Search results

1 – 10 of 13
Article
Publication date: 31 March 2023

Zul-Atfi Ismail

Green building (GB) maintenance is increasingly accepted in the construction industry, so it can now be interpreted as an industry best practice for maintenance planning. However…

Abstract

Purpose

Green building (GB) maintenance is increasingly accepted in the construction industry, so it can now be interpreted as an industry best practice for maintenance planning. However, the performance competency and design knowledge of the practice's building control instrument process can be affected by its evaluation and the information management of building information modelling (BIM)–based model checking (BMC). These maintenance-planning problems have not yet been investigated in instances such as the Grenfell Tower fire (14 June 2017, approximately 80 fatalities) in North Kensington, West London.

Design/methodology/approach

This study proposes a theoretical framework for analysing the existing conceptualisation of BIM tools and techniques based on a critical review of GB maintenance environments. These are currently employed on GB maintenance ecosystems embedded in project teams that can affect BMC practices in the automation system process. In order to better understand how BMC is implemented in GB ecosystem projects, a quantitative case study is conducted in the Malaysian public works department (Jabatan Kerja Raya (JKR)).

Findings

GB ecosystem projects were not as effective as planned due to safety awareness, design planning, inadequate track insulation, environmental (in) compatibility and inadequate building access management. Descriptive statistics and an ANOVA were applied to analyse the data. The study is reinforced by a process flow, which is transformed into a theoretical framework.

Originality/value

Industry practitioners can use the developed framework to diagnose BMC application issues and leverage the staff competency inherent in an ecosystem to plan GB maintenance environments successfully.

Details

Journal of Enterprise Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 31 October 2023

Yangze Liang and Zhao Xu

Monitoring of the quality of precast concrete (PC) components is crucial for the success of prefabricated construction projects. Currently, quality monitoring of PC components…

Abstract

Purpose

Monitoring of the quality of precast concrete (PC) components is crucial for the success of prefabricated construction projects. Currently, quality monitoring of PC components during the construction phase is predominantly done manually, resulting in low efficiency and hindering the progress of intelligent construction. This paper presents an intelligent inspection method for assessing the appearance quality of PC components, utilizing an enhanced you look only once (YOLO) model and multi-source data. The aim of this research is to achieve automated management of the appearance quality of precast components in the prefabricated construction process through digital means.

Design/methodology/approach

The paper begins by establishing an improved YOLO model and an image dataset for evaluating appearance quality. Through object detection in the images, a preliminary and efficient assessment of the precast components' appearance quality is achieved. Moreover, the detection results are mapped onto the point cloud for high-precision quality inspection. In the case of precast components with quality defects, precise quality inspection is conducted by combining the three-dimensional model data obtained from forward design conversion with the captured point cloud data through registration. Additionally, the paper proposes a framework for an automated inspection platform dedicated to assessing appearance quality in prefabricated buildings, encompassing the platform's hardware network.

Findings

The improved YOLO model achieved a best mean average precision of 85.02% on the VOC2007 dataset, surpassing the performance of most similar models. After targeted training, the model exhibits excellent recognition capabilities for the four common appearance quality defects. When mapped onto the point cloud, the accuracy of quality inspection based on point cloud data and forward design is within 0.1 mm. The appearance quality inspection platform enables feedback and optimization of quality issues.

Originality/value

The proposed method in this study enables high-precision, visualized and automated detection of the appearance quality of PC components. It effectively meets the demand for quality inspection of precast components on construction sites of prefabricated buildings, providing technological support for the development of intelligent construction. The design of the appearance quality inspection platform's logic and framework facilitates the integration of the method, laying the foundation for efficient quality management in the future.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 28 February 2023

Sandra Matarneh, Faris Elghaish, Amani Al-Ghraibah, Essam Abdellatef and David John Edwards

Incipient detection of pavement deterioration (such as crack identification) is critical to optimizing road maintenance because it enables preventative steps to be implemented to…

Abstract

Purpose

Incipient detection of pavement deterioration (such as crack identification) is critical to optimizing road maintenance because it enables preventative steps to be implemented to mitigate damage and possible failure. Traditional visual inspection has been largely superseded by semi-automatic/automatic procedures given significant advancements in image processing. Therefore, there is a need to develop automated tools to detect and classify cracks.

Design/methodology/approach

The literature review is employed to evaluate existing attempts to use Hough transform algorithm and highlight issues that should be improved. Then, developing a simple low-cost crack detection method based on the Hough transform algorithm for pavement crack detection and classification.

Findings

Analysis results reveal that model accuracy reaches 92.14% for vertical cracks, 93.03% for diagonal cracks and 95.61% for horizontal cracks. The time lapse for detecting the crack type for one image is circa 0.98 s for vertical cracks, 0.79 s for horizontal cracks and 0.83 s for diagonal cracks. Ensuing discourse serves to illustrate the inherent potential of a simple low-cost image processing method in automated pavement crack detection. Moreover, this method provides direct guidance for long-term pavement optimal maintenance decisions.

Research limitations/implications

The outcome of this research can help highway agencies to detect and classify cracks accurately for a very long highway without a need for manual inspection, which can significantly minimize cost.

Originality/value

Hough transform algorithm was tested in terms of detect and classify a large dataset of highway images, and the accuracy reaches 92.14%, which can be considered as a very accurate percentage regarding automated cracks and distresses classification.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 12 April 2024

Ahmad Honarjoo and Ehsan Darvishan

This study aims to obtain methods to identify and find the place of damage, which is one of the topics that has always been discussed in structural engineering. The cost of…

Abstract

Purpose

This study aims to obtain methods to identify and find the place of damage, which is one of the topics that has always been discussed in structural engineering. The cost of repairing and rehabilitating massive bridges and buildings is very high, highlighting the need to monitor the structures continuously. One way to track the structure's health is to check the cracks in the concrete. Meanwhile, the current methods of concrete crack detection have complex and heavy calculations.

Design/methodology/approach

This paper presents a new lightweight architecture based on deep learning for crack classification in concrete structures. The proposed architecture was identified and classified in less time and with higher accuracy than other traditional and valid architectures in crack detection. This paper used a standard dataset to detect two-class and multi-class cracks.

Findings

Results show that two images were recognized with 99.53% accuracy based on the proposed method, and multi-class images were classified with 91% accuracy. The low execution time of the proposed architecture compared to other valid architectures in deep learning on the same hardware platform. The use of Adam's optimizer in this research had better performance than other optimizers.

Originality/value

This paper presents a framework based on a lightweight convolutional neural network for nondestructive monitoring of structural health to optimize the calculation costs and reduce execution time in processing.

Details

International Journal of Structural Integrity, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1757-9864

Keywords

Open Access
Article
Publication date: 4 April 2024

Yanmin Zhou, Zheng Yan, Ye Yang, Zhipeng Wang, Ping Lu, Philip F. Yuan and Bin He

Vision, audition, olfactory, tactile and taste are five important senses that human uses to interact with the real world. As facing more and more complex environments, a sensing…

Abstract

Purpose

Vision, audition, olfactory, tactile and taste are five important senses that human uses to interact with the real world. As facing more and more complex environments, a sensing system is essential for intelligent robots with various types of sensors. To mimic human-like abilities, sensors similar to human perception capabilities are indispensable. However, most research only concentrated on analyzing literature on single-modal sensors and their robotics application.

Design/methodology/approach

This study presents a systematic review of five bioinspired senses, especially considering a brief introduction of multimodal sensing applications and predicting current trends and future directions of this field, which may have continuous enlightenments.

Findings

This review shows that bioinspired sensors can enable robots to better understand the environment, and multiple sensor combinations can support the robot’s ability to behave intelligently.

Originality/value

The review starts with a brief survey of the biological sensing mechanisms of the five senses, which are followed by their bioinspired electronic counterparts. Their applications in the robots are then reviewed as another emphasis, covering the main application scopes of localization and navigation, objection identification, dexterous manipulation, compliant interaction and so on. Finally, the trends, difficulties and challenges of this research were discussed to help guide future research on intelligent robot sensors.

Details

Robotic Intelligence and Automation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-6969

Keywords

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 15 January 2024

Godfred Fobiri, Innocent Musonda and Franco Muleya

Digital data acquisition is crucial for operations in the digital transformation era. Reality capture (RC) has made an immeasurable contribution to various fields, especially in…

Abstract

Purpose

Digital data acquisition is crucial for operations in the digital transformation era. Reality capture (RC) has made an immeasurable contribution to various fields, especially in the built environment. This paper aims to review RC applications, potentials, limitations and the extent to which RC can be adopted for cost monitoring of construction projects.

Design/methodology/approach

A mixed-method approach, using Bibliometric analysis and the PRISMA framework, was used to review and analyse 112 peer-reviewed journal articles from the Scopus and Web of Science databases.

Findings

The study reveals RC has been applied in various areas in the built environment, but health and safety, cost and labour productivity monitoring have received little or no attention. It is proposed that RC can significantly support cost monitoring owing to its ability to acquire accurate and quick digital as-built 3D point cloud data, which contains rich measurement points for the valuation of work done.

Research limitations/implications

The study’s conclusions are based only on the Scopus and Web of Science data sets. Only English language documents were approved, whereas others may be in other languages. The research is a non-validation of findings using empirical data to confirm the data obtained from RC literature.

Practical implications

This paper highlights the importance of RC for cost monitoring in construction projects, filling knowledge gaps and enhancing project outcomes.

Social implications

The implementation of RC in the era of the digital revolution has the potential to improve project delivery around the world today. Every project’s success is largely determined by the availability of precise and detailed digital data. RC applications have pushed for more sustainable design, construction and operations in the built environment.

Originality/value

The study has given research trends on the extent of RC applications, potentials, limitations and future directions.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 15 August 2023

Zul-Atfi Ismail

At the beginning of the Corona Virus Disease 2019 (COVID-19) pandemic, a digitalized construction environments surfaced in the heating, ventilation and air conditioning (HVAC…

Abstract

Purpose

At the beginning of the Corona Virus Disease 2019 (COVID-19) pandemic, a digitalized construction environments surfaced in the heating, ventilation and air conditioning (HVAC) systems in the form of a modern delivery system called demand controlled ventilation (DCV). Demand controlled ventilation has the potential to solve the building ventilation's biggest problem of managing indoor air quality (IAQ) for controlling COVID-19 transmission in indoor environments. However, the improper evaluation and information management of infection prevention on dense crowd activities such as measurement errors and volatile organic compound (VOC) generation failure rates, is fragmented so the aim of this research is to integrate this and explore potentials with machine learning algorithms (MLAs).

Design/methodology/approach

The method used is a thorough systematic literature review (SLR) approach. The results of this research consist of a detailed description of the DCV system and digitalized construction process of its IAQ elements.

Findings

The discussion revealed that DCV has a potential for being further integrated by perceiving it as a MLAs and hereby enabling the management of IAQ level from the perspective of health risk function mechanism (i.e. VOC and CO2) for maintaining a comfortable thermal environment and save energy of public and private buildings (PPBs). The appropriate MLA can also be selected in different occupancy patterns for seasonal variations, ventilation behavior, building type and locations, as well as current indoor air pollution control strategies. Furthermore, the conceptual framework showed that MLA application such as algorithm design/Model Predictive Control (MPC) integration can alleviate the high spread limitation of COVID-19 in the indoor environment.

Originality/value

Finally, the research concludes that a large unexploited potential within integration and innovation is recognized in the DCV system and MLAs which can be improved to optimize level of IAQ from the perspective of health throughout the building sector DCV process systems. The requirements of CO2 based DCV along with VOC concentrations monitoring practice should be taken into consideration through further research and experience with adaption and implementation from the ventilation control initial stage of the DCV process.

Details

Open House International, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0168-2601

Keywords

Article
Publication date: 2 May 2024

Bikesh Manandhar, Thanh-Canh Huynh, Pawan Kumar Bhattarai, Suchita Shrestha and Ananta Man Singh Pradhan

This research is aimed at preparing landslide susceptibility using spatial analysis and soft computing machine learning techniques based on convolutional neural networks (CNNs)…

Abstract

Purpose

This research is aimed at preparing landslide susceptibility using spatial analysis and soft computing machine learning techniques based on convolutional neural networks (CNNs), artificial neural networks (ANNs) and logistic regression (LR) models.

Design/methodology/approach

Using the Geographical Information System (GIS), a spatial database including topographic, hydrologic, geological and landuse data is created for the study area. The data are randomly divided between a training set (70%), a validation (10%) and a test set (20%).

Findings

The validation findings demonstrate that the CNN model (has an 89% success rate and an 84% prediction rate). The ANN model (with an 84% success rate and an 81% prediction rate) predicts landslides better than the LR model (with a success rate of 82% and a prediction rate of 79%). In comparison, the CNN proves to be more accurate than the logistic regression and is utilized for final susceptibility.

Research limitations/implications

Land cover data and geological data are limited in largescale, making it challenging to develop accurate and comprehensive susceptibility maps.

Practical implications

It helps to identify areas with a higher likelihood of experiencing landslides. This information is crucial for assessing the risk posed to human lives, infrastructure and properties in these areas. It allows authorities and stakeholders to prioritize risk management efforts and allocate resources more effectively.

Social implications

The social implications of a landslide susceptibility map are profound, as it provides vital information for disaster preparedness, risk mitigation and landuse planning. Communities can utilize these maps to identify vulnerable areas, implement zoning regulations and develop evacuation plans, ultimately safeguarding lives and property. Additionally, access to such information promotes public awareness and education about landslide risks, fostering a proactive approach to disaster management. However, reliance solely on these maps may also create a false sense of security, necessitating continuous updates and integration with other risk assessment measures to ensure effective disaster resilience strategies are in place.

Originality/value

Landslide susceptibility mapping provides a proactive approach to identifying areas at higher risk of landslides before any significant events occur. Researchers continually explore new data sources, modeling techniques and validation approaches, leading to a better understanding of landslide dynamics and susceptibility factors.

Details

Engineering Computations, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 6 March 2024

Mouna Zerzeri, Intissar Moussa and Adel Khedher

The purpose of this paper aims to design a robust wind turbine emulator (WTE) based on a three-phase induction motor (3PIM).

Abstract

Purpose

The purpose of this paper aims to design a robust wind turbine emulator (WTE) based on a three-phase induction motor (3PIM).

Design/methodology/approach

The 3PIM is driven by a soft voltage source inverter (VSI) controlled by a specific space vector modulation. By adjusting the appropriate vector sequence selection, the desired VSI output voltage allows a real wind turbine speed emulation in the laboratory, taking into account the wind profile, static and dynamic behaviors and parametric variations for theoretical and then experimental analysis. A Mexican hat profile and a sinusoidal profile are therefore used as the wind speed system input to highlight the electrical, mechanical and electromagnetic system response.

Findings

The simulation results, based on relative error data, show that the proposed reactive power control method effectively estimates the flux and the rotor time constant, thus ensuring an accurate trajectory tracking of the wind speed for the wind emulation application.

Originality/value

The proposed architecture achieves its results through the use of mathematical theory and WTE topology combine with an online adaptive estimator and Lyapunov stability adaptation control methods. These approaches are particularly relevant for low-cost or low-power alternative current (AC) motor drives in the field of renewable energy emulation. It has the advantage of eliminating the need for expensive and unreliable position transducers, thereby increasing the emulator drive life. A comparative analysis was also carried out to highlight the online adaptive estimator fast response time and accuracy.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0332-1649

Keywords

1 – 10 of 13