The Non linear time history analysis for Elcentro and sanfernando earthquake is done and result are interpreted & compared for base shear, ground floor displacement, top floor displacement, seismic weight and overall damage index of overall structure
Key words: Infill wall, Soft Storey, set back, displacement, overall damage index
This study explores various merits and demerits of the proposed system and compares it to the other multicarrier access schemes.
Key words: CDMA,Hybrid CDMA-SFH, MIMO CDMA, RAKE
Also, the NAND decoder (3-stage) tends to have low power as compared to a NOR decoder (2-stage).
Key words: Capacitances, Hierarchical Decoder, Logical Effort, Propagation Delay, Power Dissipation.
It is found that, a decoder designed by using static CMOS based NAND gates has less propagation delay as compared to the one designed by using static CMOS based NOR gates, this can be verified by theoretical and simulated results.
Sampath Kumar V., Neerja Singh, "Delay Minimization of 3 Cascaded Inverters with the help of Logical Effort and Transistor Sizing", Journal of VLSI Design Tools and Technology Volume 2, Issue 1, April 2012, Pages 20-22.
There exists a function, edge.m which is in the image toolbox.
Key words: Face recognition; discrete cosine transform (DCT); sobel edge detection (SED); SOM network.
This intelligence by removing redundant data from face images through image compression using Sobel Edge Detection (SED) and comparing this with the two-dimensional discrete cosine transform (2D-DCT) method for the better speed and efficiency.
Through simulation we measure the packet delivery ratio & prove that our mechanism is able to increment the delivery ratio by 20% over VeMAC.
Key words: fuzzy scheduler, medium access control, reliable broadcast, TDMA, vehicular ad hoc networks.
In this paper, three tools with different pin shapes such as Conical, Cylindrical and Frustum were designed with threads in their profiles .Initially the tools dimensions are based on the base material plate thickness taken in to consideration, the induced structural stresses were checked with in the permissible stress limits.
Here the concept of Nash equilibrium is used to handle sophisticated flooding attack to defend distributed attacks from unknown number of sources
Key words: Computer Networks and Security.
The tools were modeled in CATIA and analysis is performed in ANSYS software for exploring stress distributions and displacement vector sum in the pin, at different speeds and temperatures.
The protocol reduces transmission collisions due to node mobility on the control channel by assigning disjoint sets of time slots to vehicles moving in opposite directions and to road side units.
The vonmises stress distributions in pin profiles, displacement vector sum of the pin profiles, are obtained from ANSYS software and the pin with optimum strength is determined.
The processor architecture is described using verilog and synthesized using Xilinx Spartan 3E.
Key words: MIPS processor, pipeline, writeback, stall.
A number of defense strategies have been devised to overcome the flooding attack which is prominent in the networking industry due to which depletion of resources takes place.