12.07.2015 Views

Report - PEER - University of California, Berkeley

Report - PEER - University of California, Berkeley

Report - PEER - University of California, Berkeley

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5. CONCLUSIONSDerivation <strong>of</strong> vulnerability functions for a class <strong>of</strong> structures requires many analyses(tens or even hundreds <strong>of</strong> thousands), especially when a large number <strong>of</strong> randomvariables is considered. These will then have to be re-derived for different structuralconfigurations as well as for different repair and/or strengthening methods. In thispaper, a new analytical vulnerability assessment framework based on deriving aResponse Database was proposed. The Response Database is an accumulation <strong>of</strong> preanalyzedinelastic response <strong>of</strong> structures with a wide range <strong>of</strong> stiffness and strength.Therefore, with pre-determined stiffness, strength and a set <strong>of</strong> records, the databaseprovides mean value and standard deviation <strong>of</strong> inelastic response quantities <strong>of</strong> thecorresponding structure without the need for further analysis. The effect <strong>of</strong> ductilityvariation is included by changing the limit states in the calculation <strong>of</strong> cumulativeconditional probability.The implications <strong>of</strong> the success <strong>of</strong> the developed approach are wide-ranging. Forcases <strong>of</strong> selection between different retr<strong>of</strong>itting options, the parameterizedvulnerability functions approach gives rapid estimates <strong>of</strong> probabilities <strong>of</strong> variousdamage levels being inflicted onto the structures under consideration, given only thestiffness, strength and ductility for each alternative retr<strong>of</strong>itting scheme. Additionally,the presented vulnerability assessment methodology enables the analyst to practicallyinvestigate the vulnerability <strong>of</strong> large number <strong>of</strong> structural configurations. Therefore,this method blends very well with Consequence-Based Engineering (Abrams et al.2002) where the vulnerability assessment for generic structural systems in a largeregion is sought. This approach is being implemented into the Mid-AmericaEarthquake Center seismic loss assessment system MAEViz.ACKNOWLEDGMENTThe work presented above was undertaken as part <strong>of</strong> the Mid-America Earthquake(MAE) Center research project CM-4: Structural Retr<strong>of</strong>it Strategies, which is underthe Consequence Minimization Thrust Area. The MAE Center is a National ScienceFoundation Engineering Research Center (ERC), funded through contract referenceNSF Award No. EEC-9701785.194

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!