Search results for: building security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6476

Search results for: building security

6176 Geopolitical Architecture: The Strategic Complex in Indo Pacific Region

Authors: Muzammil Dar

Abstract:

The confluence of trans-national interests and divergent approaches followed by multiple actors has surrounded the Indo-Pacific region with myriad of strategic complexes- Geo-Political, Geo-economic, and security. This paper has thus made a humble attempt to understand the Indo-Pacific strategic predicament from Asia-Pacific perspective. The portmanteau of Indo-Pacific strategic gamble has multiple actors from global powers to regional actors. On the indo-pacific waters, not only flow trade relations, but the tides of conflicts and controversies are striking these actors against each other. The alliance formation and infrastructure building has built-in threat perceptions from rivals vice-versa. The assertiveness of China as a reality and India’s ideological doctrine of peace and friendship, as well as American rebalancing against China, could be seen as clear and bright on the Indo-Pacific strategic portmanteau. ASEAN and Japan, too, have oscillating posturing in the strategic dilemma. The aim and objective of the paper are to sketch out the prospectus and prejudices of Indo-pacific strategic complex.

Keywords: Indo Pacific, Asia Pacific, security and growth for all in the region, SAGAR, ASEAN China

Procedia PDF Downloads 120
6175 Analysis on the Building Energy Performance of a Retrofitted Residential Building with RETScreen Expert Software

Authors: Abdulhameed Babatunde Owolabi, Benyoh Emmanuel Kigha Nsafon, Jeung-Soo Huh

Abstract:

Energy efficiency measures for residential buildings in South Korea is a national issue because most of the apartments built in the last decades were constructed without proper energy efficiency measures making the energy performance of old buildings to be very poor when compared with new buildings. However, the adoption of advanced building technologies and regulatory building codes are effective energy efficiency strategies for new construction. There is a need to retrofits the existing building using energy conservation measures (ECMs) equipment’s in order to conserve energy and reduce GHGs emissions. To achieve this, the Institute for Global Climate Change and Energy (IGCCE), Kyungpook National University (KNU), Daegu, South Korea employed RETScreen Expert software to carry out measurement and verification (M&V) analysis on an existing building in Korea by using six years gas consumption data collected from Daesung Energy Co., Ltd in order to determine the building energy performance after the introduction of ECM. Through the M&V, energy efficiency is attained, and the resident doubt was reduced. From the analysis, a total of 657 Giga Joules (GJ) of liquefied natural gas (LNG) was consumed at the rate of 0.34 GJ/day having a peak in the year 2015, which cost the occupant the sum of $10,821.

Keywords: energy efficiency, measurement and verification, performance analysis, RETScreen experts

Procedia PDF Downloads 114
6174 Low-Level Forced and Ambient Vibration Tests on URM Building Strengthened by Dampers

Authors: Rafik Taleb, Farid Bouriche, Mehdi Boukri, Fouad Kehila

Abstract:

The aim of the paper is to investigate the dynamic behavior of an unreinforced masonry (URM) building strengthened by DC-90 dampers by ambient and low-level forced vibration tests. Ambient and forced vibration techniques are usually applied to reinforced concrete or steel buildings to understand and identify their dynamic behavior, however, less is known about their applicability for masonry buildings. Ambient vibrations were measured before and after strengthening of the URM building by DC-90 dampers system. For forced vibration test, a series of low amplitude steady state harmonic forced vibration tests were conducted after strengthening using eccentric mass shaker. The resonant frequency curves, mode shapes and damping coefficients as well as stress distribution in the steel braces of the DC-90 dampers have been investigated and could be defined. It was shown that the dynamic behavior of the masonry building, even if not regular and with deformable floors, can be effectively represented. It can be concluded that the strengthening of the building does not change the dynamic properties of the building due to the fact of low amplitude excitation which do not activate the dampers.

Keywords: ambient vibrations, masonry buildings, forced vibrations, structural dynamic identification

Procedia PDF Downloads 389
6173 Effects of Irregular Migration from Different Aspects of Security

Authors: Muzaffer Topgul, Hasan Atac

Abstract:

In case of explaining the migration concept, although it is not a new phenomenon, it is easy to understand that communities have migrated for variety of reasons such as natural disasters, famine, wars, economic problems, and several theories have been put forth to define and find solution for migration within its changing nature. Examining of migration theories denotes that the circumstances under which they appear reflect political, social, and economic conditions of the age they appear. In this day and time, security is considered not only from military perspective but also from economic, political, sociological dimensions. Based on the changing security environment new impacts of migration has occurred; the migration is proceed to be conferred as a type of war, qualified as a transnational crime because of its outcomes and interpreted in a different dimension owing to its effects on the health and education areas. Social security dimension in the context of expanding concept of security; when dealing with the safety of people and social groups with the assumption that national unity and identity are threatened, it sees immigrants as a source of threat. The human security assesses the safety of individuals in terms of survival and quality of life. Changes in the standard of living under the influence of immigrants and possible terrorist acts can be seen as a threat source in this type of security. Economic security of the individuals and the regional changes at the micro level created by the immigrants are covered issues of economic security. Due to the factors such as terrorism and civil war, the increasing numbers of displaced people who have taken refugee status affect the countries, whether it is near or far to the crisis areas, in the new and different dimensions of security day by day. In this study, the term of immigration through the eyes of national and international law will be evaluated, the place of the irregular and illegal immigration in the changing security sphere will be revealed and the effects of the irregular migration to short-term, mid-term and long-term security issues will be assessed through human and social security aspects. In order to analyze the threats for the human security; the parameters such as living conditions of the immigrants, the ratio of the genders, birth rate occasions, the education circumstances of the immigrant children and the effects of the illegal passing on the public order will be evaluated. The outcomes of the problem areas for the human security and the demographic alteration resulting from the human flow of displaced people will be discussed thorough social security extent. The fizzling economic diversity, which has shown up by irregular migration, will be presented within the scope of economic dimension of security.

Keywords: irregular migration, the changing dimensions of security, human security, social security

Procedia PDF Downloads 310
6172 Security Analysis and Implementation of Achterbahn-128 for Images Encryption

Authors: Aissa Belmeguenai, Oulaya Berrak, Khaled Mansouri

Abstract:

In this work, efficiency implementation and security evaluation of the keystream generator of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written with MATLAB.7.5. First of all, two different original images are used to validate the proposed design. The developed program is used to transform the original images data into digital image file. Finally, the proposed program is implemented to encrypt and decrypt images data. Several tests are done to prove the design performance, including visual tests and security evaluation.

Keywords: Achterbahn-128, keystream generator, stream cipher, image encryption, security analysis

Procedia PDF Downloads 293
6171 A Multi-Criteria Decision Making (MCDM) Approach for Assessing the Sustainability Index of Building Façades

Authors: Golshid Gilani, Albert De La Fuente, Ana Blanco

Abstract:

Sustainability assessment of new and existing buildings has generated a growing interest due to the evident environmental, social and economic impacts during their construction and service life. Façades, as one of the most important exterior elements of a building, may contribute to the building sustainability by reducing the amount of energy consumption and providing thermal comfort for the inhabitants, thus minimizing the environmental impact on both the building and on the environment. Various methods have been used for the sustainability assessment of buildings due to the importance of this issue. However, most of the existing methods mainly concentrate on environmental and economic aspects, disregarding the third pillar of sustainability, which is the social aspect. Besides, there is a little focus on comprehensive sustainability assessment of facades, as an important element of a building. This confirms the need of developing methods for assessing the sustainable performance of building façades as an important step in achieving building sustainability. In this respect, this paper aims at presenting a model for assessing the global sustainability of façade systems. for that purpose, the Integrated Value Model for Sustainable Assessment (MIVES), a Multi-Criteria Decision Making model that integrates the main sustainability requirements (economic, environmental and social) and includes the concept of value functions, used as an assessment tool.

Keywords: façade, MCDM, MIVES, sustainability

Procedia PDF Downloads 318
6170 Building Information Modelling in Eastern Province Municipality of KSA

Authors: Banan Aljumaiah

Abstract:

In recent years, the construction industry has leveraged the information revolution, which makes it possible to view the entire construction process of new buildings before they are built with the advent of Building Information Modelling (BIM). Although BIM is an integration of the building model with the data and documents about the building, however, its implementation is limited to individual buildings missing the large picture of the city infrastructure. This limitation of BIM led to the birth of City Information Modelling. Three years ago, Eastern Province Municipality (EPM) in Saudi Arabia mandated that all major projects be delivered with collaborative 3D BIM. After three years of implementation, EPM started to implement City Information Modelling (CIM) as a part of the Smart City Plan to link infrastructure and public services and modelling how people move around and interact with the city. This paper demonstrates a local case study of BIM implementation in EPM and its future as a part of project management automation; the paper also highlights the ambitious plan of EPM to transform CIM towards building smart cities.

Keywords: BIM, BIM to CIM

Procedia PDF Downloads 114
6169 Radiological Hazard Assessments and Control of Radionuclides Emitted from Building Materials in Kuwait Using Expert Systems

Authors: Abdulla Almulla, Wafaa Mahdi

Abstract:

Building materials can make a significant contribution to the level of natural radioactivity in closed dwelling areas. Therefore, developing an expert system for monitoring the activity concentrations (ACs) of naturally occurring radioactive materials (NORMs) existing in building materials is useful for limiting the population’s exposure to gamma radiation emitted from those materials. The present work not only is aimed at examining the indoor radon concentration emitted by the building materials that are originated from various countries but are commercially available in Kuwait, but also is aimed at developing an expert system for monitoring the radiation emitted from these materials and classifying it as normal (acceptable) or dangerous (unacceptable). This system makes it possible to always monitor any radiological risks to human health. When detecting high doses of radiation, the system gives warning messages.

Keywords: building materials, NORMs, HNBRA, radionuclides, activity concentrations, expert systems

Procedia PDF Downloads 138
6168 Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software

Authors: Carlos Gonzalez

Abstract:

This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.

Keywords: internet, secure software, threats, cryptography process

Procedia PDF Downloads 304
6167 Healthy and Smart Building Projects

Authors: Ali A. Karakhan

Abstract:

Stakeholders in the architecture, engineering, and construction (AEC) industry have been always searching for strategies to develop, design, and construct healthy and smart building projects. Healthy and smart building projects require that the building process including design and construction be altered and carefully implemented in order to bring about sustainable outcomes throughout the facility lifecycle. Healthy and smart building projects are expected to positively influence organizational success and facility performance across the project lifecycle leading to superior outcomes in terms of people, economy, and the environment. The present study aims to identify potential strategies that AEC organizations can implement to achieve healthy and smart building projects. Drivers and barriers for healthy and smart building features are also examined. The study findings indicate that there are three strategies to advance the development of healthy and smart building projects: (1) the incorporation of high-quality products and low chemical-emitting materials, (2) the integration of innovative designs, methods, and practices, and (3) the adoption of smart technology throughout the facility lifecycle. Satisfying external demands, achievement of a third-party certification, obtaining financial incentives, and a desire to fulfill professional duty are identified as the key drivers for developing healthy and smart building features; whereas, lack of knowledge and training, time/cost constrains, preference for/adherence to customary practices, and unclear business case for why healthy buildings are advantageous are recognized as the primary barriers toward a wider diffusion of healthy and smart building projects. The present study grounded in previous engineering, medical, and public health research provides valuable technical and practical recommendations for facility owners and industry professionals interested in pursuing sustainable, yet healthy and smart building projects.

Keywords: healthy buildings, smart construction, innovative designs, sustainable projects

Procedia PDF Downloads 136
6166 Post Occupancy Evaluation of the Green Office Building with Different Air-Conditioning Systems

Authors: Ziwei Huang, Jian Ge, Jie Shen, Jiantao Weng

Abstract:

Retrofitting of existing buildings plays a critical role to achieve sustainable development. This is being considered as one of the approaches to achieving sustainability in the built environment. In order to evaluate the different air-conditioning systems effectiveness and user satisfaction of the existing building which had transformed into green building effectively and accurately. This article takes the green office building in Zhejiang province, China as an example, analyzing the energy consumption, occupant satisfaction and indoor environment quality (IEQ) from the perspective of the thermal environment. This building is special because it combines ground source heat pump system and Variable Refrigerant Flow (VRF) air-conditioning system. Results showed that the ground source heat pump system(EUIa≈25.6) consumes more energy than VRF(EUIb≈23.8). In terms of a satisfaction survey, the use of the VRF air-conditioning was more satisfactory in temperature. However, the ground source heat pump is more satisfied in air quality.

Keywords: post-occupancy evaluation, green office building, air-conditioning systems, ground source heat pump system

Procedia PDF Downloads 177
6165 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.

Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law

Procedia PDF Downloads 361
6164 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 397
6163 An Implementation of Incentive Systems within Property Life Cycles Will Reward Investors, Planners and Users

Authors: Nadine Wills

Abstract:

The whole life thinking of buildings (independent if these are commercial properties or residential properties) will raise if incentive systems are provided to investors, planners and users. The Use of Building Information Modelling (BIM)-Systems offers planners the possibility to plan and re-plan buildings for decades after a period of utilization without spending many capacities. The strategy-incentive should be to plan the building in a way that makes rescheduling possible by changing just parameters in the system and not re-planning the whole building. If users receive the chance to patient incentive systems, the building stock will have a long life period. Business models of tenant electricity or self-controlled operating costs are incentive systems for building –users to let fixed running costs decline without producing damages due to wrong purposes. BIM is the controlling body to ensure that users do not abuse the incentive solution and take negative influence on the building stock. The investor benefits from the planner’s and user’s incentives: the fact that the building becomes useful for the whole life without making unnecessary investments provides possibilities to make investments in different assets. Moreover, the investor gains the facility to achieve higher rents by merchandise the property with low operating costs. To execute BIM offers whole property life cycles.

Keywords: BIM, incentives, life cycle, sustainability

Procedia PDF Downloads 276
6162 Alternative Futures for the Middle East

Authors: Dorsa Bakhshandehgeyazdi

Abstract:

This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.

Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group

Procedia PDF Downloads 281
6161 Assessing EU-China Security Interests from Contradiction to Convergence

Authors: Julia Gurol

Abstract:

Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.

Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security

Procedia PDF Downloads 262
6160 Thermal Simulation for Urban Planning in Early Design Phases

Authors: Diego A. Romero Espinosa

Abstract:

Thermal simulations are used to evaluate comfort and energy consumption of buildings. However, the performance of different urban forms cannot be assessed precisely if an environmental control system and user schedules are considered. The outcome of such analysis would lead to conclusions that combine the building use, operation, services, envelope, orientation and density of the urban fabric. The influence of these factors varies during the life cycle of a building. The orientation, as well as the surroundings, can be considered a constant during the lifetime of a building. The structure impacts the thermal inertia and has the largest lifespan of all the building components. On the other hand, the building envelope is the most frequent renovated component of a building since it has a great impact on energy performance and comfort. Building services have a shorter lifespan and are replaced regularly. With the purpose of addressing the performance, an urban form, a specific orientation, and density, a thermal simulation method were developed. The solar irradiation is taken into consideration depending on the outdoor temperature. Incoming irradiation at low temperatures has a positive impact increasing the indoor temperature. Consequently, overheating would be the combination of high outdoor temperature and high irradiation at the façade. On this basis, the indoor temperature is simulated for a specific orientation of the evaluated urban form. Thermal inertia and building envelope performance are considered additionally as the materiality of the building. The results of different thermal zones are summarized using the 'Degree day method' for cooling and heating. During the early phase of a design process for a project, such as Masterplan, conclusions regarding urban form, density and materiality can be drawn by means of this analysis.

Keywords: building envelope, density, masterplanning, urban form

Procedia PDF Downloads 127
6159 Food Security Model and the Role of Community Empowerment: The Case of a Marginalized Village in Mexico, Tatoxcac, Puebla

Authors: Marco Antonio Lara De la Calleja, María Catalina Ovando Chico, Eduardo Lopez Ruiz

Abstract:

Community empowerment has been proved to be a key element in the solution of the food security problem. As a result of a conceptual analysis, it was found that agricultural production, economic development and governance, are the traditional basis of food security models. Although the literature points to social inclusion as an important factor for food security, no model has considered it as the basis of it. The aim of this research is to identify different dimensions that make an integral model for food security, with emphasis on community empowerment. A diagnosis was made in the study community (Tatoxcac, Zacapoaxtla, Puebla), to know the aspects that impact the level of food insecurity. With a statistical sample integrated by 200 families, the Latin American and Caribbean Food Security Scale (ELCSA) was applied, finding that: in households composed by adults and children, have moderated food insecurity, (ELCSA scale has three levels, low, moderated and high); that result is produced mainly by the economic income capacity and the diversity of the diet on its food. With that being said, a model was developed to promote food security through five dimensions: 1. Regional context of the community; 2. Structure and system of local food; 3. Health and nutrition; 4. Information and technology access; and 5. Self-awareness and empowerment. The specific actions on each axis of the model, allowed a systemic approach needed to attend food security in the community, through the empowerment of society. It is concluded that the self-awareness of local communities is an area of extreme importance, which must be taken into account for participatory schemes to improve food security. In the long term, the model requires the integrated participation of different actors, such as government, companies and universities, to solve something such vital as food security.

Keywords: community empowerment, food security, model, systemic approach

Procedia PDF Downloads 350
6158 Uncertainty Assessment in Building Energy Performance

Authors: Fally Titikpina, Abderafi Charki, Antoine Caucheteux, David Bigaud

Abstract:

The building sector is one of the largest energy consumer with about 40% of the final energy consumption in the European Union. Ensuring building energy performance is of scientific, technological and sociological matter. To assess a building energy performance, the consumption being predicted or estimated during the design stage is compared with the measured consumption when the building is operational. When valuing this performance, many buildings show significant differences between the calculated and measured consumption. In order to assess the performance accurately and ensure the thermal efficiency of the building, it is necessary to evaluate the uncertainties involved not only in measurement but also those induced by the propagation of dynamic and static input data in the model being used. The evaluation of measurement uncertainty is based on both the knowledge about the measurement process and the input quantities which influence the result of measurement. Measurement uncertainty can be evaluated within the framework of conventional statistics presented in the \textit{Guide to the Expression of Measurement Uncertainty (GUM)} as well as by Bayesian Statistical Theory (BST). Another choice is the use of numerical methods like Monte Carlo Simulation (MCS). In this paper, we proposed to evaluate the uncertainty associated to the use of a simplified model for the estimation of the energy consumption of a given building. A detailed review and discussion of these three approaches (GUM, MCS and BST) is given. Therefore, an office building has been monitored and multiple sensors have been mounted on candidate locations to get required data. The monitored zone is composed of six offices and has an overall surface of 102 $m^2$. Temperature data, electrical and heating consumption, windows opening and occupancy rate are the features for our research work.

Keywords: building energy performance, uncertainty evaluation, GUM, bayesian approach, monte carlo method

Procedia PDF Downloads 437
6157 Green Building Delivery: Exploring Lessons and the State of Practice in Nigeria

Authors: Ayodele E. Ikudayisi, Yomi M. D. Adedeji, Olumuyiwa B. Adegun

Abstract:

The level of adoption of green building (GB) schemes in Nigeria is low. The prevailing focus on economic development has overshadowed sustainability concerns. Despite these, few project cases exist in Nigeria in which sustainability goals have been achieved. This study aims to draw lessons from these in order to understand the project attributes, certification status, and the delivery process. Through an exploratory case study approach, fifteen project cases across five cities in Nigeria were examined. These represent the first-generation of green buildings in Nigeria, a verifiable reference for future initiatives in Sub-Saharan Africa. From the result, three categories of green buildings were identified, namely certified projects, demonstration projects, and potential projects with varying delivery attributes. Then, it is concluded by setting research and practice agenda towards aligning Nigeria’s building industry with the global trends in sustainable building delivery.

Keywords: LEED, green building, Nigeria, project attributes

Procedia PDF Downloads 143
6156 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 278
6155 Research on the Calculation Method of Smartization Rate of Concrete Structure Building Construction

Authors: Hongyu Ye, Hong Zhang, Minjie Sun, Hongfang Xu

Abstract:

In the context of China's promotion of smart construction and building industrialization, there is a need for evaluation standards for the development of building industrialization based on assembly-type construction. However, the evaluation of smart construction remains a challenge in the industry's development process. This paper addresses this issue by proposing a calculation and evaluation method for the smartization rate of concrete structure building construction. The study focuses on examining the factors of smart equipment application and their impact on costs throughout the process of smart construction design, production, transfer, and construction. Based on this analysis, the paper presents an evaluation method for the smartization rate based on components. Furthermore, it introduces calculation methods for assessing the smartization rate of buildings. The paper also suggests a rapid calculation method for determining the smartization rate using Building Information Modeling (BIM) and information expression technology. The proposed research provides a foundation for the swift calculation of the smartization rate based on BIM and information technology. Ultimately, it aims to promote the development of smart construction and the construction of high-quality buildings in China.

Keywords: building industrialization, high quality building, smart construction, smartization rate, component

Procedia PDF Downloads 44
6154 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain

Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani

Abstract:

The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.

Keywords: blockchain, hyperledger fabric, internet of things, security, traceability

Procedia PDF Downloads 120
6153 Shifting of Global Energy Security: A Comparative Analysis of Indonesia and China’s Renewable Energy Policies

Authors: Widhi Hanantyo Suryadinata

Abstract:

Efforts undertaken by Indonesia and China to shift the strategies and security of renewable energy on a global stage involve approaches through policy construction related to rare minerals processing or value-adding in Indonesia and manufacturing policies through the New Energy Vehicles (NEVs) policy in China. Both policies encompass several practical regulations and policies that can be utilized for the implementation of Indonesia and China's grand efforts and ideas. Policy development in Indonesia and China can be analyzed using a comparative analysis method, as well as employing a pyramid illustration to identify policy construction phases based on the real conditions of the domestic market and implemented policies. This approach also helps to identify the potential integration of policies needed to enhance the policy development phase of a country within the pyramid. It also emphasizes the significance of integration policy to redefine renewable energy strategy and security on the global stage.

Keywords: global renewable energy security, global energy security, policy development, comparative analysis, shifting of global energy security, Indonesia, China

Procedia PDF Downloads 43
6152 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 187
6151 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services

Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar

Abstract:

This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.

Keywords: civil-id disclosure, awareness, linear regression, multiple regression

Procedia PDF Downloads 31
6150 Evaluation of the Need for Seismic Retrofitting of the Foundation of a Five Story Steel Building Because of Adding of a New Story

Authors: Mohammadreza Baradaran, F. Hamzezarghani

Abstract:

Every year in different points of the world it occurs with different strengths and thousands of people lose their lives because of this natural phenomenon. One of the reasons for destruction of buildings because of earthquake in addition to the passing of time and the effect of environmental conditions and the wearing-out of a building is changing the uses of the building and change the structure and skeleton of the building. A large number of structures that are located in earthquake bearing areas have been designed according to the old quake design regulations which are out dated. In addition, many of the major earthquakes which have occurred in recent years, emphasize retrofitting to decrease the dangers of quakes. Retrofitting structural quakes available is one of the most effective methods for reducing dangers and compensating lack of resistance caused by the weaknesses existing. In this article the foundation of a five-floor steel building with the moment frame system has been evaluated for quakes and the effect of adding a floor to this five-floor steel building has been evaluated and analyzed. The considered building is with a metallic skeleton and a piled roof and clayed block which after addition of a floor has increased to a six-floor foundation of 1416 square meters, and the height of the sixth floor from ground state has increased 18.95 meters. After analysis of the foundation model, the behavior of the soil under the foundation and also the behavior of the body or element of the foundation has been evaluated and the model of the foundation and its type of change in form and the amount of stress of the soil under the foundation for some of the composition has been determined many times in the SAFE software modeling and finally the need for retrofitting of the building's foundation has been determined.

Keywords: seismic, rehabilitation, steel building, foundation

Procedia PDF Downloads 256
6149 Implementing Internet of Things through Building Information Modelling in Order to Assist with the Maintenance Stage of Commercial Buildings

Authors: Ushir Daya, Zenadene Lazarus, Dimelle Moodley, Ehsan Saghatforoush

Abstract:

It was found through literature that there is a lack of implementation of the Internet of Things (IoT) incorporated into Building Information Modelling (BIM) in South Africa. The research aims to find if the implementation of IoT into BIM will make BIM more useful during the maintenance stage of buildings and assist facility managers when doing their job. The research will look at the existing problematic areas with building information modelling, specifically BIM 7D. This paper will look at the capabilities of IoT and what issues IoT will be able to resolve in BIM software, as well as how IoT into BIM will assist facility managers and if such an implementation will make a facility manager's job more efficient.

Keywords: internet of things, building information modeling, facilities management, structural health monitoring

Procedia PDF Downloads 177
6148 Enhancing Metaverse Security: A Multi-Factor Authentication Scheme

Authors: R. Chinnaiyaprabhu, S. Bharanidharan, V. Dharsana, Rajalavanya

Abstract:

The concept of the Metaverse represents a potential evolution in the realm of cyberspace. In the early stages of Web 2.0, we observed a proliferation of online pseudonyms or 'nyms,' which increased the prevalence of fake accounts and made it challenging to establish unique online identities for various roles. However, in the era of Web 3.0, particularly in the context of the Metaverse, an individual's digital identity is intrinsically linked to their real-world identity. Consequently, actions taken in the Metaverse can carry significant consequences in the physical world. In light of these considerations, we propose the development of an innovative authentication system known as 'Metasec.' This system is designed to enhance security for digital assets, online identities, avatars, and user accounts within the Metaverse. Notably, Metasec operates as a password less authentication solution, relying on a multifaceted approach to security, encompassing device attestation, facial recognition, and pattern-based security keys.

Keywords: metaverse, multifactor authentication, security, facial recognition, patten password

Procedia PDF Downloads 49
6147 Rethinking the Role of Small States in the Hybrid Era: Shifts in the Cypriot Foreign and Defence Policies, 2004-2019

Authors: Constantinos Adamides, Petros Petrikkos

Abstract:

In the era of growing hybrid threats, small states find themselves in need to re-evaluate existing foreign and defense policies. The pressure to establishing or maintain a status of a reliable partner in the community in which they belong to, vis-à-vis their multilateral relations with other organisations and entities, small states may need to shift their policies in the field to accommodate security needs that are not only pertinent to their security, but also to that of the organisations (bloc) in which they interact. Unlike potential shortcomings in a small state’s mainstream security and defence framework where the threat would be limited to the state itself, in more contemporary times with dominating hybrid threats, the small states’ security shortcomings may also become a security problem for the bloc in which these states belong to. An indicative example is small states like Cyprus and Malta, which belong and 'interact' in the European Union. As a result, the nature of hybrid threats can be utilised to hurt bigger states in a bloc by exploiting the small states’ vulnerabilities and security gaps. Inevitably, both the defensive and foreign policy collaborations of small states with bigger states have been and are constantly re-evaluated to tackle and prevent such problems. In essence, the goal of this ‘re-evaluation’ aims to achieve a twofold goal: The first is the small states’ quest to appear as a reliable partner within the bloc, while the second is to avoid being the weakest security link in the bloc’s defence against hybrid threats. Indeed, the hybrid arena is a security area where they can excel in the bloc, despite the potential and expected conventional military deficiencies. This new environment prompts us to think security from the perspective of small states differently and in relation to their role as members or big organisations. The paper focuses on the case of Cyprus following its accession to the European Union and examines how a country that has had a very focused security orientation –not least due to its ongoing security problems– altered its foreign and defence policies within the European Union to ensure compliance with the rest of the bloc, while at the same time maximizing its role as a security player. Specifically, it examines the methods through which the country shifted its policies as well as the challenges and opportunities that emerged from these security shifts.

Keywords: Cyprus, defence, foreign policy, hybrid threats, ontological security, small states

Procedia PDF Downloads 119