Architectural Precast Concrete Security Barriers: Securing the Perimeter
ثبت نشده
چکیده
منابع مشابه
Performance of the Modified Precast Beam to Column Connection Placed on a Concrete Corbel
Precast concrete structures in Iran are generally designed as continuous columns with hinged beams, thereby making them simple frames. In this system in site show walls in two directions of buildings guaranteed lateral resisting system. However, in order to obtain a seismic resisting frame, the connection between beam and column should be moment resisting and ductile, allowing the formation of ...
متن کاملAdvances in Structural Engineering
This paper presents several advancements in the use of fiber reinforced polymer (FRP) materials for the precast concrete industry. Precast concrete members are commonly selected for reasons such as the high level of quality control used in their production, the durability of the finished structure, reduced labor costs and shorter construction schedules, and the economics of scale achieved with ...
متن کاملSeismic Retrofitting RC Structures with Precast Prestressed Concrete Braces- ABAQUS FEA Modeling
Precast prestreesed concrete braces are a new method for seismic strength of Concrete Structures which has the following benefits: a) no wet concrete work in construction site b) No bolt or anchorage to the existing frame c) easy to apply d) short construction period e) low construction cost, to evaluate seismic performance of strengthened structure a model consist of existing frame and concret...
متن کاملDurability of Fiber Reinforced Concrete of Marine Structures
The usefulness of fiber reinforced concrete (FRC) in various civil engineering applications is indisputable. Fiber reinforced concrete has so far been successfully used in slabs on grade, shotcrete, architectural panels, precast products, offshore structures, structures in seismic regions, thin and thick repairs, crash barriers, footings, hydraulic structures and many other applications. This p...
متن کاملSecuring Event-Based Systems
This chapter examines techniques for securing various types of event-based systems. The first section discusses typical application requirements. The following section examines specific event dissemination approaches. Applying applicationlevel security to event-based systems is introduced at first, along with an overview of Role-Based Access Control. Application-level security is a perimeter de...
متن کامل