Skip to main content

Currently Skimming:

4 Metrics and System Evaluation
Pages 69-74

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 69...
... Protection metrics provide a quantifiable measure of a system's efficacy in protecting building occupants and contents. The degree of protec 9
From page 70...
... FBE relies on an experimental measurement or analysis of the transport and dispersal of agents or toxic materials within the interior spaces as a result of releases either outdoors or within the building. For example, DARPA's Immune Building Program uses multizone contaminant transport modeling as a principal means of estimating the concentration and exposure profiles within the interior spaces.
From page 71...
... Another protection metric, which is related to FOE, is the number of lives saved or the reduction in the number of exposed occupants as a result of protective architecture. If the disease progression of a threat agent and the countermeasures are known, then the number of lives saved or reduction of exposed occupants as a result of building protection can be estimated.
From page 72...
... If a protection system is to be implemented, the benefits of the system and its proper operation need to be communicated to users and even to the building occupants. There could be ancillary benefits for some building protection systems, such as improved air filtration leading to higher-quality indoor air.
From page 73...
... To assess whether budget objectives are achieved for building protection designs, costs have to be ascertained over the system's life cycle. Components of cost for protection include the initial cost, cost of operation, and cost of maintenance.
From page 74...
... A life-cycle cost analysis frequently is used to justify a larger initial cost to obtain the benefits of lower operating or maintenance cost. In the case of security enhancements, consideration of the system life cycle takes on increased importance because failure to commit to the ongoing costs of maintaining such systems will compromise their ability to perform as intended.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.