• Title/Summary/Keyword: structural vulnerability monitoring

Search Result 16, Processing Time 0.018 seconds

Vulnerability and seismic improvement of architectural heritage: the case of Palazzo Murena

  • Liberotti, Riccardo;Cluni, Federico;Gusella, Vittorio
    • Earthquakes and Structures
    • /
    • v.18 no.3
    • /
    • pp.321-335
    • /
    • 2020
  • The aim of the present contribution is to consider and underline the essential interactions among the historical knowledge, the seismic vulnerability assessment, the investigation experimental tools, the preservation of the architectural quality and the strengthening design in regard to architectural heritage conservation. These topics are argued in relation to Palazzo Murena in Perugia, designed in the eighteenth century by the famous Architect Luigi Vanvitelli, and currently headquarters of the city's University. Based on the surveys and the visual inspections, a preliminary a priori global analysis has been performed by means of the FME method. The obtained results permitted to plan an experimental tests campaign inclusive of structural health monitoring. The new achieved "knowledge" of the building allowed to refine the seismic safety assessment. In particular it was highlighted that the "mezzanine floor" can be a vulnerable element of the building with the collapse of its masonry walls. Preserving the architectural characteristics, a local reinforcement intervention is proposed for the above-mentioned level; this consists of the application of plaster with FRCM, assuring an adequate strength, without burden the masonry structure with additional weight, and therefore a decreasing of the seismic vulnerability. The necessity to consider, in this ongoing research, other local mechanisms is highlighted in the unfolding of the last part of work.

The development of the seismic fragility curves of existing bridges in Indonesia (Case study: DKI Jakarta)

  • Veby Citra Simanjuntak;Iswandi Imran;Muslinang Moestopo;Herlien D. Setio
    • Structural Monitoring and Maintenance
    • /
    • v.10 no.1
    • /
    • pp.87-105
    • /
    • 2023
  • Seismic regulations have been updated from time to time to accommodate an increase in seismic hazards. Comparison of seismic fragility of the existing bridges in Indonesia from different historical periods since the era before 1990 will be the basis for seismic assessment of the bridge stock in Indonesia, most of which are located in earthquake-prone areas, especially those built many years ago with outdated regulations. In this study, seismic fragility curves were developed using incremental non-linear time history analysis and more holistically according to the actual strength of concrete and steel material in Indonesia to determine the uncertainty factor of structural capacity, βc. From the research that has been carried out, based on the current seismic load in SNI 2833:2016/Seismic Map 2017 (7% probability of exceedance in 75 years), the performance level of the bridge in the era before SNI 2833:2016 was Operational-Life Safety whereas the performance level of the bridge designed with SNI 2833:2016 was Elastic - Operational. The potential for more severe damage occurs in greater earthquake intensity. Collapse condition occurs at As = FPGA x PGA value of bridge Era I = 0.93 g; Era II = 1.03 g; Era III = 1.22 g; Era IV = 1.54 g. Furthermore, the fragility analysis was also developed with geometric variations in the same bridge class to see the effect of these variations on the fragility, which is the basis for making bridge risk maps in Indonesia.

Towards high-accuracy data modelling, uncertainty quantification and correlation analysis for SHM measurements during typhoon events using an improved most likely heteroscedastic Gaussian process

  • Qi-Ang Wang;Hao-Bo Wang;Zhan-Guo Ma;Yi-Qing Ni;Zhi-Jun Liu;Jian Jiang;Rui Sun;Hao-Wei Zhu
    • Smart Structures and Systems
    • /
    • v.32 no.4
    • /
    • pp.267-279
    • /
    • 2023
  • Data modelling and interpretation for structural health monitoring (SHM) field data are critical for evaluating structural performance and quantifying the vulnerability of infrastructure systems. In order to improve the data modelling accuracy, and extend the application range from data regression analysis to out-of-sample forecasting analysis, an improved most likely heteroscedastic Gaussian process (iMLHGP) methodology is proposed in this study by the incorporation of the outof-sample forecasting algorithm. The proposed iMLHGP method overcomes this limitation of constant variance of Gaussian process (GP), and can be used for estimating non-stationary typhoon-induced response statistics with high volatility. The first attempt at performing data regression and forecasting analysis on structural responses using the proposed iMLHGP method has been presented by applying it to real-world filed SHM data from an instrumented cable-stay bridge during typhoon events. Uncertainty quantification and correlation analysis were also carried out to investigate the influence of typhoons on bridge strain data. Results show that the iMLHGP method has high accuracy in both regression and out-of-sample forecasting. The iMLHGP framework takes both data heteroscedasticity and accurate analytical processing of noise variance (replace with a point estimation on the most likely value) into account to avoid the intensive computational effort. According to uncertainty quantification and correlation analysis results, the uncertainties of strain measurements are affected by both traffic and wind speed. The overall change of bridge strain is affected by temperature, and the local fluctuation is greatly affected by wind speed in typhoon conditions.

Remote monitoring of urban and infrastructural areas

  • Bortoluzzi, Daniele;Casciati, Fabio;Elia, Lorenzo;Faravelli, Lucia
    • Earthquakes and Structures
    • /
    • v.7 no.4
    • /
    • pp.449-462
    • /
    • 2014
  • Seismically induced structural damage, as well as any damage caused by a natural catastrophic event, covers a wide area. This suggests to supervise the event consequences by vision tools. This paper reports the evolution from the results obtained by the project RADATT (RApid Damage Assessment Telematics Tool) funded by the European Commission within FP4. The aim was to supply a rapid and reliable damage detector/estimator for an area where a catastrophic event had occurred. Here, a general open-source methodology for the detection and the estimation of the damage caused by natural catastrophes is developed. The suitable available hazard and vulnerability data and satellite pictures covering the area of interest represent the required bits of information for updated telematics tools able to manage it. As a result the global damage is detected by the simple use of open source software. A case-study to a highly dense agglomerate of buildings is discussed in order to provide the main details of the proposed methodology.

Exploring Community Structure and Function with Network Analysis: a Case Study of Cheonggye Stream (생태계 네트워크 분석을 이용한 생물 군집의 구조와 기능에 대한 연구: 청계천을 사례로)

  • Lee, Minyoung;Kim, Yongeun;Cho, Kijong
    • Korean Journal of Environmental Biology
    • /
    • v.36 no.3
    • /
    • pp.370-376
    • /
    • 2018
  • It is important to consider interaction between species in understanding structure and function of the biological community. Current ecological issues such as climate change and habitat loss emphasize the significance of the concept of species interaction in that varying species' interaction across environmental gradients may lead to altered ecological function and services. However, most community studies have focused on species diversity through analysis of quantitative indices based on species composition and abundance data without considering species interactions in the community. 'Ecological network analysis' based on network theory enables exploration of structural and functional properties of ecosystems composed of various species and their interactions. In this paper, network analysis of Cheonggye stream as a case study was presented to promote uses of network analysis on ecological studies in Korea. Cheonggye stream has a simple biological structure with link density of 1.48, connectance 0.07, generality 4.43, and vulnerability 1.94. The ecological network analysis can be used to provide ecological interpretations of domestic long-term monitoring data and can contribute to conserving and managing species diversity in ecosystems.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF