Analysis of High Rise Building with Different Codes
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
This growing world, a civil engineering student during the execution of a project as before and structural elements and their safety standards need to be fully aware of. It is the sequel to try as analysis and design of a multi storey building limit State method for learning (456:2000). Reinforced Concrete buildings ‟ "project.Is focused on limit State method (collapse and serviceability) design. The collapse of the State, in the range of strength and ensure the stability of the structure. Follow the guidelines that are being 456:2000 and 13920:1993 as per and used different codes. Manufacture of structural components, load floor in a typical multi-storey which transfers one or a set of plane frame in both directions to the destination system. Level, columns, beams and slabs design study. Hostel a multi-storey residential building project present-ji deals with the analysis of G+9. Loadings are applied and design beam, columns, slabs and footings. With its new features of its predecessors the Pro ETABS and compotators sharing capabilities like AutoCAD, and with other major software MS Excel with your data. This study concludes that a multi-storey building design standards are successfully planted and Staad Pro is a very powerful tool that can save a lot of time and is very accurate in design.
Authors and Affiliations
Vivek Tiwari, Shashank Gupta
Corrosion Inhibition of Copper Metal by Prosopis Cineraria Leaves as Green Corrosion Inhibitor in Acidic Medium
Ethanolic extract of Prosopis cineraria leaves(EEPcL) behaves as a green corrosion inhibitor to replace toxic chemicals. The corrosion inhibition of copper in 0.5 N HCl by Prosopis cineraria leaves has been studied by m...
Secure Transaction By Using Wireless Password with Shuffling Keypad
In general, all swiping card authentication system having different possibilities of password guessing by mean of shoulder surfing is an attack and overlooking attack. This problem can be overcome with new advance solut...
Face Recognition Techniques: A Survey
In recent days, the demand for biometric security system has risen due to a wide range of surveillance, access control and law enforcement applications. Among the various biometric security systems based on finger print...
Analysis of Routing Protocols in MANET
Mobile Ad hoc Networks (MANET) use anonymous routing protocols that hide node identities and routes from outside observers in order to provide anonymity protection. Existing anonymous routing protocols relay on hop by h...
Performance of Diesel Engine Using Jatropha and Karanja Biodiesel
Biodiesel is an alternative fuel of diesel, is described as fatty acid methyl ester from vegetable oils or animal fats. The main objectives of the present work is to reduce higher viscosity of Pongamia Pinnata (Karanja)...