Fader NRMCA
 

       NRMCA Home  

 

Fader
NRMCA EVENTS
Home | Recent Files

Behavior of Confined Recycled Aggregate
Name: Behavior of Confined Recycled Aggregate
File: Mahgoub 05-16-16.pdf
Size(MB): 2.16MB
Extension: PDF
Event: 2016 ICSC - WASHINGTON DC
Speaker Name: Mahgoub, M.
Managed by: sdickens
Date Uploaded: June 21, 2016; 10:01 am
Download Count: 153
Downloads This Month: 153

Your Geographic Information:

Country: United States
State/Region:
City:
Zip Code:
Area Code: 0
Your IP: 54.81.45.122



Description:
There are significant environmental benefits of recycling and reusing waste concrete as aggregate for structural concrete. The use of recycled aggregate concrete (RAC), however, is currently limited to non-structural applications such as road base and erosion control. Widespread application of RAC, such as seismic applications, therefore requires an improved knowledge of the behavior under multi-axial state of stresses and development of behavioral models to describe the behavior under compression is essential. This paper presents part of the results of an extensive experimental investigation on mechanical properties of unreinforced RAC where the behavior under quasi-static axial loading was investigated and a one-of-a-kind stress-strain model was developed. It was observed that, quite similar to normal concrete, the stress-strain can be defined by a hyperbolic ascending-descending curve that is primarily a function of compressive strength, a straight descending branch which slope is a linear function of compressive strength followed by a sustaining branch. Development of this model is of great use in finite element simulation of RAC structural elements.

 
NRMCA Download Center
Home
Browse
Login

 

 

National Ready Mixed Concrete Association. NRMCA Reserve all rights all the content of this site.
Please contact Web Master at NRMCA at webmaster@nrmca.org with any questions.
All content in this Download Center is the property of National Ready Mixed Concrete Association. Any illegal linking, altering and abusing the associated file(s) without permission is not tolerated. And the person or entity held responsible will be prosecuted to the full extend of the law as it permits.