Stability Evaluation of Concrete Structure Considering the Local Damage Using Nondestructive Detection and Numerical Analysis

Xuyan Tan, Weizhong Chen, Luyu Wang, Jianping Yang

Research output: Contribution to journalArticleScientificpeer-review

1 Citation (Scopus)
22 Downloads (Pure)

Abstract

Shield tunneling is one of the most important technologies for building of underground engineering. Many grouting holes were prefabricated for the requirement of backfill grouting, which is easy to induce local damages and potential disasters, such as leakage and cracking. Accordingly, an integrated workflow for damage detection and stability evaluation was performed based on nondestructive testing (NDT) and numerical simulation. As a case study, this method was applied to an underwater shield tunnel. Firstly, Ground Penetrating Radar (GPR) was used to detect the conditions in grouting holes. Then, the infrared camera was used to determine the damaged positions induced by grouting holes. According to NDT results, the numerical models were developed to analyze the mechanical behaviors of structure. It indicated the geophysical inversion results are consistent with field conditions. The influence area increases with a significant value of water pressure, and stress magnitude would increase to 45KPa if the increment of water pressure reaches to 10KPa. As a promising application, structure stability was evaluated in the light of analytical results.

Original languageEnglish
Article number012119
Pages (from-to)1-8
Number of pages8
JournalIOP Conference Series: Earth and Environmental Science
Volume455
Issue number1
DOIs
Publication statusPublished - 2020
Event6th International Conference on Environmental Science and Civil Engineering, ESCE 2020 - Nanchang, China
Duration: 4 Jan 20205 Jan 2020

Keywords

  • Mechanical behaviors
  • Nondestructive testing
  • Numerical analysis
  • Stability

Fingerprint

Dive into the research topics of 'Stability Evaluation of Concrete Structure Considering the Local Damage Using Nondestructive Detection and Numerical Analysis'. Together they form a unique fingerprint.

Cite this