12.07.2015 Views

Report - PEER - University of California, Berkeley

Report - PEER - University of California, Berkeley

Report - PEER - University of California, Berkeley

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

analytical models generally have significant limitations due to simplicity <strong>of</strong> themodels, use <strong>of</strong> response spectra or other simple representations <strong>of</strong> ground shaking(Calvi 1999).Table 1. Comparison <strong>of</strong> vulnerability assessment methods (Lang 2002)MethodsEffortPrecision1 2 3 4 5observedvulnerabilityexpertopinionssimpleanalyticalmodelsscoreassignmentincreasing time and computation effortaccuracy <strong>of</strong> the assessmentdetailedanalysisprocedureApplicationbuilding stockindividualbuildingThe aim <strong>of</strong> the method proposed in this paper is to obtain precise assessmentresults closing up to those <strong>of</strong> the vulnerability assessment using detailed analysisprocedure with a very quick and simple procedure.2. OVERVIEW OF THE PROPOSED METHODOLOGYVulnerability functions may be derived analytically by simulation. Even for a limitednumber <strong>of</strong> random variables and for modest ranges <strong>of</strong> variation, the simulation effortis very considerable, reaching several hundreds <strong>of</strong> thousands <strong>of</strong> analyses. Every timethe structure is replaced or even modified, the repetition <strong>of</strong> the simulation is required.It is hereafter proposed to parameterize the problem in such a manner that a genericset <strong>of</strong> vulnerability functions will be derived. The parameters influencing the shape <strong>of</strong>the functions are related to (i) stiffness, closely related to serviceability limit state, (ii)strength, closely related to damage control limit states and (iii) ductility, closelyrelated to collapse prevention. By using the latter parameters with a response databasewhich is a collection <strong>of</strong> pre-run inelastic response analyses <strong>of</strong> structures with a widerange <strong>of</strong> response parameters, the vulnerability functions are directly obtained withoutthe need for simulation. This feature, allows consideration <strong>of</strong> various structuralconfigurations in the decision making <strong>of</strong> earthquake mitigation strategies, by reducingthe time and effort in the derivation <strong>of</strong> vulnerability functions.Fig. 1 represents the procedure to derive parameterized vulnerability functions. Inthe latter figure, the effect <strong>of</strong> a specific repair method on the vulnerability curve iscalculated through three main steps: (i) determination <strong>of</strong> response parameters afterrepair, (ii) response estimation using Response Database (RD) <strong>of</strong> which the detail ispresented in the following section and (iii) construction <strong>of</strong> vulnerability functionswith various limit states (L.S.).186

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!