Enhancement of Load Carrying Capacity of Steel Tubular Columns In-filled with Fibre Reinforced Concrete
DOI:
https://doi.org/10.61841/p722ze71Keywords:
Composite, Columns, Steel Tubular Sections, Fibre Reinforced ConcreteAbstract
Steel members have the advantages of high tensile strength and ductility, while concrete members have the advantages of high compressive strength and stiffness. Steel - Concrete composite members, resulting in a member that has the valuable qualities of materials. In this paper, an attempt was made with steel tubular columns in-filled with fibre reinforced concrete and normal conventional concrete so as to improve the strength of tubular columns in construction works. The performance of circular and square concrete-filled steel tubular sections (CFSTs) with and without fibre under axial load is presented. The effects of steel tube dimensions, shapes and the strength of concrete are examined. Recorded column strengths are compared with the values predicted by Eurocode 4. 12 specimens were tested with strength of concrete as 20 MPa and a D/t ratio 22.3, 23.7 & 25.4. The columns were 76.1 & 88.9 mm in diameter and 72.0 & 91.5 mm in square are 900 mm in length. From the test results it was observed that the load carrying capacity of steel tubular columns in-filled with fibre reinforced concrete is greater than the conventional concrete. Eurocode 4 predicts the best estimation for CFST sections both conventional and fibre reinforced concrete columns. Hence this investigation would give a solution for effective application of fibre reinforced concrete in steel tubular sections to increase the load carrying capacity.
Downloads
References
[1] Hajjar JF, Composite steel and concrete structural systems for seismic engineering, J. Constructional Steel
Research 2002; 59 (58); 703-723.
[2] Neogi PK, Sen HK, Chapman JC, Concrete-filled tubular steel columns under eccentric loading. Structural
Engg. 1969; 47(5); 195-197.
[3] O’Shea M, Bridge R. Circular thin-walled tubes with high strength concrete infill. Composite construction
in steel and concrete II. Irsee (Germany); ASCE; 1996, 780-793.
[4] O’Shea M, Bridge R. The design for local buckling of concrete filled steel tubes. In: Composite
Construction – Conventional and Innovate, Innsbruck, Austria; 1997, 319-324.
[5] Eurocode 4 DD ENV 1994-1-1, Design of Composite Steel and Concrete Structures. Part 1.1, General
Rules and Rules for Buildings (with UK National Application Document) London, British Standards
Institution, 1994.
[6] Kilpatrick A, Rangan BV. Behaviour of high-strength composite column. In: Composite construction –
conventional and innovate, Innsbruck, Austria; 1997, 789-794.
[7] Kilpatrick A, Taylor T. Application of Eurocode 4 design provisions to high strength composite columns.
In: Composite construction – conventional and innovate, Innsbruck, Austria; 1997, 561-566.
[8] Brauns J. Analysis of stress state in concrete-filled steel column. J. Constructional Steel Research 1998;
49(2): 189-196.
[9] M D O’Shea, and R Q Bridge, Design of circular thin-walled concrete filled steel tubes. Journal of
Structural Engineering, ASCE, 2000, Proc. 126, 1295 – 1303.
[10] N E Shanmugam, and B Lakshmi, State of the art report on steel-concrete composite columns. Journal of
Constructional Steel Research, 2001, Proc. 57, 1041-1080.
[11] M Johansson, and K Gylltoft, Structural behaviour of slender circular steel-concrete composite columns
under various means of load application. Journal of Constructional Steel Research, 2001, Proc. 01, 393 -
410.
[12] Amjad Masood, Variation in strength of concrete on addition of demolished waste. The Indian Concrete
Journal, August 1998, 395-399.
[13] E K Mohanraj, S Kandasamay and R Malathy, Enhancement of Load Carrying Capacity of Steel Tubular
Columns In-filled with Fibre Reinforced Concrete, 7th RILEM International Symposium on Fibre Reinforced
Concrete, Indian Institute of Technology Madras (IIT-M), Chennai,2008
[14] Gomathy, S., Deepa, K.P., Revathi, T., & Visuwasam, L.M.M. (2013). Genre Specific Classification for
Information Search and Multimodal Semantic Indexing for Data Retrieval. The SIJ Transactions on
Advances in Space Research & Earth Exploration, 1(1), 10-15.
[15] Poongodi, R.K., & Sivakumar, T. (2018). Enhanced Adaptive Multimedia Data Forwarding for Privacy
Preservation in Vehicular Ad-Hoc Networks Using Authentication Group Key. Bonfring International
Journal of Software Engineering and Soft Computing, 8(1), 26-30.
[16] Renuga Devi, M., Pavithra, D., & Dharani, K.R. (2014).Isolation Enhancement in Microstrip Patch
Antennas for WiMAX Applications. The SIJ Transactions on Computer Networks & Communication
Engineering (CNCE), 2(2), 1-4.
[17] Ismail, K., & KHALIL, N. H. (2019). Estimation of Reliability of D Flip-Flops Using MC Analysis. Journal
of VLSI Circuits And Systems, 1(1), 10-12.
[18] Pooja, & Vishwakarma, S. (2016). Abnormal Crowd behavior Detection Using Structural Context
Descriptor. Bonfring International Journal of Advances in Image Processing, 6(3), 17-21.
[19] Prabhadevi, S., De, R., & Shah, P. (2013). Cost Effective Poly Vernam Cipher with Cache Optimization.
Journal of Theoretical & Applied Information Technology, 58(3).
[20] Prabhadevi S., &Natarajan A.M. (2013). Vehicular ad hoc networks: Characteristics, application and
standards. Asian Journal of Information Technology, 12 (11): 387-390.
[21] Ashok, V., Kumar, A. N., Kumar, S. S., &Kasthuri, N. (2010). Continuous wavelet transform analysis of
blood flow for the determination of hyper and hypo glycemic conditions. Procedia Computer Science, 2,
291-297.
[22] Sagayee, G. M. A., &Arumugam, S. (2010, February). Biometric image enhancement using decision rule
based image fusion techniques. In Second International Conference on Digital Image Processing (Vol.
7546, p. 75463F). International Society for Optics and Photonics.
[23] Sivakumar, V., Sivasankaran, S., Prakash, P., & Lee, J. (2010). Effect of heating location and size on mixed
convection in lid-driven cavities. Computers & Mathematics with Applications, 59(9), 3053-3065.
[24] Nirmaladevi, M., &Arumugam, S. (2010). VLSI Implementation of Artificial Neural Networks—
Asurvey. International Journal of Modelling and Simulation, 30(2), 148-154.
[25] Kavitha, S., &Duraiswamy, K. (2011). Automatic detection of hard and soft exudates in fundus images
using color histogram thresholding. European Journal of Scientific Research, 48(3), 493-504.
[26] Ravi, S., & Balakrishnan, P. A. (2011). Dual screw profile extruder temperature control using LabVIEW
enhanced Genetic Fuzzy Algorithm. European Journal of Scientific Research, 50(1), 35-47.
[27] Mohanraj, V., Chandrasekaran, M., Senthilkumar, J., Arumugam, S., & Suresh, Y. (2012). Ontology driven
bee's foraging approach based self adaptive online recommendation system. Journal of Systems and
Software, 85(11), 2439-2450.
[28] Suresh, Y., Arumugam, S., &Bhagyaveni, M. A. (2012). A Forager Bee's Intelligence Inspired Dynamic
Queue Scheduling for the Internet Traffic. Journal of Computer Science, 8(5), 665.
[29] Saravana, K. T., &Sampath, V. (2011). An Artificial Neural Network System for Prediction of Dimensional
Properties of Weft Knitted Rib Fabric. Journal of the Textile Association, 71(5), 247-250
[30] Vijayakumar, J., &Arumugam, D. S. (2012). Study of betelvine plants diseases and methods of disease
identification using digital image processing. European Journal of Scientific Research, 70(2), 240-244.
[31] Satheesh, A., &Manigandan, T. (2012). Improving power system stability using PSO and NN with the aid of
FACTS controller. European Journal of Scientific Research, 71(2), 255-264.
[32] Rameshkumar, A., &Arumugam, S. (2012, April). PI Control of Quasi-resonant Buck Converter.
In International Conference on Advances in Information Technology and Mobile Communication (pp. 477-
485). Springer, Berlin, Heidelberg.
[33] Suresh, Y., Arumugam, S., & Bhagyaveni, M. A. (2012). A Forager Bee's Intelligence Inspired Dynamic
Queue Scheduling for the Internet Traffic. Journal of Computer Science, 8(5), 665.
[34] Ramesh, K., & Somasundaram, K. (2012, January). Optimized FZ-LEACH Using Exponential Weighted
Moving Average for Wireless Sensor Network. In International Conference on Computer Science and
Information Technology (pp. 473-481). Springer, Berlin, Heidelberg.
[35] Satheesh, A., & ManigandanT. (2013). Maintaining Power System Stability with Facts Controller Using
Bees Algorithm and NN. Journal of Theoretical and Applied Information Technology, 49 (1), 38-47.
[36] Vijayalakshmi M., &Subramanian P.Synthesis, spectral characterization, biological activity and DNA
cleavage studies of Cu(II), Ni(II) and Zn(II) schiff base complexes derived from 2,4-dihydroxy
benzaldehyde and P-aminophenol. International Journal of Pharmacy and Technology, 5(1):5144-5155.
[37] Prabhadevi, S., De, R., & Shah, P. (2013). Cost Effective Poly Vernam Cipher with Cache Optimization.
Journal of Theoretical & Applied Information Technology, 58(3).
[38] Prabhadevi S., & Natarajan A.M. (2013). Vehicular ad hoc networks: Characteristics, application and
standards. Asian Journal of Information Technology, 12 (11): 387-390.
[39] Sadish Kumar S.T., & Kasthuri N.(2014). Determination of epileptic disorder with discrete wavelet
transforms and neural network classifier. Journal of Computer Science 10(1).
[40] Thilagamani S., &Shanthi N. (2014). Gaussian and Gabor filter approach for object segmentation. 2013
International Conference on Optical Imaging Sensor and Security, ICOSS 2013.
[41] Jothilakshmi, R., Shanthi, N., & Babisaraswathi, R. (2013, July). An approach for semantic query expansion
based on maximum entropy-hidden Markov model. In 2013 Fourth International Conference on Computing,
Communications and Networking Technologies (ICCCNT) (pp. 1-5). IEEE.
[42] Sadagoban K., Tamizhchelvan M., Gopalakrishnan S., & Gopalakrishnan S. (2015). Information gathering
practices of engineering faculty members: An emphirical study. International Journal of Applied
Engineering Research 10(3):6389-6404.
[43] Kanchana A., &Arumugam S. (2015). Diffie–Hellman-merkle longer key usage on minutiae, orientation,
and density based palmprint pattern matching. International Journal of Applied Engineering Research
10(3):6833-6850.
[44] Murthi M.K., Nithiyanandam S., Srinivasan P.S., Sivakumar D., Ashok T. (2015). The effect of karanja oil
and its blend with additive on performance and emission from a diesel engine. International Journal of
Applied Engineering Research 10(1):59-68.
[45] Sureshkumar T., &Shanthi N. (2015). LVC-D: A technique to extract web page data using layout, visual and
content-based features. International Journal of Applied Engineering Research 10(2):2465-2481.
[46] Usha, Arumugam.(2016). Detection of calcification in mammogram using nearest neighbour algorithm.
IIOAB Journal, 7(9).
[47] Bennet A., Sankaranarayanan, Kandasamy R., Rathna, Jaishreebai, Nalini.(2016). Investigation of audio
signals watermarking using empirical mode decomposition. IIOAB Journal, 7(9).
[48] Bennet A., Kandasamy R., Sankaranarayanan, Nandhini, Meena, Alamelu.(2016). Performance &
analysis automation of medical reimbursement for BSNL. IIOAB Journal, 7(9).
[49] Kalyanasundaram P., Gnanasekaran T. (2016). A noval method for optimizing maximal lifetime coverage
(OMLC) scheduling of nodes in wireless sensor networks. IIOAB Journal, 7(9).
[50] Chandravathi C., Somasundaram K., Kandasamy R., Velmurugan J. (2016). Implementation of kerberos
based authenticated key exchange protocol for parallel network file systems in cloud. IIOAB Journal, 7(9).
[51] Arthy G., Marimuthu C.N. (2017). A survey on control algorithms for DSTATCOM. 2017 International
Conference on Computer Communication and Informatics, ICCCI 2017.
[52] Satheeshkumar S., Sengottaiyan N. (2017). An resilient hierarchical authentication scheme based byzantine
attack detection in mobile ad hoc networks. Journal of Computational and Theoretical Nanoscience, 14(11).
[53] Vani E., Rengarajan N. (2017). Reduction of harmonics in a wind power conversion system by the optimal
function of a Vienna rectifier and switched inductance Z source inverter. Research Journal of
Biotechnology, 2017(2)
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.