud-services and free downloadable applications that may be considered as a paradigm shift related to the issues in the report. Also, presenting new platforms for engineering phases to support Building Information Modeling processes (BIM). With the use of Algorithmic Editors for encoding between computer programs without the need of data programmer expertise. To streamline workflows, reduce recreation of data, interactions between different software of various user level, and support of AI to optimize designing by adds-on for CAD-engineering (Computer Aided Design). Mobile devices like phones and tablets to support several of solutions and products presented is very accessible. It seems naturally to assume that the vast majority of people are familiar with technology related to smartphone applications for daily use. The use of resources for implementing the presented solutions have not been considered in this report. Some of the equipment presented can be interpreted as relatively expensive. Investment analysis would be sensible. The trend however, shows continues price drops and increased availability. At the same time as the user interface is being improved for both software and digital equipment. The conclusion, is that the construction industry, as well as Facility Management (FM). Within both, public, and private sector, can have much to gain using the technology and techniques presented in the report

    Proceedings of the 9th Arab Society for Computer Aided Architectural Design (ASCAAD) international conference 2021 (ASCAAD 2021): architecture in the age of disruptive technologies: transformation and challenges.

    Get PDF
    The ASCAAD 2021 conference theme is Architecture in the age of disruptive technologies: transformation and challenges. The theme addresses the gradual shift in computational design from prototypical morphogenetic-centered associations in the architectural discourse. This imminent shift of focus is increasingly stirring a debate in the architectural community and is provoking a much needed critical questioning of the role of computation in architecture as a sole embodiment and enactment of technical dimensions, into one that rather deliberately pursues and embraces the humanities as an ultimate aspiration

    Mitigating Insider Threat Risks in Cyber-physical Manufacturing Systems

    Get PDF
    Cyber-Physical Manufacturing System (CPMS)—a next generation manufacturing system—seamlessly integrates digital and physical domains via the internet or computer networks. It will enable drastic improvements in production flexibility, capacity, and cost-efficiency. However, enlarged connectivity and accessibility from the integration can yield unintended security concerns. The major concern arises from cyber-physical attacks, which can cause damages to the physical domain while attacks originate in the digital domain. Especially, such attacks can be performed by insiders easily but in a more critical manner: Insider Threats. Insiders can be defined as anyone who is or has been affiliated with a system. Insiders have knowledge and access authentications of the system\u27s properties, therefore, can perform more serious attacks than outsiders. Furthermore, it is hard to detect or prevent insider threats in CPMS in a timely manner, since they can easily bypass or incapacitate general defensive mechanisms of the system by exploiting their physical access, security clearance, and knowledge of the system vulnerabilities. This thesis seeks to address the above issues by developing an insider threat tolerant CPMS, enhanced by a service-oriented blockchain augmentation and conducting experiments & analysis. The aim of the research is to identify insider threat vulnerabilities and improve the security of CPMS. Blockchain\u27s unique distributed system approach is adopted to mitigate the insider threat risks in CPMS. However, the blockchain limits the system performance due to the arbitrary block generation time and block occurrence frequency. The service-oriented blockchain augmentation is providing physical and digital entities with the blockchain communication protocol through a service layer. In this way, multiple entities are integrated by the service layer, which enables the services with less arbitrary delays while retaining their strong security from the blockchain. Also, multiple independent service applications in the service layer can ensure the flexibility and productivity of the CPMS. To study the effectiveness of the blockchain augmentation against insider threats, two example models of the proposed system have been developed: Layer Image Auditing System (LIAS) and Secure Programmable Logic Controller (SPLC). Also, four case studies are designed and presented based on the two models and evaluated by an Insider Attack Scenario Assessment Framework. The framework investigates the system\u27s security vulnerabilities and practically evaluates the insider attack scenarios. The research contributes to the understanding of insider threats and blockchain implementations in CPMS by addressing key issues that have been identified in the literature. The issues are addressed by EBIS (Establish, Build, Identify, Simulation) validation process with numerical experiments and the results, which are in turn used towards mitigating insider threat risks in CPMS

    Human Machine Interaction

    Get PDF
    In this book, the reader will find a set of papers divided into two sections. The first section presents different proposals focused on the human-machine interaction development process. The second section is devoted to different aspects of interaction, with a special emphasis on the physical interaction

    Advances and Technologies in High Voltage Power Systems Operation, Control, Protection and Security

    Get PDF
    The electrical demands in several countries around the world are increasing due to the huge energy requirements of prosperous economies and the human activities of modern life. In order to economically transfer electrical powers from the generation side to the demand side, these powers need to be transferred at high-voltage levels through suitable transmission systems and power substations. To this end, high-voltage transmission systems and power substations are in demand. Actually, they are at the heart of interconnected power systems, in which any faults might lead to unsuitable consequences, abnormal operation situations, security issues, and even power cuts and blackouts. In order to cope with the ever-increasing operation and control complexity and security in interconnected high-voltage power systems, new architectures, concepts, algorithms, and procedures are essential. This book aims to encourage researchers to address the technical issues and research gaps in high-voltage transmission systems and power substations in modern energy systems

    Mechanical Engineering

    Get PDF
    The book substantially offers the latest progresses about the important topics of the "Mechanical Engineering" to readers. It includes twenty-eight excellent studies prepared using state-of-art methodologies by professional researchers from different countries. The sections in the book comprise of the following titles: power transmission system, manufacturing processes and system analysis, thermo-fluid systems, simulations and computer applications, and new approaches in mechanical engineering education and organization systems

    Numerical optimal control with applications in aerospace

    Get PDF
    This thesis explores various computational aspects of solving nonlinear, continuous-time dynamic optimization problems (DOPs) numerically. Firstly, a direct transcription method for solving DOPs is proposed, named the integrated residual method (IRM). Instead of forcing the dynamic constraints to be satisfied only at a selected number of points as in direct collocation, this new approach alternates between minimizing and constraining the squared norm of the dynamic constraint residuals integrated along the whole solution trajectories. The method is capable of obtaining solutions of higher accuracy for the same mesh compared to direct collocation methods, enabling a flexible trade-off between solution accuracy and optimality, and providing reliable solutions for challenging problems, including those with singular arcs and high-index differential-algebraic equations. A number of techniques have also been proposed in this work for efficient numerical solution of large scale and challenging DOPs. A general approach for direct implementation of rate constraints on the discretization mesh is proposed. Unlike conventional approaches that may lead to singular control arcs, the solution of this on-mesh implementation has better numerical properties, while achieving computational speedups. Another development is related to the handling of inactive constraints, which do not contribute to the solution of DOPs, but increase the problem size and burden the numerical computations. A strategy to systematically remove the inactive and redundant constraints under a mesh refinement framework is proposed. The last part of this work focuses on the use of DOPs in aerospace applications, with a number of topics studied. Using example scenarios of intercontinental flights, the benefits of formulating DOPs directly according to problem specifications are demonstrated, with notable savings in fuel usage. The numerical challenges with direct collocation are also identified, with the IRM obtaining solutions of higher accuracy, and at the same time suppressing the singular arc fluctuations.Open Acces
    • …
    corecore