Feed-Forward Control Applied to Thermally Activated Building Systems

In: Other Topics

Submitted By pullale
Words 22312
Pages 90
UNIVERSITÀ DEGLI STUDI DI PADOVA
Facoltà di Ingegneria Dipartimento di Fisica Tecnica

Tesi di laurea FEED-FORWARD CONTROL APPLIED TO THERMALLY ACTIVATED CONCRETE SLABS – A CASE STUDY

Relatore: Correlatori:

Prof. Ing. Roberto ZECCHIN Dott. Ing. Michele DE CARLI Dott. Ing. Dietrich SCHMIDT Laureando: Alessio PULLIERO

Anno accademico 2003-2004

To my parents ….

ABSTRACT
The main purpose of this thesis is to investigate different control strategies for the heating and cooling system of the ZUB (Centre for Sustainable Building), situated in Kassel, Germany. It is an experimental office building, with a very detailed monitoring system for studying low-energy and low-exergy building technologies. The conditioning system is a TABS (Thermally Activated Building System), with water pipes embedded in the centre of a structural concrete slab, thus resulting in a ceiling radiant system. The high thermal capacity of the slab offers great opportunities to store heat, to dampen temperature fluctuations or to shift the peak-load; but, on the other hand, it implies a slow response of the system, which requires an accurate regulation strategy to front the variability of several factors, and to achieve the desired indoor temperature. A TRNSYS model of an office room has been developed, thus allowing to implement several regulations in the software and to test their performance. The main conclusion, carried out from the simulations, is that the implementation of a Feed-forward controller gives appreciable advantages in the temperature control, achieving both a more precise control of thermal conditions and a reduction of the energy consumption. The parameters taken into account by the controller are more than one and, more in detail, they are the operative temperature, the variation of external temperature, the solar radiation and the effect of internal gains.…...

Similar Documents

System Building

...System Building April Willochell Digital Firm There are a number of alternative methods for building information systems, each suited to different types of problems. The oldest method for building systems is the systems life cycle, which requires that information systems be developed in formal stages. The stages must proceed sequentially and have defined outputs; each requires formal approval before the next stage can commence.” The system life cycle is useful for large projects that need formal specifications and tight management control over each stage of systems building.” ( Building Systems History, 2012) However, this approach is very rigid and costly and is not well suited for unstructured, decision-oriented applications for which requirements cannot be immediately visualized. Prototyping consists of building an experimental system rapidly and inexpensively for end users to interact with and evaluate. The prototype is refined and enhanced until users are satisfied that it includes all of their requirements and can be used as a template to create the final system. Prototyping encourages end-user involvement in systems development and iteration of design until specifications are captured accurately. The rapid creation of prototypes can result in systems that have not been completely tested or documented or that are technically inadequate for a production environment. Developing an information system using an application software package eliminates the need for...

Words: 777 - Pages: 4

Feed Forward Control

...FEED FORWARD CONTROL Measuring the effectiveness and efficiency of an employee is one of the most important aspects of a being a manager. Our employees want to give the highest level of customer satisfaction to our clients. We are able to use three types of control to ensure the systems we use to meet the customers demand are effective, the customers are satisfied with the service we provide, our employees are rewarded for their productivity, and we remain profitable. Manager goals become more attainable the better they are able to use these three types of control measures. Our managers use a star technique during the interviewing process that challenges an applicant to describe a situation, task, action, and result from a past experience. This technique is used to help identify the best candidates for the career opportunities that are available with the call center. It helps the employee because they will not have to waste time in an unfulfilling job where productivity will suffer. We invest our resources into the development of our call center employees through training program that empowers them to perform at a high level. The organization benefit from having a workforce that understands the expectations of management, understands the internal processes, and understands what in it for them. Our employees obtains this knowledge by completing the training and development program and become capable of delivering an awesome customer service......

Words: 253 - Pages: 2

Building an Access Control System

...Building an Access Control System Strayer University CIS 210 Systems Analysis and Development 4/28/13 Scope The scope of this project is to install an access control system (ACS) into a college dormitory. This ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. To complete this project we will start with the analysis and design stage. The creation of various design documents will be performed during this stage. The next stage will be the development stage. During this stage we will either create a new database or use the school’s existing database. The 3rd stage will be the integration stage. During this stage, the physical installation of the system will occur. The 4th stage will be the testing stage. The final stage will be the maintenance phase. The maintenance phase is on-going. Major Tasks 1. Analysis and Design a) Design Documentation i. With this task, documentation is written up to describe the work that needs to be completed. This documentation is reviewed by all stake holders to ensure that the requirements are have been accurately conveyed and understood. b) Design Models i. With this task, flow charts and/or use case are created to describe the functionality.......

Words: 508 - Pages: 3

Building an Access Control System

...vulnerability analysis, focus on entry points to gather critical systems and data. By understanding the basic approach used by hackers to target organizations, you will be better equipped to take defensive measures you will be better equipped and know what you are up against. There are steps involved in scanning a network, the following points will highlight them. 1) Check for live systems, 2) Check for open ports, 3) Fingerprint the operating system, 4) Scan for vulnerabilities, 5) Probe the network. Tools that can be used to detect scanning threats and countermeasures that a company can use to deter and avoid vulnerabilities are as follows. “Spoofing user identity -use strong authentication for passwords, do not store secrets (for example, passwords) in plaintext. Do not pass credentials in plaintext over the Internet. Tampering with data –use data hashing and signing, use digital signatures, use strong authorization, use tamper-resistant protocols across communication links, secure communication links with protocols that provide message integrity”. (Microsoft.com) Port scanning is one of the most common reconnaissance techniques used by hackers to discover the vulnerabilities in the services listening at well-known ports such as the internet and DNS. “Some live system scanning tools are Angry IP Scanner a windows IP scanner that scans IPs of any range. It simply pings each IP address to check whether or not the system is alive. Nmap is used for port scanning. Nmap......

Words: 996 - Pages: 4

Building an Access Control System

...STUDY 1 Building an Access Control System As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: Include a one-half page project scope statement. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Building an Access Control System CIS210 Building an Access Control System Introduction An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control......

Words: 1248 - Pages: 5

Ward-Leonard Control System

...Generation System Introduction: A control system generally controls, regulates, and updates its output continuously based on present inputs, nature of the system, and the past outputs. In other words, there is a feedback mechanism that is inherent in the system, and is called a closed loop control system. For example, adding an emitter resistance to a common emitter amplifier, results in a negative feedback mechanism in the amplifier system – if the output current increases, the input voltage decreases accordingly so as to reduce the output current; if the output current decreases, then the input voltage increases in order to raise the output current level. Negative feedback thus ensures that the output is always controlled to stay within an optimal range. Similarly other systems may exhibit a positive feedback mechanism. In either case, a control system can be represented as follows: Figure 1: Control System representation In Figure 1, G represents the forward loop function and Fb represents the feedback function. In case the Fb function is absent, the system is reduced to an open loop system. The most popular representation of control systems is using the ‘Block Diagram’ approach (Balakrishnan, 1988). Each component in the system is represented as a block, with its role represented as a mathematical function. From the block diagram representation, the overall function of the system, called the transfer function, is obtained. The transfer function of a system is......

Words: 2302 - Pages: 10

Case Study 1: Building an Access Control System

...Running head: CASE STUDY 1 BUILDING AN ACCESS CONTROL SYSTEM 1 Building an Access Control System Case Study 1 Holly Dillon Professor Jennifer Merritt Systems Analysis and Development CIS/210 April 28th, 2014 BUILDING AN ACCESS CONTROL SYSTEM 2 Building an Access Control System Project Scope Description As a member of the Information Security Team at a small College, I have been made the Project Manager to install an Access Control System (ACS) in a dormitory. For this small College an ACS (Access Control System) needs to be implemented to unlock the dormitory doors, to record a person as they use their identification card to unlock the door. An electronic proximity reader is needed to integrated with the existing security camera system with the camera’s being able to face and rotate at the door. The tasks to put in place are simple and easy to follow along with guidelines for each step. Rosenblatt. (2012). The five major tasks with descriptive information that I am putting in place with a timeline for the project are as follows: Rosenblatt. (2012). Obtain Authorization To obtain documentation authorization you on the go ahead of the project, its planning, implementation, testing, and training of the system 1 Day Develop Plan Developing a......

Words: 886 - Pages: 4

: Building an Access Control System

...Case Study 1: Building an Access Control System Due Week 3 and worth 50 points As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: 1. Include a one-half page project scope statement. 2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. 3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). 4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Your assignment must follow these formatting requirements:  Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.  Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the......

Words: 363 - Pages: 2

Building an Access Control System

...replicate • Domain Policies – what policies are going to be active • 1.1, 1.2, and 1.3 project proposal Provide a list of at least 3 different sources used to create the Data Communications, Technical Support, and Customer Support systems for the implementation plan. Also, provide a list of at least 2 sources on Frame Relay, Firewalls, and email standards. Be sure you use APA format for your resource list. Week 6 • Group Standards – in addition to default user, what type and local, global, or universal. • Username Standards – how IDs are going to be defined • Computer Name Standards – how computer IDs are going to be defined • Account Policies – Options such as password complexity, when it expires, etc. • Backup strategy – hardware and software for back up. Has to be in house • Firewall – type, cost, and how many, and why • Virtualization –Vmware or other, and why • Proxy Setup – needed or not. Handles internet traffic more efficiently • Intrusion Detection System – type, why and cost • Frame Relay Configuration – need for WAN on the router. Sample config, including DLCI numbers • 3.1 -3.4 of project proposal Week 7 • Software – type, cost and why • Security Deployments/ Concerns • Graphical Layout, Charts • Email System and Standards – type, cost, and why. Cannot be outsource • Software Engineering - • Wireless- type, cost ,and why • Telephony Services – type, cost, and why • Web solution – type, cost and why • VPN Strategy – type,......

Words: 1078 - Pages: 5

Applied System Theroy

...1.0 Introduction Organizational systems, such as companies and value chains, have been studied in order to enhance the performance of entirety. System theory may help with the analysis of the real problems as well as finding the solutions. Based on the Applied System Theory “A system consist of element s discernible within the total reality (universe), defined by the aims of the investigator. All these elements have at least one relationship with another elements within the system and may have relationships with other elements within total reality” (Dekkers, 2015: 16). As the running of the stimulation of the QPQ company, the concept of Applied System Theory has been applied to the practice. The experiment was divided into two round, which were the trial run and actual run. The processes and the output differed with each other. With the comparison, problem in the systems have emerged and with the analysis of the deficiency, measures have been taken to achieve the development of performance. This report will firstly clarify the details of the trial run and actual run of the QPQ company with data collected, following by the analysis of the problem based on the system approaches raised by Applied System Theory. As the final part of the report, solutions and the recommendation of how to solving the system deficiency will be presented. 2.0 The summary of experiments 2.1 The trial run There were 11 people attended the experiments totally with the production of one car,......

Words: 2044 - Pages: 9

Building an Access Control System

... Building an Access Control System Tirsit Adnew Srayer University Professor, Mohammad Abedin 4/20/2015 Access Control system is important matter to secure the work place specially Hospitals, School, and government office. Controlling who has access to your office space is crucial in today’s dynamic business environment, from large government agencies and multinational corporations down to a single office suite and everything in between, to building Access control system first I have to go with information security see to see what and where to put the access control system, analyze how many rooms are there and if each dormitory need an access and where they need to put, and how many people needs the key to inter the dormitory, after analyzing the place and material I need to secure the small college dormitory. I have to go back what is the market for the material I need and give them an estimate to start the work. 1. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. 2. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). 3. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory....

Words: 305 - Pages: 2

Case Study 1: Building an Access Control System

...Project Scope This project scope is to install Access Control System (ACS) in the college dormitory. To identify the project’s goals, objectives, deliverables, tasks, costs, deadlines, expected leading staffing and none-staffing resources needed (Bidgoli, 2014). For a project this size, the company is limited to using current staff to complete the project. The size of the dormitory is five doors entering and exiting the building. The building has five moving cameras installed located at each doorway. The project is set for thirty days completion timetable. The current system analyst will be the project manager, and his responsibilities are as follows: • Project planning – identifying the project task estimating the completion time and cost of the project. • Project Scheduling – Creating a timetable for specific tasks. • Project monitoring – Guiding, supervising, and coordination the team's workload, and making decisions based on the team's workload and taking action to make corrections to keep the project on track. • Project reporting – This includes updates from his management, about current users and project team members on attitude and the overall effort of the team. (Rosenblatt J.H., 2014) A successful project will be completed on time, within budget and deliver a quality product that meets all requirements that were requested. A listing of the primary task and subtask are as follows: • Obtain equipment 1. Request bids from different vendors. 2. Evaluate...

Words: 326 - Pages: 2

Project Control Systems Integration

...Reprinted from PHARMACEUTICAL ENGINEERING® The Official Magazine of ISPE September/October 2011, Vol. 31 No. 5 www.ISPE.org ©Copyright ISPE 2011 The article presents the implementation of a suite of software packages that together provide a total Enterprise project management system. The Science of Project Management: Project Controls Systems Integration by Frederick Cramer, Susanne Keller, Christopher Law, Thomas Shih, and Britton Wolf G The concepts in this article were applied to the ECP-1 Facility, Overall Winner of the 2010 Facility of the Year Awards. For further information on this project, see “Case Study: Genentech’s ECP-1 Bacterial Manufacturing Facility, Overall Winner, 2010 Facility of the Year Awards” in the March/April 2011 issue of Pharmaceutical Engineering. Project Controls Systems Integration Background enentech is among the world’s leading biotech companies with multiple products on the market and a drive to discover, develop, manufacture, and commercialize new medicines to treat patients with serious or life-threatening medical conditions. In 2005, Genentech was ramping-up a build program due to increased demand for existing and new medicines about to come to market. By that time, Genentech had grown from a small biotech company with less than 3,000 employees in 1995 to more than 9,000 employees. It quickly became apparent that an ad hoc approach to project management of capital......

Words: 5656 - Pages: 23

Case Study 1: Building an Access Control System

...Case Study 1: Building an Access Control System Building an Access Control System Marcelino P Figueroa Dr. Shah Strayer University, Woodbridge - VA ​This Project consist of a team of five specialists that will work together to successfully build an Access Control System for a College campus that has existing cameras. Pete will be leading the team of five on this project with that he will also be responsible of the projects progress, he will be in constant follow up with the senior management to deliver real time project completions and analyzing every task throughout the way. The first task is to Order all that is need to build the access control system. Pete assigned Chris, Kevin, Tonia, and Rich to review the industry leading ACS (Access Control Systems) methods in order to better fulfill the college campus’s security needs, they have two days to complete the task. Tonia has been assigned to select the components within four hours once complete she has to select the materials which needs to be complete within four hours. Chris is responsible on ordering the selected components and materials within two hours, while the ordering task is under-way, Jerry posted the maintenance signs all around the college campus to create awareness of the work that’s in the process. Once the components and materials are received in its entirety Chris, Kevin, Jerry, and Rich will team up to build and install the access control system. Once the installing task is complete,...

Words: 369 - Pages: 2

Setting Up an Internal Control System

...SETTING UP INTERNAL CONTROLS IN A CORPORATE ORGANIZATION BY OBATOMI JOSEPH(ACA, ACE ,HND (ACCA/ BSC APPLIED ACCOUNTING,OXFORD BRKS UN-IN VIEW) Every corporate organization either profit motivated or nonprofit motivated is exposed to one peril or the other. These perils could be financial or non- financial. These could be fire, accidents, natural disasters, and other destruction of assets. But the most frequent losses that businesses and non profit organizations suffer are from theft and embezzlement. The proximate cause of this write up is to enable firms to adopt the instrumentality of building and effective internal control to discover the inherent business risks and how to eliminate or reduce to a barest minimum and acceptable level. Your chiropractic practice, like all other businesses, must establish internal controls as soon as you open. Internal controls are those measures businesses use to guard against waste, error, and fraud. Losses can come from external sources, such as robbery and burglary, but they are most likely to come from internal sources, such as employee theft and embezzlement. My approach to setting up an internal control facility is to proceed according to a pre-defined process that has been broken down into stages. As each milestone is reached, I check that all intermediate objectives have been achieved. Vivid transparency must be exhibited throughout all planning and implementation phases so that the opportunity to exert an influence at every...

Words: 1527 - Pages: 7