Saudi Cultural Missions Theses & Dissertations
Permanent URI for this communityhttps://drepo.sdl.edu.sa/handle/20.500.14154/10
Browse
8 results
Search Results
Item Restricted Integrating Industry 4.0 in Project Management: A Systematic Literature Review(De MontFort University, 2024-09-20) almehaize, Ghannam nasser; Oyinlola, AdewaleThis thesis investigates Industry 4.0 technologies with the aim of integrating them into project management methodologies to improve efficiency, decision-making, and overall project success. The study investigates the existing studies on the influence of these technologies on project management processes and evaluates the present status of their integration across a variety of sectors. This is accomplished via a comprehensive examination of the available literature and studies. Industry 4.0 technologies have the potential to revolutionise project management by enabling the sharing and analysis of real-time data, according to the results. In addition, they present challenges regarding organisational culture, communication, and skill limitations. This thesis shows that project managers need technical understanding, leadership, and flexibility. This thesis ultimately emphasises the potential of Industry 4.0 technologies to enhance project performance, while also emphasising the need for organisations to modify their project management frameworks in order to prosper in a digital environment that is swiftly evolving. In order to enable organisations to fully realise the promise of these technologies for successful and sustainable development, the study's conclusion calls for further research to develop frameworks that facilitate the effective integration of these technologies.11 0Item Restricted Assessing and Enhancing Protection Measures for Internet of Things (IoT) in Cybersecurity(University of Portsmouth, 2024-09) Alshehri, Abdulrahman; Bader-El-den, MohammedThe Internet of Things (IoT) revolution sweeps across Saudi Arabia, connecting devices, transforming industries, enhancing lives. But with great connectivity comes great vulnerability - cybersecurity threats loom large in this digital frontier. This study delves into the heart of IoT security in the Kingdom, surveying the landscape, probing the defenses, seeking solutions. Through the lens of cybersecurity professionals, we explore current practices, uncover challenges, envision improvements. Our findings paint a picture of a nation at a crossroads: frequent audits needed, authentication protocols lacking, employee training insufficient, encryption underutilized. Yet hope springs eternal in the form of correlations discovered - more vigilant monitoring begets stronger authentication desires. From this research emerges a roadmap for the future: recommendations for policymakers to craft robust regulations, guidelines for organizations to fortify their digital fortresses, advice for end-users to navigate the IoT maze safely. In the rapidly evolving technological tapestry of Saudi Arabia, this study weaves a thread of security consciousness, contributing to a safer, more reliable IoT ecosystem. As the Kingdom marches towards its Vision 2030, may it do so with cybersecurity as its steadfast companion.13 0Item Restricted AN INTEGRATED DIGITAL TWIN FRAMEWORK AND EVACUATION SIMULATION SYSTEM FOR ENHANCED SAFETY IN SMART BUILDINGS(Western Michigan University, 2024-06-29) Almatared, Manea Mohammed S; Liu, HexuFire hazards in buildings continue to pose a substantial risk to human life and property safety despite declining deaths, injuries, and damages over the past decade. Consequently, fire safety management (FSM) is crucial to effectively preventing and controlling fire hazards. However, several challenges need to be addressed to ensure optimal FSM in buildings, such as the lack of effective integration of advanced technologies such as Internet of Things (IoT) sensors, fire detection systems, and automated response mechanisms, the reliance on insufficient fire safety equipment (FSE) maintenance and a lack of operational skills among occupants. In particular, traditional manual methods of searching for information, such as using two-dimensional drawings and relying on paper documents, have become inefficient and costly as buildings have become larger and more complex. This leaves room for improvement in current FSM practices— specifically, high-efficiency evacuation- the best approach for minimizing mortality and property loss. Digital twin (DT) technologies have been widely used in other industries, such as manufacturing and transportation, to improve efficiency, reduce costs, and enhance safety. However, the FSM sector has been a slow adopter of DT technology. This study investigated the adoption of DT technologies in the FSM sector. This research aims to explore the limitations, opportunities, and challenges associated with adopting DT technology in the FSM sector and further develop a DT-based FSM framework towards smart facility management (FM). This framework lets decision-makers obtain comprehensive information about the building's communication and safety systems. It can also enable the real time monitoring of FSE and provide predictive maintenance. Toward this objective, several DTs for FSM were first reviewed, including building information modeling (BIM), the Internet of Things (IoT), artificial intelligence (AI), and augmented reality (AR). These technologies can be used to enhance the efficiency and safety of FSM in smart buildings. The framework was then synthesized based on the literature review, application requirements, and industry needs. A questionnaire survey was conducted for FM professionals to evaluate the framework and identify the challenges of adopting DT and the proposed framework in the FSM sector. The survey results identify the current state of DT technology in the FSM sector, provide insights into the perception of DT technology among FM practitioners, and validate its expected benefits and potential challenges. The main barriers to adopting DTs in FSM are a lack of knowledge about DTs, their initial costs, user acceptance, difficulties in systems integration and data management, education training costs, a lack of competence, development complexity, and data security. Furthermore, the research develops a building fire evacuation simulation system based on the validated framework, i.e., smart lighting. This system integrates the data from the BIM platform, Fire Dynamic Simulator (FDS), and Agent-Based Simulation (ABS) platform for evacuation through customized developments. Real-time fire situation is transmitted to the evacuation simulation platform to assess the impact of dynamic fire spread on the evacuation of people. A model for optimizing evacuation route planning is designed to improve the utilization of each evacuation exit and provide a visualization of evacuation routes as smart lighting in Dynamo. This proposed system was validated by conducting a case study on three fire evacuation scenarios. An average of 20.9 % increases the evacuation efficiency in three scenarios. The main contributions of this research include (1) Developing a DT-based FSM framework for smart buildings, (2) Developing a fire emergency evacuation simulation system for buildings by integrating DT technologies, and 3) Achieving the integration and interoperability of BIM data, fire data, and evacuation data from different platforms.30 0Item Restricted Machine Learning (ML) Technologies(John Jay College of Criminal Justice, 2024-04-03) Alanazi, Mosa; Seferaj, GentianaIntegrating Machine Learning (ML) technologies into physical security has ignited significant discourse within scholarly circles, focusing on identifying specific ML technologies currently employed and elucidating their tangible outcomes. This integration occurs against a rapidly evolving technological landscape, encompassing advancements such as cloud computing, 5G wireless technology, real-time Internet of Things (IoT) data, surveillance cameras fortified with biometric technologies, and predictive data analytics. Collectively, these innovations augment the transformative potential of ML within security frameworks, ranging from sophisticated video analytics facilitating advanced threat detection to predictive algorithms aiding in comprehensive risk assessment. Moreover, the seamless fusion of disparate data streams and the capability to extract actionable insights in real-time present profound implications for the future trajectory of security protocols, heralding a paradigm shift in the conceptualization, implementation, and Student No: 10001 Page 2 of 14 Comprehensive Exam/Project ̶̶̶ Spring24 Department of Security, Fire and Emergency Management maintenance of physical security measures. This study endeavors to delve into the specifics of ML technologies currently operationalized in physical security contexts, scrutinize the tangible outcomes they yield, and forecast how these trends will shape the future security landscape— additionally, strategic recommendations aimed at optimizing the efficacy of ML-driven security solutions in safeguarding physical environments.127 0Item Restricted IOT-BASED INDOOR AIR QUALITY MONITORING SYSTEM FOR ENHANCED OCCUPANT HEALTH AND COMFORT IN SMART BUILDINGS(Dublin City Univercity, 2023-08-16) Altamimi, Mshal Baker; Intizar, Ali; Coyle, Shirley; Manzke, MingmingIoT-based indoor air quality (IAQ) monitoring systems hold significant importance in enhancing occupant health and comfort within the context of smart buildings. The quality of indoor air directly impacts the well-being, productivity, and overall quality of life of individuals residing or working within enclosed spaces. Poor IAQ, characterized by elevated pollutant levels, can lead to a range of adverse health effects, including respiratory ailments, allergies, and chronic illnesses. This paper focuses on the experience and implementation of an IoT-based IAQ monitoring platform with three sensors. The platform uses the IoT Adafruit database dashboard and Telegram server to observe indoor air quality in a selected place, at any time. Based on IoT technology, the sensors are created to monitor air quality effectively and send data to the dashboard and Telegram through Internet. The project is made up of Esp32 microprocessor, sensors for pollution, and temperature humidity detection. The systems used in this study are made to measure the voltage levels of MQ4, MQ-135, and DHT11 to track the air quality and gas. After that, the project was tested successfully, where all sensors get the correct percentages.3 0Item Restricted Production Planning in the Context of Industry 4.0 with Focus on Efficient Job Allocation & Workers’ Real-Time Status(Saudi Digital Library, 2023-08-15) Albassam, Abdullah Mohammed; Niknam, Seyed AIndustry 4.0 (I4.0) has emerged a distinct impact on industrial workforce and created demand for diverse set of workforce skills and domain knowledge. Accordingly, I4.0 production systems are in need for developing and utilizing an appropriate workforce planning that considers workers with different type of skills to cope with the production requirements and keep up an efficient production. The I4.0 philosophy advocates the usage of advanced wearable technologies. Such wearable devices are able to monitor workers’ status and record vital signs and physiological data. It is well known in literature that workers’ performance in production systems is linked to their job satisfaction level as well as psychological well-being. There is much active research in the area of advanced physiology measurement technologies and incorporating the workers’ health data into industrial applications in real time. In essence, it is expected that smart wearable health devices provide the ability to boost job satisfaction, reduce human errors, and affect performance by helping managers for more efficient task matching and scheduling. This research is focused on developing job assignment models in the context of I4.0 and has considered both workers’ physiological status and the skills required to achieve the production goals. The ultimate goal of the proposed models is to maximize productivity by matching operations tasks to workers with different required skills and various skill levels. This study also considers workers' performance indicator which is predicted by machine learning models using workers’ physiology measurement. The assignment model could provide promising results in moving toward real-time application of workers’ physiological status in order to better assign production tasks and maximize production value.13 0Item Restricted SCALABLE NEXT GENERATION BLOCKCHAINS FOR LARGE SCALE COMPLEX CYBER-PHYSICAL SYSTEMS AND THEIR EMBEDDED SYSTEMS IN SMART CITIES(Saudi Digital Library, 2023-07-13) Alkhodair, Ahmad; Mohanty, Saraju; Kougianos, EliasThe original FlexiChain and its descendants are a revolutionary distributed ledger technology (DLT) for cyber-physical systems (CPS) and their embedded systems (ES). FlexiChain, a DLT implementation, uses cryptography, distributed ledgers, peer-to-peer communications, scalable networks, and consensus. FlexiChain facilitates data structure agreements. This thesis offers a Block Directed Acyclic Graph (BDAG) architecture to link blocks to their forerunners to speed up validation. These data blocks are securely linked. This dissertation introduces Proof of Rapid Authentication, a novel consensus algorithm. This innovative method uses a distributed file to safely store a unique identifier (UID) based on node attributes to verify two blocks faster. This study also addresses CPS hardware security. A system of interconnected, user-unique identifiers allows each block's history to be monitored. This maintains each transaction and the validators who checked the block to ensure trustworthiness and honesty. We constructed a digital version that stays in sync with the distributed ledger as all nodes are linked by a NodeChain. The ledger is distributed without compromising node autonomy. Moreover, FlexiChain Layer 0 distributed ledger is also introduced and can connect and validate Layer 1 blockchains. This project produced a DAG-based blockchain integration platform with hardware security. The results illustrate a practical technique for creating a system depending on diverse applications' needs. This research's design and execution showed faster authentication, less cost, less complexity, greater scalability, higher interoperability, and reduced power consumption.37 0Item Restricted Internet of Things Supply Chain Risks and Defences(Alotaibi, Saad, 2019-04-29) Alotaibi, Saad; Song, HoubingThe unprecedented emergence of network preinstalled devices which are designed to connect to the internet by default, promises convenience by recurrent and consistent advancement every day. It also has a promise of better security and efficient functionality. But even the lat- est gadget launched in the market to consumers comes with potential security flaws which later skilled hackers, who al- ways seem to a step ahead of executive security technicians, exploit these weak spots, infect the system with malicious malware and penetrate with ease in the private and wide area networks. These tech-savvy devices are collectively called internet of things or simply IOT. They are the tradition non-networking devices aside from personal computers, laptops, tablets, and smartphones. Some of them are in our house vicinity such, electric cars, kettles, LED light bulbs, electric kettles, Bluetooth speakers and many more. While others are in the industrial scale, such as the execution of tasks in robotic factory assembly and artificial intelligence used in war and commercial planes such as autopilot systems. Due to these rapid modifications and avid application IOT in the industrial sector, most early adopters of the technology have ways attempted to get the upper hand over their business rivals. There are various objectives while undertaking IOT projects at an industrial scale, but mainly advanced customer support and smooth ground operations and as a source of new Streams incomes top the priorities of the majorities of industrial giants and conglomerate corporations. IOT security cannot be discriminated rather be the major priority of the IOT system at every level, and must support the safety, data privacy, high standards of confidentiality and a reliable security system. There is a notable convergence of the operating system and the information technology sector which contends with a cultural clash, but always be accompanied by trustworthiness. The need to countermeasure these emerging challenges led to the Industrial Internet Consortium (IIC). It was founded in 2014 to make way for realizing the monetary value in IIOT and tackle the threats that face those that depend and live proximal to the IOT systems.15 0