Analysis of Retrofiton School Building With Shear Wall and Steel Bracing IJTSRD
The earthquake on 30 September 2009with7,6 magnitude occurred in West Sumatera and it caused the damage to both physical public facilities and infrastructures. The education sectors suffered from structural damage to the school buildings. In order to establish of the new Indonesian Seismic Code, SNI03 1726 2012, it will affect to the performance of structures […]
Building Information Model A Graphical User Interface to Generate a three Dimensional Building IJTSRD
From the past few decades, Building Information Modeling BIM has been evolving to become one of the robust domains connecting different dimensions from Architecture, Engineering and Constructions. Even though it was started to take over a large part of the globe in understanding various components of structure, it is yet to reach a common person […]
Desalination Approach of Seawater and Brackish Water by Coconut Shell Activated Carbon as a Natural Filter Method IJTSRD
Engineers are challenged to develop cost effective ways to produce large quantities of water suitable for drinking, crop irrigation and commercial use for regions of the world that suffer from water shortages. Water desalination is expensive, requiring large amounts of energy and specialized equipment to convert saltwater into drinking water. The present study aims to […]
Automation of Medical Waste Separation using Advanced Technologies to Minimize its Impact on Environment IJTSRD
This paper describes a shape recognition technique using boundary chain codes extracted by a method as described by Pavlidis and used an 8 connected neighbourhood. A chain code is a representation of a two dimensional contour using a one dimensional array. Feed forward neural networks were trained to recognise these chain codes. In addition, backpropagation […]
Synthesis of 64-Bit Triple Data Encryption Standard Algorithm using VHDL IJTSRD
Data security is the most important requirement of today’s world, to transmit digital data from one place to another. We need to secure the transmitted data at the transmitting end so that no unauthorized user can access it. To encrypt the data at the transmitting point and decrypt the data at the receiving point we […]