• 제목/요약/키워드: Vulnerability Analyses

검색결과 132건 처리시간 0.042초

Seismic vulnerability assessment of RC buildings according to the 2007 and 2018 Turkish seismic codes

  • Yon, Burak
    • Earthquakes and Structures
    • /
    • 제18권6호
    • /
    • pp.709-718
    • /
    • 2020
  • Fragility curves are useful tools to estimate the damage probability of buildings owing to seismic actions. The purpose of this study is to investigate seismic vulnerability of reinforced concrete (RC) buildings, according to the 2007 and 2018 Turkish Seismic Codes, using fragility curves. For the numerical analyses, typical five- and seven-storey RC buildings were selected and incremental dynamic analyses (IDA) were performed. To complete the IDAs, eleven earthquake acceleration records multiplied by various scaling factors from 0.2g to 0.8g were used. To predict nonlinearity, a distributed hinge model that involves material and geometric nonlinearity of the structural members was used. Damages to confined concrete and reinforcement bar of structural members were obtained by considering the unit deformation demands of the 2007 Turkish Seismic Code (TSC-2007) and the 2018 Turkey Building Earthquake Code (TBEC-2018). Vulnerability evaluation of these buildings was performed using fragility curves based on the results of incremental dynamic analyses. Fragility curves were generated in terms of damage levels occurring in confined concrete and reinforcement bar of structural members with a lognormal distribution assumption. The fragility curves show that the probability of damage occurring is more according to TBEC-2018 than according to TSC-2007 for selected buildings.

무선센서네트워크에서의 취약성 및 보안 메카니즘의 분석 (Analyses of Vulnerability and Security Mechanisms in Wireless Sensor Networks)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 춘계학술대회
    • /
    • pp.805-808
    • /
    • 2009
  • Security has become a major concern for many real world applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all these approaches are based on wellknown cryptographic algorithms. At the same time, performance studies have shown that the applicability of sensor networks strongly depends on effective routing decisions or energy aware wireless communication. In this paper, we analyses vulnerability and security mechanisms in wireless sensor networks.

  • PDF

Seismic performance evaluation of RC bearing wall structures

  • Rashedi, Seyed Hadi;Rahai, Alireza;Tehrani, Payam
    • Computers and Concrete
    • /
    • 제30권2호
    • /
    • pp.113-126
    • /
    • 2022
  • Reinforced concrete bearing walls (RCBWs) are one of the most applicable structural systems. Therefore, vulnerability analysis and rehabilitation of the RCBW system are of great importance. In the present study, in order to the more precise investigation of the performance of this structural resistant system, pushover and nonlinear time history analyses based on several assumptions drawing upon experimental research were performed on several models with different stories. To validate the nonlinear analysis method, the analytical and experimental results are compared. Vulnerability evaluation was carried out on two seismic hazard levels and three performance levels. Eventually, the need for seismic rehabilitation with the basic safety objective (BSO) was investigated. The obtained results showed that the studied structures satisfied the BSO of the seismic rehabilitation guidelines. Consequently, according to the results of analyses and the desired performance, this structural system, despite its high structural weight and rigid connections and low flexibility, has integrated performance, and it can be a good option for earthquake-resistant constructions.

Fragility curves for the typical multi-span simply supported bridges in northern Pakistan

  • Waseem, Muhammad;Spacone, Enrico
    • Structural Engineering and Mechanics
    • /
    • 제64권2호
    • /
    • pp.213-223
    • /
    • 2017
  • Bridges are lifeline and integral components of transportation system that are susceptible to seismic actions, their vulnerability assessment is essential for seismic risk assessment and mitigation. The vulnerability assessment of bridges common in Pakistan is very important as it is seismically very active region and the available code for the seismic design of bridges is obsolete. This research presents seismic vulnerability assessment of three real case simply supported multi-span reinforced concrete bridges commonly found in northern Pakistan, having one, two and three bents with circular piers. The vulnerability assessment is carried through the non-linear dynamic time history analyses for the derivation of fragility curves. Finite element based numerical models of the bridges were developed in MIDAS CIVIL (2015) and analyzed through with non-linear dynamic and incremental dynamic analyses, using a suite of bridge-specific natural spectrum compatible ground motion records. Seismic responses of shear key, bearing pad, expansion joint and pier components of each bridges were recorded during analysis and retrieved for performance based analysis. Fragility curves were developed for the bearing pads, shear key, expansion joint and pier of the bridges that first reach ultimate limit state. Dynamic analysis and the derived fragility curves show that ultimate limit state of bearing pads, shear keys and expansion joints of the bridges exceed first, followed by the piers ultimate limit state for all the three bridges. Mean collapse capacities computed for all the components indicated that bearing pads, expansion joints, and shear keys exceed the ultimate limit state at lowest seismic intensities.

RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석 (Analyses of Light-weight Protocol for Tag Security in RFID System)

  • 김정태
    • 한국정보통신학회논문지
    • /
    • 제15권11호
    • /
    • pp.2399-2403
    • /
    • 2011
  • RFID 는 유비쿼터스 환경하에서 필수불가결한 기술이 되도 있다. 그러나 RFID 의 본질적인 단점으로 인하여 프라이버시와 같은 보안적인 취약점을 기자고 있다. 따라서 본 논문에서는 RFID 시스템의 관점하에서 태그에서의 보안적인 취약점 및 이럴 해결하기 위한 여러 가지의 프로토콜에서의 문제점을 분석하였다. 최근에는 반도체 공정 기술의 발전과 경량화프로토콜의 발전으로 인하여 태그에서의 보안성이 향상되고 있는 중이다.

재해 취약성 평가를 위한 기상자료 처리 프로그램 MetSystem 개발 (Development of Meteorologic Data Retrieval Program for Vulnerability Assessment to Natural Hazards)

  • 장민원;김상민
    • 농촌계획
    • /
    • 제19권4호
    • /
    • pp.47-54
    • /
    • 2013
  • Climate change is the most direct threatening factors in sustaining agricultural productivity. It is necessary to reduce the damages from the natural hazards such as flood, drought, typhoons, and snowstorms caused by climate change. Through the vulnerability assessment to adapt the climate change, it is possible to analyze the priority, feasibility, effect of the reduction policy. For the vulnerability assessment, broad amount of weather data for each meterological station are required. Making the database management system for the meteorologic data could troubleshoot of the difficulties lie in handling and processing the weather data. In this study, we generated the meteorologic data retrieval system (MetSystem) for climate change vulnerability assessment. The user interface of MetSystem was implemented in the web-browser so as to access to a database server at any time and place, and it provides different query executions according to the criteria of meteorologic stations, temporal range, meteorologic items, statistics, and range of values, as well as the function of exporting to Excel format (*.xls). The developed system is expected that it will make it easier to try different analyses of vulnerability to natural hazards by the simple access to meteorologic database and the extensive search functions.

Seismic demand estimation of RC frame buildings based on simplified and nonlinear dynamic analyses

  • Borzi, B.;Vona, M.;Masi, A.;Pinho, R.;Pola, D.
    • Earthquakes and Structures
    • /
    • 제4권2호
    • /
    • pp.157-179
    • /
    • 2013
  • Vulnerability studies on the existing building stock require that a large number of buildings is analyzed to obtain statistically significant evaluations of the seismic performance. Therefore, analytical evaluation methods need to be based on simplified methodologies of analysis which can afford the treatment of a large building population with a reasonable computational effort. Simplified Pushover-Based Earthquake Loss Assessment approach (SP-BELA), where a simplified methodology to identify the structural capacity of the building through the definition of a pushover curve is adopted, was developed on these bases. Main objective of the research work presented in this paper is to validate the simplified methodology implemented in SP-BELA against the results of more sophisticated nonlinear dynamic analyses (NLDAs). The comparison is performed for RC buildings designed only to vertical loads, representative of the "as built" in Italy and in Mediterranean countries with a building stock very similar to the Italian one. In NLDAs the non linear and degrading behaviour, typical of the structures under consideration when subjected to high seismic loads, is evaluated using models able to capture, with adequate accuracy, the non linear behaviour of RC structural elements taking into account stiffness degradation, strength deterioration, and pinching effect. Results show when simplified analyses are in good agreement with NLDAs. As a consequence, unsatisfactory results from simplified analysis are pointed out to address their current applicability limits.

칼튼 손상함수를 이용한 주요장비의 취약 면적 산정과 함정 취약성 평가 방법 (Assessment of Vulnerable Area and Naval Ship's Vulnerability based on the Carleton Damage Function)

  • 이장현;최원준
    • 대한조선학회논문집
    • /
    • 제55권3호
    • /
    • pp.274-280
    • /
    • 2018
  • This paper deals with the calculation of vulnerable areas of critical components required for the assessment of naval ship's vulnerability. Taking into account the effectiveness of threatening weapons, the probability density function of damage was used to assess vulnerable areas or vulnerabilities of critical components. It is shown that the vulnerable area of critical component can be simply computed from the damage function. Considering the weapon effectiveness of fragmentation and explosion on the target, both Carleton Damage Function and Rectangular Cookie Cutter Function representing the probability of damage are applied to the vulnerable area assessment. Carleton damage function is utilized to describe the weapon-target interaction in the vulnerability analyses. A problem of blast effect against an assumed naval ship is chosen as a case study. Vulnerability is evaluated by applying the suggested method to the equipments arranged in the engine room of the virtual ship.

RFID 태그 보안과 프로토콜의 취약점 분석 및 보안성 향상을 위한 기법 (Technique for Enhancing Security and Analyses of Vulnerability of RFID Tag security and Protocol)

  • 김정태
    • 한국정보통신학회논문지
    • /
    • 제15권6호
    • /
    • pp.1307-1312
    • /
    • 2011
  • RFID 는 유비쿼터스 환경하에서 필수불가결한 기술이 되도 있다. 그러나 RFID 의 본질적인 단점으로 인하여 프라이버시와 같은 보안적인 취약점을 기자고 있다. 따라서 본 논문에서는 이러한 태그에서의 취약점과 프로토콜의 위협 요소를 살펴보고, 이를 위한 실제적인 기술적인 요소에 대해서 상세히 분석하였다. 특히 현재 표준안으로 사용되고 있는 EPCglobal RFID Gen2에 적용하기 위한 보안성 향상을 위한 기술적인 방법에 대해서 분석하였다.

Vibration measurement and vulnerability analysis of a power plant cooling system

  • Anil, Ozgur;Akbas, Sami Oguzhan;Kantar, Erkan;Gel, A. Cem
    • Smart Structures and Systems
    • /
    • 제11권2호
    • /
    • pp.199-215
    • /
    • 2013
  • During the service life of a structure, design complications and unexpected events may induce unforeseen vibrations. These vibrations can be generated by malfunctioning machinery or machines that are modified or placed without considering the original structural design because of a change in the intended use of the structure. Significant vibrations occurred at a natural gas plant cooling structure during its operation due to cavitation effect within the hydraulic system. This study presents findings obtained from the in-situ vibration measurements and following finite-element analyses of the cooling structure. Comments are made on the updated performance level and damage state of the structure using the results of these measurements and corresponding numerical analyses. An attempt was also made to assess the applicability of traditional displacement-based vulnerability estimation methods in the health monitoring of structures under vibrations with a character different from those due to seismic excitations.