نتایج جستجو برای: hvac operation mode

تعداد نتایج: 421993  

2016
Weili Xu Khee Poh Lam Adrian Chong Omer T. Karaguzel

This paper proposes a computational building design support framework. The framework evaluates and optimizes building envelope systems, electrical systems and HVAC systems simultaneously with the assistance of a newly developed EnergyPlus component cost database. The integrated building system evaluation could potentially reveal the trade-offs among different building systems and help clients a...

Journal: :Energies 2021

The heating, ventilation, and air conditioning (HVAC) system serving the test room of SENS i-Lab Department Architecture Industrial Design University Campania Luigi Vanvitelli (Aversa, south Italy) has been experimentally investigated through a series tests performed during both summer winter under normal faulty scenarios. In particular, five distinct typical faults have artificially implemente...

Journal: :Energy and Buildings 2021

ASHRAE Guideline 36: High-performance sequences of operation (SOO) for Heating, Ventilation, and Air-conditioning (HVAC) Systems has been demonstrated to save 17%-30% energy under ideal simulation environments. However, HVAC systems are susceptible various types faults in a real building operation. There no existing studies that pertain comprehensive fault impact analysis the high-performance c...

Journal: :IACR Cryptology ePrint Archive 2004
David A. McGrew Scott R. Fluhrer

We describe a block cipher mode of operation that implements a ‘tweakable’ (super) pseudorandom permutation with an arbitrary block length. This mode can be used to provide the best possible security in systems that cannot allow data expansion, such as disk-block encryption and some network protocols. The mode accepts an additional input, which can be used to protect against attacks that manipu...

Journal: :IACR Cryptology ePrint Archive 2006
Peng Wang Dengguo Feng Wenling Wu

The MEM mode is a nonce-based enciphering mode of operation proposed by Chakraborty and Sarkar, which was claimed to be secure against symmetric nonce respecting adversaries. We show that this is not correct by using two very simple attcks. One attack need one decryption and one decryption queries, and the other only need one encryption query.

1999
Bent Petersen Lawrence S. Welch

The standard formula in theoretical and empirical studies of entry mode choice and internationalization processes of firms has been ‘one foreign country, one operation mode’, i.e. a singular mode approach. However, even with fairly broad operation mode definitions it is by no means exceptional to see firms having more than one operation mode in a foreign country. This paper explores the phenome...

2009
Kasper Borup

This report is a survey of the authenticated encryption mode EAX proposed M. Bellare, P. Rogaway, D. Wagner [1] ; Definitions, theorems and proofs has been slighty changed to make them more similar to the framework of the course. The definitions in Stinson [7] , and the definitions of oracle proofs in the lecture notes by Ivan Bjerre Damgaard[3][4]. This is done to meet the formal requirement o...

2008
ANDREJ HROVAT TOMAŽ JAVORNIK GORAZD KANDUS

In the paper, we gave after a brief overview of free space, Bacon and CEPT SE21 propagation models, mentioned in the TETRA Direct Mode Operation (DMO) standard, the comparison of the path losses, calculated by two-ray and multi-wall models and pass losses, obtained by field measurement campaign. We found out, that the tworay model is suitable for fast estimation of the TETRA DMO signal coverage...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید