This study presents an adaptive control scheme based on synergetic control theory for suppressing the vibration of building structures due to earthquake. The control key for the proposed controller is based on a magneto-rheological (MR) damper, which supports the building. According to Lyapunov-based stability analysis, an adaptive synergetic control (ASC) strategy was established under variation of the stiffness and viscosity coefficients in the vibrated building. The control and adaptive laws of the ASC were developed to ensure the stability of the controlled structure. The proposed controller addresses the suppression problem of a single-degree-of-freedom (SDOF) building model, and an earthquake control scenario was conducted and simulated on the basis of earthquake acceleration data recorded from the El Centro Imperial Valley Earthquake. The effectiveness of the adaptive synergetic control was verified and assessed via numerical simulation, and a comparison study was conducted between the adaptive and classical versions of synergetic control (SC). The vibration suppression index was used to evaluate both controllers. The numerical simulation showed the capability of the proposed adaptive controller to stabilize and to suppress the vibration of a building subjected to earthquake. In addition, the adaptive controller successfully kept the estimated viscosity and stiffness coefficients bounded.
Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
An Optimal Algorithm for HTML Page Building Process
The question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.
In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes
... Show MoreActive vibration control is the main problem in different structure. Smart material like piezoelectric make a structure smart, adaptive and self-controlling so, they are effective in active vibration control. In this paper piezoelectric elements are used as sensors and actuators in flexible structures for sensing and actuating purposes, and to control the vibration of a cantilever beam by using sliding mode control. The sliding mode controller (SMC) is designed to attenuate the vibration induced by initial tip displacement which is equal to 15 mm. It is designed based on the balance realization reduction method where three states are selected for the reduced model from the 24th states that describe the c
... Show MoreThis work involves the calculation of the cooling load in Iraqi building constructions taking in account the effect of the convective heat transfer inside the buildings. ASHRAE assumptions are compared with the Fisher and Pedersen model of estimation of internal convective heat transfer coefficient when the high rate of ventilation from ceiling inlet configuration is used. Theoretical calculation of cooling load using the Radiant Time Series Method (RTSM) is implemented on the actual tested spaces. Also the theoretical calculated cooling loads are experimentally compared by measuring the cooling load in these tested spaces. The comparison appears that using the modified Fisher and Pedersen model when large ventilation ra
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreCredential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi
... Show More