Vulnerability assessment process inputs—establish protection objectives

Author(s):  
Mary Lynn Garcia
2007 ◽  
Vol 142 (3) ◽  
pp. 689-694 ◽  
Author(s):  
David A. Moore ◽  
Brad Fuller ◽  
Michael Hazzan ◽  
J. William Jones

Author(s):  
Jacqueline N. Hood ◽  
Tim Olivas ◽  
Chuck B. Slocter ◽  
Barry Howard ◽  
David P. Albright

Vulnerability assessment is the analysis of a system for weaknesses that could be exploited and the determination of the probability of an attack on those weaknesses. Transportation vulnerability assessment is concerned with our transportation system. Highway, bridge, airport, rail, transit, and intermodal infrastructure are part of our transportation system. Automobiles, trucks, airplanes, trains, and transit vehicles are part of our transportation system. People of all walks of life, in every city and state, are part of our transportation system. Vulnerability assessment includes people involved in all modes of our transportation system at all levels of government and the private sector. Because our responsibility is as extensive as it is essential and enduring, vulnerability assessment is critical if we are to use our resources to provide safe, secure, and reliable transportation. Described is the vulnerability-assessment process in use in New Mexico and its relationship to integrated transportation analysis.


2021 ◽  
Vol 15 (1) ◽  
pp. 182-202
Author(s):  
Mattia Zizi ◽  
Pasquale Bencivenga ◽  
Gennaro Di Lauro ◽  
Gianfranco Laezza ◽  
Pasquale Crisci ◽  
...  

Introduction: A large portion of the Italian built heritage is characterized by a significant seismic vulnerability since many structures were designed with outdated criteria, i.e., without accounting for seismic actions. This aspect is particularly relevant for strategic structures and infrastructures, whose functionalities are crucial in case of seismic events. Objective: The main aim of the present paper is to share the key findings related to the seismic vulnerability assessment of the National Institute for the Study and Treatment of Cancer (IRCCS) “Giovanni Pascale Foundation” in Naples. In particular, the main evidences could be easily extended to existing hospitals realized in the last century, with the main reference to: construction techniques, quality of constructional material, overt and convert seismic vulnerabilities and possible intervention strategies for risk mitigation. Methods: In the present paper, the assessment methodologies adopted for such a strategic hospital complex are provided, focusing in particular on: i. preliminary research of original design documents and on-site investigation for determining constructional details; ii. material tests on structural elements; iii. vulnerability seismic assessment by means of non-linear FE analyses (push-over and capacity spectrum method); iv. recommendations on retrofitting measures and cost estimations. Results: The conducted study puts into clear evidence the inadequacy of the investigated buildings to face the design seismic actions provided by the current Italian code and thus showed the significant seismic vulnerabilities affecting the Institute “G. Pascale Foundation” of Naples. Among these, particular attention has also been focused on the so-called intrinsic vulnerabilities, namely the ones not measurable explicitly and interesting non-structural elements (e.g., connection of shelves, stained glass windows, facilities, etc.). Conclusion: The presented case study highlights the strong seismic vulnerability affecting structures realized in the past century, despite their strategic functions. On the whole, the examined structures can be considered as representative of this building typology, and the adopted calculation criteria, as well as the assumptions of the assessment process, could be easily extended to similar case studies.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Wei Tian ◽  
Xingrun Zhong ◽  
Ping Guo ◽  
Guangmin Zhang

Reuse of old industrial areas strongly impacts urban renewal and social development. However, it is limited by significant pollution and damage of buildings. In the decision-making stage, it is necessary to conduct a reasonable vulnerability analysis of old industrial areas. This study focuses on establishing a reasonable and effective vulnerability assessment model to be used in actual work. First, based on literature analysis, a normal cloud model was employed to establish the assessment process and model. Second, foundation damage, structural bearing capacity, and other building safety indicators, as well as environmental safety, were included in the vulnerability assessment indicator system. Thus, through indicator selection and optimization, the vulnerability assessment indicators and their quantitative methods were determined and parameter features of the cloud model were programmed by the forward cloud generator. Finally, the Shougang Industrial Area, to be reused as the Winter Olympic Park, was selected as the case study. The vulnerability analysis results show that the vulnerability assessment method strongly agrees with the actual status and that the assessment results provide a basis for improving the vulnerability of old industrial areas for reuse.


Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2518 ◽  
Author(s):  
Andrzej Bialas

There are more and more applications of sensors in today’s world. Moreover, sensor systems are getting more complex and they are used for many high-risk security-critical purposes. Security assurance is a key issue for sensors and for other information technology (IT) products. Still, sensor security facilities and methodologies are relatively poor compared to other IT products. That is why a methodical approach to the sensor IT security is needed, i.e., risk management, implementation of countermeasures, vulnerability removal, and security evaluation and certification. The author proposes to apply the main security assurance methodology specified in ISO/IEC 15408 Common Criteria to solve specific security problems of sensors. A new Common Criteria compliant method is developed which specifies the vulnerability assessment process and related data in a structured way. The input/output data of the introduced elementary evaluation processes are modeled as ontology classes to work out knowledge bases. The validation shows that sensor-specific knowledge can be acquired during the vulnerability assessment process and then placed in knowledge bases and used. The method can be applied in different IT products, especially those with few certifications, such as sensors. The presented methodology will be implemented in a software tool in the future.


2019 ◽  
Vol 2019 ◽  
pp. 1-14 ◽  
Author(s):  
Muhammad Zain ◽  
Muhammad Usman ◽  
Syed Hassan Farooq ◽  
Tahir Mehmood

Thick population density and its escalation propensity in seismically active regions of Pakistan has raised sincere concerns about the performance of building stock whose suboptimal performance and complete collapses led to a colossal number of casualties during the past earthquakes. The current research is inspired by the Kashmir earthquake of 2005 which consumed more than 80,000 lives, out of which, approximately 19,000 were children due to wide spread collapse of school buildings. A new database for existing reinforced concrete (RC) school buildings in seismic zone 4 of Pakistan has been developed using the surveyed information and presented briefly. The paper presents the statistics of the data collected through field surveys and professional interviews. It was found that the infrastructural authorities in the considered region developed some specific designs for school buildings, with varying architectural and structural configurations, which were eventually replicated throughout the area. In the current study, almost 2500 schools were surveyed for identifying versatile architectural and structural configurations, and subsequently, 19 different types had been identified, which were eventually used as representative stock for the schools in seismic zone 4 of Pakistan, Muzaffarabad district. The results of the study yield the brief of the collected data from the field and a consolidated methodology for establishing the analytical fragility relationships for one of the 19 structural configurations of the school buildings. A sample building from the collected data has been selected by considering the maximum number of students, and afterwards, the vulnerability is assessed by employing incremental dynamic analysis (IDA) which constitutes the presented methodology. Finally, the fragility curves are developed and presented for the said building type. The derived analytical fragility curves for the considered building type indicate its structural vulnerability and as a whole represent its satisfactory behavior. The vulnerability assessment process and the fragility development are described in an easy manner so that the domestic practicing engineers can readily become able to extend the application towards other school buildings in the region. The developed relationships can be employed for rational decision making so that essential disaster preparedness can be carried out by identifying any need for structural strengthening and interventions.


2012 ◽  
Vol 518-523 ◽  
pp. 4321-4324
Author(s):  
Yu Chen ◽  
Long Cang Shu

This research takes the land subsidence in Xixi-Chengnan area, Jiangsu province as a case study, quantifies the relative land subsidence vulnerability in terms of vulnerability degree and determines the numerical classification of vulnerability level at the township scale based on the constructed subsidence vulnerability assessment framework, and the detail analysis of natural geographical environment and regional socio-economic conditions in the study area. The vulnerability assessment process is quantitative, objective and comprehensive, provides effective information for the systematic study of land subsidence in Xixi-Chengnan area, lays the foundation for planning of regional land subsidence disaster prevention and reduction, and is worthy of learning for the whole Su-Xi-Chang area and even other subsidence areas.


Sign in / Sign up

Export Citation Format

Share Document