966 resultados para Lightweight and heavyweight concrete


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fly ash was used to replace 15% of the cement in C3WR and C6WR concrete paving mixes containing ASTM C494 Type A water reducin9 admixtures. Two Class C ashes and one Class F ash from Iowa approved sources were examined in each mix. When Class C ashes were used they were substituted on the basis of 1 pound of ash added for each pound of cement deleted. When Class F was used it was substituted on the basis of 1.25 pounds of ash added for each pound of cement deleted. Compressive strengths of the water reduced mixes, with and without fly ash, were determined at 7, 28, and 56 days of age. In every case except one the mixes containing the fly ash exhibited higher strengths than the same concrete mix without the fly ash. An excellent correlation existed between the C3WR and C6WR mixes both with and without fly ash substitutions. The freeze-thaw durability of the concrete studied was not affected by presence or absence of fly ash. The data gathered suggests that the present Class C water reduced concrete paving mixes can be modified to allow the substitution of 15% of the cement with an approved fly ash.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Epoxy coatings have been used on the embedded reinforcing bars of bridge decks since the mid-1970s to mitigate deterioration caused by chloride-induced corrosion. The use of chloride-based deicers became common in the early 1960s and caused corrosion of conventional uncoated bars in bridge decks within 5 to 10 years of commencement of deicer applications. In response to this rapid deterioration, the National Bureau of Standards researched coatings to protect the reinforcement (National Bureau of Standards, 1975), resulting in the development of epoxy-coated reinforcing bars, which were used in bridge decks beginning in 1973. While corrosion-related deterioration has been prevalent on bridge decks with uncoated reinforcing bars in northern climates where the use of deicing salts is common, bridge decks constructed after 1973 with epoxy-coated reinforcing have shown good corrosion resistance with only limited exceptions. On the whole, previous laboratory and field studies regarding the performance of epoxy-coated reinforcing bars are very promising; however, some laboratory and field studies have yielded differing results. In recent years, maintenance personnel for the Iowa Department of Transportation (Iowa DOT) have reportedly performed patch repairs to some bridge decks reinforced with epoxy-coated bars. At one such bridge, the southbound US 65 bridge (Bridge No. 7788.5L065) over the Union Pacific Railroad near Bondurant in Polk County, Iowa, deck repairs were performed by Iowa DOT maintenance personnel in the Spring of 2010, based on our communications regarding this topic with Mr. Gordon Port of the Iowa DOT. These repairs were observed by engineers from the Iowa DOT Office of Bridges and Structures, who reported that significant corrosion was found at a number of epoxy-coated reinforcing bars uncovered during this patch work. These repairs were reportedly performed at spalls and delaminated areas corresponding to cracks over transverse reinforcing bars, and involved careful removal of the concrete from over the bars. Figures 1 through 4 contain photographs provided by Iowa DOT personnel showing the removal process (Figure 1), the conditions encountered (Figures 2 and 3), and close-up views of the corroded reinforcing (Figure 4). As a result of these observations, the Iowa Department of Transportation has requested this study to gain further understanding of the long-term performance of bridge decks reinforced with epoxy-coated bars. The two main objectives of this study are to determine the long-term effectiveness of the epoxy coatings and to determine the potential causes for the deterioration at locations where corrosion has occurred. Wiss, Janney, Elstner Associates, Inc. (WJE) and the Iowa DOT identified eight different bridge decks across Iowa for this study that were constructed using epoxy-coated reinforcing bars. A field investigation consisting of visual inspections, a delamination survey, a concrete cover survey, electrical testing for susceptibility to corrosion, and concrete sampling was conducted within a survey area deemed to be representative of the condition of each bridge deck. Laboratory testing, including chloride ion content testing, characterization of the extracted bars, petrographic examination of the concrete, and carbonation testing, was conducted on the core samples taken from each bridge deck.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This project continues the research which addresses the numerous bridge problems on the Iowa secondary road system. It is a continuation (Phase 2) of Project HR-382, in which two replacement alternatives (Concept 1: Steel Beam Precast Units and Concept 2: Modification of the Benton County Beam-in-Slab Bridge) were investigated. In previous research for concept 1, a precast unit bridge was developed through laboratory testing. The steel-beam precast unit bridge requires the fabrication of precast double-tee (PCDT) units, each consisting of two steel beams connected by a reinforced concrete deck. The weight of each PCDT unit is minimized by limiting the deck thickness to 4 in., which permits the units to be constructed off-site and then transported to the bridge site. The number of units required is a function of the width of bridge desired. Once the PCDT units are connected, a cast-in-place reinforced concrete deck is cast over the PCDT units and the bridge railing attached. Since the steel beam PCDT unit bridge design is intended primarily for use on low-volume roads, used steel beams can be utilized for a significant cost savings. In previous research for concept 2, an alternate shear connector (ASC) was developed and subjected to static loading. In this investigation, the ASC was subjected to cyclic loading in both pushout specimens and composite beam tests. Based on these tests, the fatigue strength of the ASC was determined to be significantly greater than that required in typical low volume road single span bridges. Based upon the construction and service load testing, the steel-beam precast unit bridge was successfully shown to be a viable low volume road bridge alternative. The construction process utilized standard methods resulting in a simple system that can be completed with a limited staff. Results from the service load tests indicated adequate strength for all legal loads. An inspection of the bridge one year after its construction revealed no change in the bridge's performance. Each of the systems previously described are relatively easy to construct. Use of the ASC rather than the welded studs significantly simplified the work, equipment, and materials required to develop composite action between the steel beams and the concrete deck.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Iowa Department of Transportation is responsible for maintaining approximately 3800 bridges throughout the State. Of these bridges approximately 3200 have concrete decks. The remaining bridges have been constructed or repaired with a Portland Cement (P. C.) concrete overlay. Surveys of the overlays have indicated a growing incidence of delaminations and surface distress. The need to replace or repair the overlay may be dictated by the amount of delamination in the deck. Additionally, the concrete bridges are periodically inspected and scheduled for the appropriate rehabilitation. Part of this analysis is an assessment of the amount of delamination present in the deck. The ability to accurately and economically identify delamination in overlays and bridge decks is necessary to cost-effectively evaluate and schedule bridge rehabilitation. There are two conventional methods currently being used to detect delaminations. One is ref erred to as a chain drag method. The other a electro-mechanical sounding method (delamtect). In the chain drag method, the concrete surface is struck using a heavy chain. The inspector then listens to the sound produced as the surface is struck. The delaminated areas produce a dull sound as compared to nondelaminated areas. This procedure has proved to be very time consuming, especially when a number of small areas of delamination are present. With the · electro-mechanical method, the judgement of the inspector has been eliminated. A· device with three basic components, a tapping device, a sonic receiver, and a system of signal interpretation has been developed. This· device is wheeled along the deck and the instrument receives and interprets the acoustic signals generated by the instrument which in turn are reflected through the concrete. A recently developed method of detecting delaminations is infrared thermography. This method of detection is based on the difference in surface temperature which exists between delaminated and nondelaminated concrete under certain atmospheric conditions. The temperature difference can reach 5°C on a very sunny day where dry pavement exists. If clouds are present, or the pavement is wet, then the temperature difference between the delaminated and nondelaminated concrete will not be as great and therefore more difficult to detect. Infrared thermography was used to detect delaminations in 17 concrete bridge decks, 2 P. C. concrete overlays, and 1 section of continuously reinforced concrete pavement (CRCP) in Iowa. Thermography was selected to assess the accuracy, dependability, and potential of the infrared thermographic technique.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This project continues the research which addresses the numerous bridge problems on the Iowa secondary road system. It is a continuation (Phase 2) of Project HR-382, in which two replacement alternatives (Concept 1: Steel Beam Precast Units and Concept 2: Modification of the Benton County Beam-in-Slab Bridge) were investigated. In previous research for concept 1, a precast unit bridge was developed through laboratory testing. The steel-beam precast unit bridge requires the fabrication of precast double-tee (PCDT) units, each consisting of two steel beams connected by a reinforced concrete deck. The weight of each PCDT unit is minimized by limiting the deck thickness to 4 in., which permits the units to be constructed off-site and then transported to the bridge site. The number of units required is a function of the width of bridge desired. Once the PCDT units are connected, a cast-in-place reinforced concrete deck is cast over the PCDT units and the bridge railing attached. Since the steel beam PCDT unit bridge design is intended primarily for use on low-volume roads, used steel beams can be utilized for a significant cost savings. In previous research for concept 2, an alternate shear connector (ASC) was developed and subjected to static loading. In this investigation, the ASC was subjected to cyclic loading in both pushout specimens and composite beam tests. Based on these tests, the fatigue strength of the ASC was determined to be significantly greater than that required in typical low volume road single span bridges. Based upon the construction and service load testing, the steel-beam precast unit bridge was successfully shown to be a viable low volume road bridge alternative. The construction process utilized standard methods resulting in a simple system that can be completed with a limited staff. Results from the service load tests indicated adequate strength for all legal loads. An inspection of the bridge one year after its construction revealed no change in the bridge's performance. Each of the systems previously described are relatively easy to construct. Use of the ASC rather than the welded studs significantly simplified the work, equipment, and materials required to develop composite action between the steel beams and the concrete deck.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of a high range water reducer in bridge floors was initiated by an Iowa Highway Research Board project (HR-192) in 1977 for two basic reasons. One was to determine the feasibility of using a high range water reducer (HRWR) in bridge floor concrete using conventional concrete proportioning, transporting and finishing equipment. The second was to determine the performance and protective qualities against chloride intrusion of a dense concrete bridge floor by de-icing agents used on Iowa's highways during winter months. This project was basically intended to overcome some problems that developed in the original research project. The problems alluded to are the time limits from batching to finishing; use of a different type of finishing machine; need for supplemental vibration on the surface of the concrete during the screeding operation and difficulty of texturing. The use of a double oscillating screed finishing machine worked well and supplemental vibration on one of the screeds was not needed. The limit of 45 minutes from batching the concrete to placement on the deck was verified. This is a maximum when the HRWR is introduced at the batch plant. The problem of texturing was not solved completely but is similar to our problems on the dense "Iowa System" overlay used on bridge deck repair projects. This project reinforced some earlier doubts about using truck transit mixers for mixing and transporting concrete containing HRWR when introduced at the batch plant.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In coordination with a Technical Advisory Committee (TAC) consisting of County Engineers and Iowa DOT representatives, the Iowa DOT has proposed to develop a set of standards for a single span prefabricated bridge system for use on the local road system. The purpose of the bridge system is to improve bridge construction, accelerate project delivery, improve worker safety, be cost effective, reduce impacts to the travelling public by reducing traffic disruptions and the duration of detours, and allow local forces to construct the bridges. HDR Inc. was selected by the Iowa DOT to perform the initial concept screening of the bridge system. This Final Report summarizes the initial conceptual effort to investigate potential systems, make recommendations for a preferred system and propose initial details to be tested in the laboratory in Phase 2 of the project. The prefabricated bridge components were to be based on the following preliminary criteria set forth by the TAC. The criteria were to be verified and/ or modified as part of the conceptual development. - 24’ and 30’ roadway widths - Skews of 0o, 15o, and 30o - Span lengths of 30’ – 70’ in 10’ increments using precast concrete beams - Voided box beams could be considered - Limit precast element weight to 45,000 pounds for movement and placement of beams - Beams could be joined transversely with threaded rods - Abutment concepts may included precast as well as an option for cast-in-place abutments with pile foundations In addition to the above criteria, there was an interest to use a single-width prefabricated bridge component to simplify fabrication as well as a desire to utilize non-prestressed concrete systems where possible to allow for precasting of the beam modules by local forces or local precast plants. The SL-1 modular steel bridge rail was identified for use with this single span prefabricated bridge system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wet pavement friction is known to be one of the most important roadway safety parameters. In this research, frictional properties of flexible (asphalt) pavements were investigated. As a part of this study, a laboratory device to polish asphalt specimens was refined and a procedure to evaluate mixture frictional properties was proposed. Following this procedure, 46 different Superpave mixtures, one stone matrix asphalt (SMA) mixture and one porous friction course (PFC) mixture were tested. In addition, 23 different asphalt and two concrete field sections were also tested for friction and noise. The results of both field and laboratory measurements were used to develop an International Friction Index (IFI)-based protocol for measurement of the frictional characteristics of asphalt pavements for laboratory friction measurements. Based on the results of the study, it appears the content of high friction aggregate should be 20% or more of the total aggregate blend when used with other, polish susceptible coarse aggregates; the frictional properties increased substantially as the friction aggregate content increased above 20%. Both steel slag and quartzite were found to improve the frictional properties of the blend, though steel slag had a lower polishing rate. In general, mixes containing soft limestone demonstrated lower friction values than comparable mixes with hard limestone or dolomite. Larger nominal maximum aggregate size mixes had better overall frictional performance than smaller sized mixes. In addition, mixes with higher fineness moduli generally had higher macrotexture and friction.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The major objective of this project is to evaluate image analysis for characterizing air voids in Portland cement contract (PCC) and asphalt concrete (AC) and aggregate gradation in asphalt concrete. Phase 1 of this project has concentrated on evaluation and refinement of sample preparation techniques, evaluation of methods and instruments for conducting image analysis, and finally, analysis and comparison of a select portion of samples. Preliminary results suggest a strong correlation between the results obtained from the linear traverse method and image analysis methods for determining percent air voids in concrete. Preliminary work with asphalt samples has shown that damage caused by a high vacuum of the conventional scanning electron microscope (SEM) may too disruptive. Alternative solutions have been explored, including confocal microscopy and low vacuum electron microscopy. Additionally, a conventional high vacuum SEM operating at a marginal operating vacuum may suffice.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tämän työn ensisijaisena tavoitteena oli kehittää tietojärjestelmähankkeiden investointiprosessia luomalla kohdeyritykseen yhtenäinen toimintatapa hankkeiden jälkitarkkailuun. Tavoiteltu muutos koskee järjestelmäinvestointien arviointiperusteita sekä niiden käyttöönoton jälkeistä seurantaa. Jälkitarkkailumalli on rakennettu tasapainotettujen mittaristojen viitekehyksestä mittaamalla onnistumista johdon, loppukäyttäjän sekä projektin näkökulmasta. Työn tuloksena on Excel -sovellus sekä toimintatapa sovelluksen käytölle. Esimerkki-investoinnista kerätyn kokemuksen perusteella malli tukee investointiin liittyvien sidosryhmien sitoutumista yhteisiin tavoitteisiin sekä selkeyttää roolijakoa IT - vetoisen projektiryhmän ja yrityksen liiketoiminnallisen johdon välillä. Lisäksi mallin koettiin tukevan käyttöönotetun järjestelmän tavoitelähtöistä johtamista. Käytön laajentuessa mallilla uskotaan olevan yksittäistenhankkeiden lisäksi positiivinen vaikutus myös yrityksen tietojärjestelmähankkeiden investointiprosessiin.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tehokkaimpia keinoja vähentää rakennusten lämmitysenergian kulutusta ja lämmityksen aiheuttavia hiilidioksidi- ja happamoitavia päästöjä on tiukentaa rakentamismääräysten lämmöneristysvaatimuksia. Hyvin lämmöneristetyissä, tiiveissä ja ilmanvaihdoltaan optimoiduissa taloissa on pienet lämpöhäviöt. Näin ympäristöä kuormittava vaikutus saadaan paljon vähemmäksi kuin nykynormien mukaisissa asuinrakennuksissa. Johtumislämpöhäviö pienenee suoraan eristekerroksia paksuntamalla ja siihen on helpointa vaikuttaa. Mitä suurempiin eristepaksuuksiin mennään sen suuremmaksi tulee konvektion osuus kokonaislämpöhäviöstä. Tulevaisuudessa parempia ratkaisuja haetaan erityisesti konvektiosta ja säteilystä aiheutuvien lämpöhäviöiden pienentämiseksi. Eristeen osastointi ilmanpitävillä, vesihöyryä diffuusisesti läpäisevillä pystysuuntaisilla konvektiokatkoilla vähentää tehokkaasti paksun seinäeristeen kuljettumis-ilmavirtauksia. Katkoina käytetään erilaisia kalvoja ja rakennuspapereita, joilla on pieni emissiviteetti. Katkojen merkitys kasvaa, kun mennään uusien normien mukaisiin eristepaksuuksiin. Lämmöneriste voidaan toteuttaa myös kokoamalla ohuita kalvoja paketiksi, jotka jakavat ilmatilan ja siis eristeelle varatun paksuuden suljettuihin ilmaväleihin. Kun kalvoiksi valitaan pieniemissiviteettisiä pintoja, saadaan säteilylämmönsiirto lähes eliminoiduksi. Tällaisen ilmatilan lämmönjohtumisluku lähestyy paikallaan pysyvän ilman lämmönjohtumislukua, l = 0,025 W/Km, eli tällä rakennesysteemillä on mahdollista toteuttaa ohuempia rakenteita kuin perinteisillä eristeillä. Hygroskooppisen massan käyttö sisäilman kosteutta tasaavana rakenteena voi olla tulevaisuutta. Kehitystyö tuottaa uusia, kosteusteknisesti toimivia sovelluksia. Toisaalta palomääräykset tulevat kehitystyötä vastaan. Hygroskooppinen pintamateriaali on kevyt (pieni tiheys) ja paloteknisesti arka. Suoraa sähkölämmitystä ei voida pitää ympäristöystävällisenä. Sen jalostusketju on pitkä ja monivaiheinen. Millä peruspolttoaineella sähköä tuotetaan, vaikuttaa asiaan luonnollisestikin. Suoraa sähkölämmitystä voidaan suositella vain yksinäisen ihmisen taloudessa lämmitysmuotona taloudellisista syistä. Halvan polttoaineen säästöllä ei voida maksaa suuria laiteinvestointeja. Aurinkoenergian hyvä hyödyntäminen edellyttää hyvää säätöä, joka kytkee lämmityksen pois päältä silloin, kun aurinko lämmittää. Auringon hetkelliset säteilytehot ovat suuria verrattuna rakenteen lämpöhäviöihin ja huonetilojen lämmöntarpeeseen. Ratkaisu aurinkoenergian hetkellisyyteen ja paikallisuuteen on energian siirtäminen lämmöntarpeen mukaan rakennuksen eri osiin ja sen varastoiminen päivätasolla. Kun varastoivasta massasta ei ole suoraa yhteyttä ulos, voidaan kerääjäeristeeltä saatu lämpö käyttää häviöttömästi huonetilojen lämmittämiseen. Vaikka lämmitysenergian käytössä päästään 30 % vähennyksiin uudisrakennusten osalta, ei kokonaisenergian käyttö merkittävästi pienene, jos taloussähkön kulutus pysyy vakiona. Sama pätee myös CO2 -päästöihin. Saavutettava etu lämmitys-energian kulutuksessa voidaan hukata yhä suurenevaksi taloussähkön käytöksi, mikä olisi erityisen huono asia ympäristön kannalta.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tämän tutkielman päätavoitteena on tutkia niitä menetelmiä, joilla johdon laskentatoimi tukee strategista johtamista ja selvittää kuinka laskentatointa hyödynnetään strategisessa johtamisprosessissa. Empiirisessä osuudessa analysoidaan SOK-yhtymän kiinteistötoimintojen laskentatoimen ja strategisen johtamisprosessin välistä yhteyttä. Tavoitteena on parantaa tämän tutkimuksen avulla laskentatoimen hyödyntämistä strategisessa johtamisessa. Tutkimusongelman ratkaisemiseksi selvitetään seuraavat aihealueet, niiden selvittämisestä muodostuvat myös tämän tutkimuksen osatavoitteet. Ensimmäisenä osatavoitteena on selvittää doktriiniin perustuen, mistä strategisessa johtamisessa ja johdon strategiaprosessissa on kysymys. Toisena osatavoitteena on tarkastella strategisen laskentatoimen teoriaa ja innovaatioita johdon näkökulmasta. Toisin sanoen, osatavoitteena on siis selvittää, mitä strateginen laskentatoimi on ja millaisia konkreettisia menetelmiä sillä on käytettävissään strategisen johtamisen tukemisessa. Kolmantena osatavoitteena on esitellä tutkielman empiirinen osuus, joka pohjautuu SOK-yhtymän kiinteistötoimintojen strategiseen johtamisprosessiin ja sitä tukevaan johdon laskentatoimeen. Samalla kun tutkitaan johdon toimintoja prosessin eri vaiheissa, esitetään johdon tueksi erilaisia laskennallisia menetelmiä, joista on hyötyä päätöksenteossa ja resurssien suuntaamisessa sekä strategian toteuttamiseen valvonnassa Tässä tutkimuksessa strategista johtamista ja strategista laskentatointa tarkastellaan SOK-yhtymän kiinteistötoimintojen vuoden 2001 tilanteen mukaan osana S-ryhmän ja SOK-yhtymän jatkuvaa strategiaprosessia. Näkökulma tarkastelulle on sekä ylimmän yritysjohdon, että strategisen liiketoimintajohdon.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of the Master’s Thesis is to study the best practices to virtual project management from the project manager’ point of view. The best practices are divided according to a five-phase virtual project life cycle model. Each phase include concrete suggestions for actions. Research’s theoretical background is wide because of the broad subject matter. In the theoretical part topics such as virtual working, virtual project management challenges are examined and some concrete actions to tackle these challenges are introduced. Thesis’ approach is constructive, where a known problem is solved piece by piece after creating a pre-understanding of the topic. Existing research work is utilized when creating a model for virtual project team management. The basis of the model comes from various best practices read from literature and from the interviews conducted on experienced virtual project managers in the case organization. As a result the model combines both previous research and the organizations empirical experience. As an output of the thesis a model for virtual project team management is developed, which can be used as a guideline by the virtual project managers in their work. The model includes actions and practices what can be used to overcome the challenges of virtual project management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The social activity of nurse teacher – a part of teacherhood Every nurse teacher must know the current health policy in order to use it in teaching. The conception of the role of health policy in curriculum and the concrete teaching of social activity are quite unclear. The purpose of this study was to describe the social activity of nurse teachers. The data were collected by a structured questionnaire (Paltta 1998) via E-mail. The questionnaire included background factors and nine items for society activities. The respondents were nurse teachers, teachers for emergency nursing, public health nurse and midwifery teachers from all polytechnics in Finland. Response rate was 46 % (n = 342). The data were analysed by using descriptive statistics. The results of this study showed that 36 % of nurse teachers evaluated themselves quite active in society activities and 43 % of them evaluated themselves inactive. 32 % of nurse teachers was member and involved to working in general organisations. 28 % of nurse teachers worked or have been worked in local commission or trustees. Nurse teachers evaluated their knowledge about health policy quite good (mean 3.75, Std 0.99). Their knowledge about education policy was also quite good (mean 3.57, Std 1.04). Nurse teachers updated their knowledge about health policy and education policy by reading professional journals, newspapers, internet and following television and radio. According to results nurse teachers are quite active in society activities even tough almost half of them evaluated themselves quite inactive. Although nurse teachers’ knowledge about health policy was quite good by their opinion, they must update and improve the knowledge. In the future it is important to study how nurse teachers use health policy in their teaching and how nurse students’ participation in society activities can be improved.