Development of CFT Column Seismic Reinforcement Method to Secure Safety of School Facilities

AUTHORS

Dong-oun Lee,Professor, Department of Architectural & Civil Engineering, DongSeo University, Busanjin-gu, Busan, Korea
Chang-jin Yang*,Professor, Department of Architectural & Civil Engineering, DongSeo University, Busanjin-gu, Busan, Korea

ABSTRACT

Seismic technology has emerged as a future technology that can create high added value in the overseas construction market as the damage caused by earthquakes has increased due to population growth and urbanization worldwide. In particular, domestic school facilities are the residence space for students who lack self-protection ability, and large-scale damage is expected in the event of an earthquake due to the uncertain seismic performance of the school building used as a shelter during a disaster. Therefore, in this paper, we intend to study the method development to secure the structure safety through the performance enhancement using the CFT column for seismic reinforcement of existing school facilities. To prove the mechanism various experiments were actually applied by making four test specimens (PRBA, TRBA, PRBN, TRBN Destructive form), and the performance of the development method could be compared and reviewed through cracks and mutations occurring in the structure.

 

KEYWORDS

CFT column, Seismic reinforcement, Safety, School facilities, Strengthen

REFERENCES

[1]     Bea Y.H., “Development performance measurement for construction technology research,” Korea Institute of Construction & Transportation Technology Evaluation and Planning, pp.2-32, 1512, (2009)
[2]     Chao Li, Jiamin Wen, Changhai Zhao, Jiguo Du, Minqiang Shang, Zengbo Wang, Haihua Yan, and Yida Wang, “A HDFS-based high performance parallel framework for extracting seismic gathers from large scale seismic datasets,” International Journal of Grid and Distributed Computing, vol.10, no.3, March, pp.1-12, (2017) DOI: 10.14257/ijgdc.2017.10.3.01.(CrossRef)(Google Scholar)
[3]     Changhao Zhang, Wei Wang, and Jianhu Feng, “Study on displacement-based design method for structures with buckling restrained brace: security and seismic design,” International Journal of Security and Its Applications, vol.10, no.10, October, pp.227-236, (2016) DOI: 10.14257/ijsia.2016.10.10.21.(CrossRef)(Google Scholar)
[4]     Li Sun, Ying Liu, Qiang Qu, Lilin Ma, Guang Yang, and Hu Cao, “Research on construction of enterprise informatization based on model of multi-agent rigid formation,” International Journal of Grid and Distributed Computing, vol.7, no.6, December, pp.129-136, (2014) DOI: 10.14257/ijgdc.2014.7.6.10.(CrossRef)(Google Scholar)
[5]     Juan Zhao and Lihui Jiang, “Forecasting of type-2 fuzzy electric power system based on phase space reconstruction model,” International Journal of Grid and Distributed Computing, vol.8, no.5, October, pp.263-272, (2015) DOI: 10.14257/ijgdc.2015.8.5.26.(CrossRef)(Google Scholar)
[6]     Nie Yang and Jing Li-li, “Measurement matrix construction algorithm for compressed sensing based on QC-LDPC matrix,” International Journal of Grid and Distributed Computing, pp.121-130, (2015) DOI: 10.14257/ijgdc.2016.9.2.11.(CrossRef)(Google Scholar)
[7]     Douglas Rodrigues, Julio C. Estrella, and Kalinka R. L. J. C. Branco, “Analysis of security and performance aspects in service-oriented architectures,” International Journal of Security and Its Applications, vol.5, no.1, January, pp.13-30, (2011)
[8]     Te-Shun Chou, “Cyber security threats detection using ensemble architecture,” International Journal of Security and Its Applications, vol.5, no.2, April, pp.17-32, (2011)
[9]     Javier Parra-Arnau, David Rebollo-Monedero, and Jordi Forné, “A privacy-protecting architecture for recommendation systems via the suppression of ratings,” International Journal of Security and Its Applications, vol.6, no.2, April, pp.61-80, (2012)
[10]  Xixu Fu, Kaijun Wu, and XiZhang Gong, “Implement access control architecture to enhance security and availability of cloud computing systems,” International Journal of Security and Its Applications, vol.6, no.2, April, pp.245-250, (2012)
[11]  Jian-ping Chou, Li-chao Chen, YingJun Zhang, and Li-hu Pan, “OPC unified architecture for industrial demand response,” International Journal of Security and Its Applications, vol.6, no.2, April, pp.275-280, (2012)
[12]  Ch Sudhakar, N. Thirupathi Rao, and Debnath Bhattacharyya, “Smart electronic stick for blind people: an iot application,” International Journal of Security and Its Applications, vol.13, no.1, March, pp.1-10, (2019) DOI: 10.33832/ijsia.2019.13.1.01.(CrossRef)(Google Scholar)
[13]  Vardhana M, “Fuzzy logic based performance analysis of various antenna structures,” International Journal of Grid and Distributed Computing, vol.12, no.1, June, pp.1-10, (2019) DOI: 10.14257/ijgdc.2019.12.1.01.(CrossRef)(Google Scholar)
[14]  Tariq Benahmed, Khelifa Benahmed, and Zeyneb Mokeddem, “Fault tolerant and optimal barrier coverage for critical area monitoring,” International Journal of Grid and Distributed Computing, vol.11, no.10, October, pp.11-28, (2018) DOI: 10.14257/ijgdc.2018.11.10.02.(CrossRef)(Google Scholar)

CITATION

  • APA:
    Lee,D.& Yang*,C.(2020). Development of CFT Column Seismic Reinforcement Method to Secure Safety of School Facilities. Journal of Human-centric Research in Humanities and Social Sciences, 1(1), 41-48. 10.21742/JHRHSS.2020.1.1.07
  • Harvard:
    Lee,D., Yang*,C.(2020). "Development of CFT Column Seismic Reinforcement Method to Secure Safety of School Facilities". Journal of Human-centric Research in Humanities and Social Sciences, 1(1), pp.41-48. doi:10.21742/JHRHSS.2020.1.1.07
  • IEEE:
    [1] D.Lee, C.Yang*, "Development of CFT Column Seismic Reinforcement Method to Secure Safety of School Facilities". Journal of Human-centric Research in Humanities and Social Sciences, vol.1, no.1, pp.41-48, Sep. 2020
  • MLA:
    Lee Dong-oun and Yang* Chang-jin. "Development of CFT Column Seismic Reinforcement Method to Secure Safety of School Facilities". Journal of Human-centric Research in Humanities and Social Sciences, vol.1, no.1, Sep. 2020, pp.41-48, doi:10.21742/JHRHSS.2020.1.1.07

ISSUE INFO

  • Volume 1, No. 1, 2020
  • ISSN(p):0
  • ISSN(e):0
  • Published:Sep. 2020

DOWNLOAD