Compare room temperatures of the four simulations

Assignment Help Computer Network Security
Reference no: EM132471425

Part one:

Question 1. Create a well-insulated box. 10m x 6m x 3m, with 40% of glazing on the larger south-facing side. Set all heating, cooling and domestic hot water to off, as well as internal heat gains. Set walls, ground-floor slab and roof U-values to 0.1 W/m2K, triple glazed windows to 0.65 W/m2K and insulated personnel door on the north side to 0.8 W/m2K. Set infiltration air exchange to 0.167 ach. Set the location to a cool climate, such as Birmingham. Set the initial internal room temperature to the outside air temperature, and the simulation preconditioning period to ten days.

Question 2. Run the first annual simulation.

Question 3. Set internal gains from people to 90 W/person sensible gain and 60 W/person latent gain, and with a density of 10 m2/person throughout the 24-hour period every day. Run the second annual simulation, giving the results file a different name to enable the comparison with the first simulation.

Question 4. Set fluorescent lighting to operate from 8 am till 6 pm. with an illuminance of 300 lux and lighting power density of 1.8 W/m2/100 lux. Run the third simulation, giving a separate name to the results file.

Question 5. Add miscellaneous gain of 2.5 W/m2 over 24 hours per day. Run the fourth simulation with a separate name for the results file.

Question 6. Compare room temperatures of the four simulations in a single graph. At what point does the building become heated in winter with internal heat gains only?

Question 7. At what point does the building become overheated in summer as the result of internal heat gams?

Question 8. How would you balance the conflicting influence of heat gains in summer and winter, so that the building can run on internal gains only throughout the year, without any additional heating or cooling?

Question 9. Discuss the findings.

Part Two:

Question 1. Create a model of a dome with 10 m base diameter and 5 m height. Apply default construction type and double glazing. Set the location to a cool climate. Set the model to run in free-floating mode, without any heating, or cooling, and without any internal gains from people, lights and appliances.

Question 2. Run annual simulations of the dome without any glazing. View the graph of internal air temperatures and record the maximum temperature. In a cool climate, this temperature will typically not exceed 20°C.

Question 3. Glaze the dome, using minimum and the maximum azimuth of 0° and 360° respectively, and minimum and maximum tilt of 0° and 90° respectively, and specifying 40% of the glazed area. Run annual simulation, view the graph of internal room temperatures, and record the maximum temperature. In a cool climate, this temperature could easily exceed 50°C.

Question 4. Scale down the glazing progressively until the maximum internal temperature does not exceed 25 °C.

Question 5. Experiment with increased north and reduced south glazing and the other way round.

Question 6. Discuss the results.

Reference no: EM132471425

Questions Cloud

Show the bank balance sheet : I) Suppose that there exists a bank whose $50,000 deposit is 80% loans and 20% reserves.
HCA-530 Health Care Policies and Economics Assignment : HCA-530 Health Care Policies and Economics Assignment Help and Solution, Grand Canyon University - Homework Help - Explain the relationship
Prepare closing entries and post to ledger accounts. : Prepare closing entries and post to ledger accounts. Prepare the unadjusted trial balance columns of a 10-column worksheet for the year ended December 31.
How is growth measured : What are the 3 main suspects in slowing productivity growth? Please describe/explain.
Compare room temperatures of the four simulations : Compare room temperatures of the four simulations in a single graph. At what point does the building become heated in winter with internal heat gains only
Buy up all the excess supply and destroy : If the government imposes a price floor on the market for, say cookies, and agrees to buy up all the excess supply and destroy it
Why do some bars offer free peanuts and pretzels : Why do some bars offer free peanuts and pretzels to their patrons?
Identify which tests are best suited for chevron corporation : The first step in this process is to go to the website of a publicly-traded US . Identify which tests are best suited for Chevron Corporation and why.
Council of economic advisors : You are hired by the Council of Economic Advisors (CEA) as an economic consultant. The chairperson of the CEA tells you that she believes the current

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd