• Title/Summary/Keyword: Vulnerability Analyses

Search Result 127, Processing Time 0.169 seconds

Seismic vulnerability assessment of RC buildings according to the 2007 and 2018 Turkish seismic codes

  • Yon, Burak
    • Earthquakes and Structures
    • /
    • v.18 no.6
    • /
    • pp.709-718
    • /
    • 2020
  • Fragility curves are useful tools to estimate the damage probability of buildings owing to seismic actions. The purpose of this study is to investigate seismic vulnerability of reinforced concrete (RC) buildings, according to the 2007 and 2018 Turkish Seismic Codes, using fragility curves. For the numerical analyses, typical five- and seven-storey RC buildings were selected and incremental dynamic analyses (IDA) were performed. To complete the IDAs, eleven earthquake acceleration records multiplied by various scaling factors from 0.2g to 0.8g were used. To predict nonlinearity, a distributed hinge model that involves material and geometric nonlinearity of the structural members was used. Damages to confined concrete and reinforcement bar of structural members were obtained by considering the unit deformation demands of the 2007 Turkish Seismic Code (TSC-2007) and the 2018 Turkey Building Earthquake Code (TBEC-2018). Vulnerability evaluation of these buildings was performed using fragility curves based on the results of incremental dynamic analyses. Fragility curves were generated in terms of damage levels occurring in confined concrete and reinforcement bar of structural members with a lognormal distribution assumption. The fragility curves show that the probability of damage occurring is more according to TBEC-2018 than according to TSC-2007 for selected buildings.

Analyses of Vulnerability and Security Mechanisms in Wireless Sensor Networks (무선센서네트워크에서의 취약성 및 보안 메카니즘의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.805-808
    • /
    • 2009
  • Security has become a major concern for many real world applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all these approaches are based on wellknown cryptographic algorithms. At the same time, performance studies have shown that the applicability of sensor networks strongly depends on effective routing decisions or energy aware wireless communication. In this paper, we analyses vulnerability and security mechanisms in wireless sensor networks.

  • PDF

Seismic performance evaluation of RC bearing wall structures

  • Rashedi, Seyed Hadi;Rahai, Alireza;Tehrani, Payam
    • Computers and Concrete
    • /
    • v.30 no.2
    • /
    • pp.113-126
    • /
    • 2022
  • Reinforced concrete bearing walls (RCBWs) are one of the most applicable structural systems. Therefore, vulnerability analysis and rehabilitation of the RCBW system are of great importance. In the present study, in order to the more precise investigation of the performance of this structural resistant system, pushover and nonlinear time history analyses based on several assumptions drawing upon experimental research were performed on several models with different stories. To validate the nonlinear analysis method, the analytical and experimental results are compared. Vulnerability evaluation was carried out on two seismic hazard levels and three performance levels. Eventually, the need for seismic rehabilitation with the basic safety objective (BSO) was investigated. The obtained results showed that the studied structures satisfied the BSO of the seismic rehabilitation guidelines. Consequently, according to the results of analyses and the desired performance, this structural system, despite its high structural weight and rigid connections and low flexibility, has integrated performance, and it can be a good option for earthquake-resistant constructions.

Fragility curves for the typical multi-span simply supported bridges in northern Pakistan

  • Waseem, Muhammad;Spacone, Enrico
    • Structural Engineering and Mechanics
    • /
    • v.64 no.2
    • /
    • pp.213-223
    • /
    • 2017
  • Bridges are lifeline and integral components of transportation system that are susceptible to seismic actions, their vulnerability assessment is essential for seismic risk assessment and mitigation. The vulnerability assessment of bridges common in Pakistan is very important as it is seismically very active region and the available code for the seismic design of bridges is obsolete. This research presents seismic vulnerability assessment of three real case simply supported multi-span reinforced concrete bridges commonly found in northern Pakistan, having one, two and three bents with circular piers. The vulnerability assessment is carried through the non-linear dynamic time history analyses for the derivation of fragility curves. Finite element based numerical models of the bridges were developed in MIDAS CIVIL (2015) and analyzed through with non-linear dynamic and incremental dynamic analyses, using a suite of bridge-specific natural spectrum compatible ground motion records. Seismic responses of shear key, bearing pad, expansion joint and pier components of each bridges were recorded during analysis and retrieved for performance based analysis. Fragility curves were developed for the bearing pads, shear key, expansion joint and pier of the bridges that first reach ultimate limit state. Dynamic analysis and the derived fragility curves show that ultimate limit state of bearing pads, shear keys and expansion joints of the bridges exceed first, followed by the piers ultimate limit state for all the three bridges. Mean collapse capacities computed for all the components indicated that bearing pads, expansion joints, and shear keys exceed the ultimate limit state at lowest seismic intensities.

Analyses of Light-weight Protocol for Tag Security in RFID System (RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2399-2403
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper analyses the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage process, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and the mitigate the risks.

Development of Meteorologic Data Retrieval Program for Vulnerability Assessment to Natural Hazards (재해 취약성 평가를 위한 기상자료 처리 프로그램 MetSystem 개발)

  • Jang, Min-Won;Kim, Sang-Min
    • Journal of Korean Society of Rural Planning
    • /
    • v.19 no.4
    • /
    • pp.47-54
    • /
    • 2013
  • Climate change is the most direct threatening factors in sustaining agricultural productivity. It is necessary to reduce the damages from the natural hazards such as flood, drought, typhoons, and snowstorms caused by climate change. Through the vulnerability assessment to adapt the climate change, it is possible to analyze the priority, feasibility, effect of the reduction policy. For the vulnerability assessment, broad amount of weather data for each meterological station are required. Making the database management system for the meteorologic data could troubleshoot of the difficulties lie in handling and processing the weather data. In this study, we generated the meteorologic data retrieval system (MetSystem) for climate change vulnerability assessment. The user interface of MetSystem was implemented in the web-browser so as to access to a database server at any time and place, and it provides different query executions according to the criteria of meteorologic stations, temporal range, meteorologic items, statistics, and range of values, as well as the function of exporting to Excel format (*.xls). The developed system is expected that it will make it easier to try different analyses of vulnerability to natural hazards by the simple access to meteorologic database and the extensive search functions.

Seismic demand estimation of RC frame buildings based on simplified and nonlinear dynamic analyses

  • Borzi, B.;Vona, M.;Masi, A.;Pinho, R.;Pola, D.
    • Earthquakes and Structures
    • /
    • v.4 no.2
    • /
    • pp.157-179
    • /
    • 2013
  • Vulnerability studies on the existing building stock require that a large number of buildings is analyzed to obtain statistically significant evaluations of the seismic performance. Therefore, analytical evaluation methods need to be based on simplified methodologies of analysis which can afford the treatment of a large building population with a reasonable computational effort. Simplified Pushover-Based Earthquake Loss Assessment approach (SP-BELA), where a simplified methodology to identify the structural capacity of the building through the definition of a pushover curve is adopted, was developed on these bases. Main objective of the research work presented in this paper is to validate the simplified methodology implemented in SP-BELA against the results of more sophisticated nonlinear dynamic analyses (NLDAs). The comparison is performed for RC buildings designed only to vertical loads, representative of the "as built" in Italy and in Mediterranean countries with a building stock very similar to the Italian one. In NLDAs the non linear and degrading behaviour, typical of the structures under consideration when subjected to high seismic loads, is evaluated using models able to capture, with adequate accuracy, the non linear behaviour of RC structural elements taking into account stiffness degradation, strength deterioration, and pinching effect. Results show when simplified analyses are in good agreement with NLDAs. As a consequence, unsatisfactory results from simplified analysis are pointed out to address their current applicability limits.

Assessment of Vulnerable Area and Naval Ship's Vulnerability based on the Carleton Damage Function (칼튼 손상함수를 이용한 주요장비의 취약 면적 산정과 함정 취약성 평가 방법)

  • Lee, Jang Hyun;Choi, Won Jun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.3
    • /
    • pp.274-280
    • /
    • 2018
  • This paper deals with the calculation of vulnerable areas of critical components required for the assessment of naval ship's vulnerability. Taking into account the effectiveness of threatening weapons, the probability density function of damage was used to assess vulnerable areas or vulnerabilities of critical components. It is shown that the vulnerable area of critical component can be simply computed from the damage function. Considering the weapon effectiveness of fragmentation and explosion on the target, both Carleton Damage Function and Rectangular Cookie Cutter Function representing the probability of damage are applied to the vulnerable area assessment. Carleton damage function is utilized to describe the weapon-target interaction in the vulnerability analyses. A problem of blast effect against an assumed naval ship is chosen as a case study. Vulnerability is evaluated by applying the suggested method to the equipments arranged in the engine room of the virtual ship.

Technique for Enhancing Security and Analyses of Vulnerability of RFID Tag security and Protocol (RFID 태그 보안과 프로토콜의 취약점 분석 및 보안성 향상을 위한 기법)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1307-1312
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper proposes a novel practical approach, which are fully conformed to EPCglobal RFID Gen2 standard, for enhancing security of currently used RFID Gen2 tags against the various security threats.

Vibration measurement and vulnerability analysis of a power plant cooling system

  • Anil, Ozgur;Akbas, Sami Oguzhan;Kantar, Erkan;Gel, A. Cem
    • Smart Structures and Systems
    • /
    • v.11 no.2
    • /
    • pp.199-215
    • /
    • 2013
  • During the service life of a structure, design complications and unexpected events may induce unforeseen vibrations. These vibrations can be generated by malfunctioning machinery or machines that are modified or placed without considering the original structural design because of a change in the intended use of the structure. Significant vibrations occurred at a natural gas plant cooling structure during its operation due to cavitation effect within the hydraulic system. This study presents findings obtained from the in-situ vibration measurements and following finite-element analyses of the cooling structure. Comments are made on the updated performance level and damage state of the structure using the results of these measurements and corresponding numerical analyses. An attempt was also made to assess the applicability of traditional displacement-based vulnerability estimation methods in the health monitoring of structures under vibrations with a character different from those due to seismic excitations.