scholarly journals Some assembly required : an architectural systems approach to future requirements

2021 ◽  
Author(s):  
Roman Pevcevicius

This thesis examines how a building can respond to changes in user needs. Specifically, the research component of this publication seeks to understand how and why buildings change, using primarily a typomorphological based approach to the urban condition. Research methods used in this thesis include literature reviews, case studies, and design experimentation. The design portion of this thesis responds by taking a systems approach to architecture that can be used to deal with user issues of program and form over time. The design proposal utilizes a prefabricated system that is comprised of 5 main elements. Combined, these elements produce multiple design opportunities that allow for future changes through the standardization of fabrication and construction techniques. The system is designed for future modifications through modular structure and elements. This allows for the addition, replacement, and upgrade of rooms, floors, walls, or entire buildings as its user needs change.

2021 ◽  
Author(s):  
Roman Pevcevicius

This thesis examines how a building can respond to changes in user needs. Specifically, the research component of this publication seeks to understand how and why buildings change, using primarily a typomorphological based approach to the urban condition. Research methods used in this thesis include literature reviews, case studies, and design experimentation. The design portion of this thesis responds by taking a systems approach to architecture that can be used to deal with user issues of program and form over time. The design proposal utilizes a prefabricated system that is comprised of 5 main elements. Combined, these elements produce multiple design opportunities that allow for future changes through the standardization of fabrication and construction techniques. The system is designed for future modifications through modular structure and elements. This allows for the addition, replacement, and upgrade of rooms, floors, walls, or entire buildings as its user needs change.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Mila Schwartz ◽  
Claudine Kirsch ◽  
Simone Mortini

AbstractDrawing on two longitudinal case-studies, this study aimed to identify some salient characteristics of the agentic behaviour of two young emergent multilinguals in two different multilingual contexts: Luxembourg and Israel. Despite the fact that the studies were conducted independently, the two cases were analysed together owing to the similarities in the research methods such as video-recorded observations, and semi-structured interviews with teachers and parents. The data were analysed through thematic and conversational analyses. Findings showed that a boy who learned Luxembourgish in Luxembourg and a girl who learned Hebrew in Israel, were outgoing and active learners who influenced their learning environment. We identified 10 types of agentic behaviour, including engaging in repetition after peers and the teacher, creatively producing language, translanguaging, and self-monitoring. Despite differences of the children’s sociocultural and linguistic backgrounds, and the language policies of their educational settings, we found a striking overlap in their language-based agentic behaviours. We suggest that the identified types can encourage further research in this field. Although our study with talkative children allowed us to observe many types of agentic behaviours, we cannot claim that less outgoing children or children who do not show the same behaviours do not have ways of expressing their agency.


Author(s):  
Kevin K. C. Hung ◽  
Sonoe Mashino ◽  
Emily Y. Y. Chan ◽  
Makiko K. MacDermot ◽  
Satchit Balsari ◽  
...  

The Sendai Framework for Disaster Risk Reduction 2015–2030 placed human health at the centre of disaster risk reduction, calling for the global community to enhance local and national health emergency and disaster risk management (Health EDRM). The Health EDRM Framework, published in 2019, describes the functions required for comprehensive disaster risk management across prevention, preparedness, readiness, response, and recovery to improve the resilience and health security of communities, countries, and health systems. Evidence-based Health EDRM workforce development is vital. However, there are still significant gaps in the evidence identifying common competencies for training and education programmes, and the clarification of strategies for workforce retention, motivation, deployment, and coordination. Initiated in June 2020, this project includes literature reviews, case studies, and an expert consensus (modified Delphi) study. Literature reviews in English, Japanese, and Chinese aim to identify research gaps and explore core competencies for Health EDRM workforce training. Thirteen Health EDRM related case studies from six WHO regions will illustrate best practices (and pitfalls) and inform the consensus study. Consensus will be sought from global experts in emergency and disaster medicine, nursing, public health and related disciplines. Recommendations for developing effective health workforce strategies for low- and middle-income countries and high-income countries will then be disseminated.


2021 ◽  
Vol 17 (3) ◽  
pp. 1-38
Author(s):  
Lauren Biernacki ◽  
Mark Gallagher ◽  
Zhixing Xu ◽  
Misiker Tadesse Aga ◽  
Austin Harris ◽  
...  

There is an increasing body of work in the area of hardware defenses for software-driven security attacks. A significant challenge in developing these defenses is that the space of security vulnerabilities and exploits is large and not fully understood. This results in specific point defenses that aim to patch particular vulnerabilities. While these defenses are valuable, they are often blindsided by fresh attacks that exploit new vulnerabilities. This article aims to address this issue by suggesting ways to make future defenses more durable based on an organization of security vulnerabilities as they arise throughout the program life cycle. We classify these vulnerability sources through programming, compilation, and hardware realization, and we show how each source introduces unintended states and transitions into the implementation. Further, we show how security exploits gain control by moving the implementation to an unintended state using knowledge of these sources and how defenses work to prevent these transitions. This framework of analyzing vulnerability sources, exploits, and defenses provides insights into developing durable defenses that could defend against broader categories of exploits. We present illustrative case studies of four important attack genealogies—showing how they fit into the presented framework and how the sophistication of the exploits and defenses have evolved over time, providing us insights for the future.


Author(s):  
Leif M. Burge ◽  
Laurence Chaput-Desrochers ◽  
Richard Guthrie

Pipelines can be exposed at water crossings where rivers lower the channel bed. Channel bed scour may cause damage to linear infrastructure such as pipelines by exposing the pipe to the flow of water and sediment. Accurate estimation of depth of scour is therefore critical in limiting damage to infrastructure. Channel bed scour has three main components: (1) general scour, (2) bed degradation, and (3) pool depth. General scour is the temporary lowering of the channel bed during a flood event. Channel bed degradation is the systematic lowering of a channel bed over time. Pool depth is depth of pools below the general bed elevation and includes the relocation of pools that result from river dynamics. Channel degradation is assessed in the field using indicators of channel incision such as channel bed armoring and bank characteristics, through the analysis of long profiles and sediment transport modelling. Pool depth is assessed using long profiles and channel movement over time. The catastrophic nature of bed lowering due to general scour requires a different assessment. A design depth of cover is based on analysis of depth of scour for a given return period (eg. 100-years). There are three main steps to predict general scour: (1) regional flood frequency analysis, (2) estimation of hydraulic variables, and (3) scour depth modelling. Typically, four scour models are employed: Lacey (1930), Blench (1969), Neill (1973), and Zeller (1981), with the average or maximum value used for design depth. We provide herein case studies for potential scour for pipeline water crossings at the Little Smoky River and Joachim Creek, AB. Using the four models above, and an analysis of channel degradation and pool depth, the recommended minimum depth of cover of 0.75 m and 0.142 m, respectively, were prescribed. Variability between scour models is large. The general scour model results varied from 0.45 m and 0.75 m for the Little Smoky River and 0.16 m to 0.51 m for Joachim Creek. While these models are more than 30 years old and do not adequately account for factors such as sediment mobility, they nevertheless do provide usable answers and should form part of the usual toolbox in water crossing scour calculations.


2016 ◽  
Vol 15 (1) ◽  
pp. 67-90 ◽  
Author(s):  
Adrien Querbes ◽  
Koen Frenken

We propose a generalized NK-model of late-mover advantage where late-mover firms leapfrog first-mover firms as user needs evolve over time. First movers face severe trade-offs between the provision of functionalities in which their products already excel and the additional functionalities requested by users later on. Late movers, by contrast, start searching when more functionalities are already known and typically come up with superior product designs. We also show that late-mover advantage is more probable for more complex technologies. Managerial implications follow.


2000 ◽  
Vol 45 (2) ◽  
pp. 171-208 ◽  
Author(s):  
Marcelo J. Borges

This article applies a systems approach to the analysis of multiple circuits of labor migration that emerged in the Algarve, southern Portugal, from the late eighteenth century to the mid 1900s, and their connections. Over time Algarvian migrants participated in three main systems of migration: internal migration and migration to southern Spain and Gibraltar, transatlantic migration to the Americas and Africa – especially to Argentina – and migration to northern Europe. Rather than an abrupt break with a sedentary past, the article shows how the beginnings of transatlantic migration at the turn of the century were the result of modification and adaptation of existing strategies of labor migration.


2021 ◽  
Vol 4 (2) ◽  
pp. 774-795
Author(s):  
I Gusti Putu Anom Kresna Wardana ◽  
Tsaltsa Syah Putri ◽  
Tunggal Bayu Laksono

Every country in the world has sovereignty, especially over the security of its country, one of the things that can threaten the security of the country is the entry of foreigners whose activities are not according to the permits given to them, one of which is the misuse of residence permits by foreign investors in Indonesia. This study aims to explain in detail about the misuse of residence permits by a foreign investor in Indonesia and further discusses the legal supervision carried out by Immigration in dealing with irregularities committed by foreigners. This study uses a descriptive type with empirical normative research methods, where in finding data sourced from secondary data, namely through interviews, and secondary data obtained by conducting literature reviews such as laws and other regulations. At this writing it was found that the perpetrators took actions that were not in accordance with the purpose of giving a residence permit and did not carry out proper procedures to obtain a new Limited Stay Permit. From this research, it can be concluded that the supervision of foreigners must be tightened, one of which is the effective and efficient implementation of the Foreigner Supervision Team which is formed on the basis of synergy between related Ministries/Institutions in Indonesia.


Sign in / Sign up

Export Citation Format

Share Document