12.07.2015 Views

Report - PEER - University of California, Berkeley

Report - PEER - University of California, Berkeley

Report - PEER - University of California, Berkeley

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PARAMETERIZED VULNERABILITY FUNCTIONSFOR AS-BUILT AND RETROFITTED STRUCTURESSeong-Hoon JEONG 1 and Amr S. ELNASHAI 2ABSTRACTIn this study, preliminary results from an approach whereby a set <strong>of</strong> vulnerability functions arederived based on the three basic response quantities <strong>of</strong> stiffness, strength and ductility. Oncethe basic three characteristics <strong>of</strong> a structural system are defined and the response database isconstructed, the vulnerability functions for various limit states can be constructed withoutrecourse to further simulation.Keywords: Parameterized vulnerability function; Fast demand estimation;Response parameters; Response database.1. INTRODUCTIONThe use <strong>of</strong> vulnerability functions, defined as a relationships between ground shakingintensity and the probability <strong>of</strong> reaching or exceeding a certain response level, forassessment <strong>of</strong> seismic losses is in increasing demand, both for pre-earthquake disasterplanning and post-earthquake recovery and retr<strong>of</strong>itting programs. This is due to thedifficulties associated with analyzing individual structures and the importance <strong>of</strong>obtaining a global view <strong>of</strong> anticipated damage or effects <strong>of</strong> intervention, before orafter an earthquake, respectively. Apart from the regional loss assessment application<strong>of</strong> vulnerability functions, they are useful in probabilistic assessment <strong>of</strong> damage toindividual structures taking into account material and input motion randomness.Various methods <strong>of</strong> vulnerability assessment differ in the required resources andprecision <strong>of</strong> the assessment results. Therefore, the choice <strong>of</strong> a method should be madeconsidering the trade<strong>of</strong>f between effort and precision, as conceptually shown in Table1. Observed vulnerability methods resort to statistics <strong>of</strong> real damages from pastearthquakes and its details are given in (Rossetto and Elnashai 2003). Seismic riskassessment methods in ATC-13 and ATC-14 are examples <strong>of</strong> vulnerability functionsbased on expert opinions and score assignment respectively, and details <strong>of</strong> thesemethods are discussed in (Lang 2002). Vulnerability functions derived from simple1 Research Assistant, Civil Engineering Department, <strong>University</strong> <strong>of</strong> Illinois at Urbana-Champaign2 Willette Pr<strong>of</strong>essor, Civil Engineering Department; Director, Mid-America Earthquake Center,<strong>University</strong> <strong>of</strong> Illinois at Urbana-Champaign, Urbana, Illinois, USA185

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!