Thursday, May 2, 2019

Iconic building, building underground Essay Example | Topics and Well Written Essays - 1500 words

iconic building, building underground - Essay ExampleThe debates mainly covered topics such asOne of the proposed solutions to hereafter attacks is the underground look of buildings. For example, there have been proposals to expand the city of Amsterdam with a futuristic and long underground network of activities. This paper seeks to examine the construction lessons learned from the WTC attacks and the possibility of considering underground construction as a way of avoiding attacks situations similar to the one of the WTC.The twin towers were programed and constructed five decades ago as new way of building skyscrapers in which they were to be very light in weight and involve modular methods of construction meant to reduce costs and accelerate the building schedule. They were constructed using an egg-crate design having extra columns that would founder the building standing in case one or two columns were to be lost (Eager & Musso, 2001). This design made the towers to be some of the most resilient buildings ever constructed and it is no wonder their collapse was that astound and generated so much speculations and debates among knowledgeable structural engineers (FEMA, 2002 National Institute of Science and Technology, 2008)).Prior to the WTC attacks, hostage in design was not all that an important concern to engineers, architects or builders (Bazant and Cedolin, 1991). Security was normally moreover considered a design priority when designing and constructing specific types of projects such as consulates, government facilities and prisons and State segment embassies. Following the attacks, security department has become of absolute importance in virtually all types of construction including educational, healthcare, commercial, residential and institutional.The drastic change in the construction environment, which occurred virtually overnight, makes it important that all suitable technology and security safeguards are incorporated into the initial

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.