PSI - Issue 44

Livio Pedone et al. / Procedia Structural Integrity 44 (2023) 227–234

232

Livio Pedone et al. / Structural Integrity Procedia 00 (2022) 000–000

6

(a)

(b)

Fig. 5. SLaMA-based fragility curve for the (a) complete and (b) limited data collection scenarios.

Table 1. Median and standard deviation values of fragility curves for complete and limited data collection scenarios. DS1 DS2 DS3 DS4

$% [ ] $% $% [ ] $% $% [ ] $% $% [ ] $% 0.462 0.121 0.462 0.167 0.462 0.202

Numerical (CDCS) 0.072

0.462 0.452

SLaMA (CDCS) SLaMA (LDCS)

0.078

0.452

0.133

0.452

0.184

0.452

0.222

0.069-0.088

0.437-0.468

0.113-0.16

0.437-0.468

0.155-0.222

0.437-0.468

0.187-0.268

0.437-0.468

Notes: CDCS = Complete Data Collection Scenario; LDCS = Limited Data Collection Scenario. Table 1 shows that similar median and standard deviation values are obtained when comparing the results of the SLaMA with the numerical analysis. An error smaller than 10% and 2% is in fact observed for the median and standard deviation, respectively. Moreover, the median and dispersion values of the complete data collection scenario (both numerical and SLaMA) are contained within the range of values evaluated for the limited data collection scenario, consistently with the proposed multi-knowledge assessment methodology. Vulnerability analysis is performed by adopting the building-level damage-to-loss model proposed by Martins and Silva (2021). For the sake of simplicity, only the mean values (i.e., percentage of repair/reconstruction cost) are considered. Specifically, a Loss Ratio ( LR i ) equal to 5%, 20%, 60%, and 100% is considered for DS1, DS2, DS3, and DS4, respectively. Nevertheless, it is worth noting that different damage-to-loss models can be adopted. Vulnerability curves are finally derived through Eq. (1): ( ) = ? ( = D | ) ∙ D (1) where ( = D | ) is the probability of attaining a damage state D given an Intensity Measure (IM) value. Fig. 6 shows the results of the vulnerability analysis for both the completed and limited data collection scenarios. 2 &

(a)

(b)

Fig. 6. Vulnerability functions for the complete (a) and limited (b) data collection scenarios.

Made with FlippingBook flipbook maker