Fader NRMCA
 

       NRMCA Home  

 

Fader
NRMCA EVENTS
Home | Recent Files

An Engineering Approach for Permeability
Name: An Engineering Approach for Permeability
File: Li Paper 05-17-16 D-5.pdf
Size(MB): 0.37MB
Extension: PDF
Event: 2016 ICSC - WASHINGTON DC
Speaker Name: Li, K.
Managed by: sdickens
Date Uploaded: June 21, 2016; 12:29 pm
Download Count: 180
Downloads This Month: 180

Your Geographic Information:

Country: United States
State/Region:
City:
Zip Code:
Area Code: 0
Your IP: 54.81.45.122



Description:
PAPER - A new approach to estimate the permeability of partially water-saturated virtual cement-based materials is outlined in this paper. Although the established full methodology (particle packing-hydration simulation-porosimetry analysis-permeability calculation) will provide satisfactory results in comparison with experimental data, it is extremely time-consuming and thus expensive. As an alternative, this paper presents an engineering approach to the aforementioned full methodology, while still maintaining reliability at an appropriate level. In the approach water permeability is correlated to the median pore size and the saturation degree of the specimen. A mathematical model is therefore proposed to approximate the water permeability using only these two parameters. A good agreement can be observed comparing the results obtained by the complete methodology and by the developed mathematical method. In this study, water/cement ratio, particle size range and hydration period were varied. Since pore connectivity and shape seem to have an influence on water permeability, their contributions are additionally considered to further improve the proposed method.

 
NRMCA Download Center
Home
Browse
Login

 

 

National Ready Mixed Concrete Association. NRMCA Reserve all rights all the content of this site.
Please contact Web Master at NRMCA at webmaster@nrmca.org with any questions.
All content in this Download Center is the property of National Ready Mixed Concrete Association. Any illegal linking, altering and abusing the associated file(s) without permission is not tolerated. And the person or entity held responsible will be prosecuted to the full extend of the law as it permits.