VERIFICATION OF HYSTERESIS MODEL OF WOOD SHEAR WALL CONSIDERING OF LARGE DISPLACEMENT UNDER EARTHQUAKES
نویسندگان
چکیده
منابع مشابه
degradation of oil impregnated paper insulation under influence of repetitive fast high voltage impulses
در طی سالهای اخیراستفاده ازمنابع انرژی تجدید پذیر در شبکه های مدرن بنا به دلایل زیست محیطی و اقتصادی به طور گسترده استفاده شده است همچون نیروگاههای بادی و خورشیدی .ولتاژتولیدی این نیروگاهها اغلب به فرم dc می باشد وادوات الکترونیک قدرت به عنوان مبدل و پل بین شکل موج dc وac استفاده می شوند.این پروسه باعث ایجاد پالسهایی برروی شکل موج خروجی می شود که می تواند وارد تجهیزات قدرت همچون ترانسفورماتور ی...
15 صفحه اولthe effect of using model essays on the develpment of writing proficiency of iranina pre-intermediate efl learners
abstract the present study was conducted to investigate the effect of using model essays on the development of writing proficiency of iranian pre-intermediate efl learners. to fulfill the purpose of the study, 55 pre- intermediate learners of parsa language institute were chosen by means of administering proficiency test. based on the results of the pretest, two matched groups, one as the expe...
the use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach
abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...
15 صفحه اولinvestigating the feasibility of a proposed model for geometric design of deployable arch structures
deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...
automatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Structural and Construction Engineering (Transactions of AIJ)
سال: 2011
ISSN: 1881-8153,1340-4202
DOI: 10.3130/aijs.76.113