A Vulnerability Assessment Method for Structural Systems Based on Explicitly Connected Bayesian Networks

A Bayesian network and fragility technology, applied in data processing applications, instruments, calculations, etc., can solve the problems of failure probability, lack of research on vulnerability assessment, lack of effective methods for vulnerability reasoning, etc.

Active Publication Date: 2019-03-19
徐州大通建设集团有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the traditional structural vulnerability analysis mainly focuses on the component level, and the research on the overall vulnerability assessment of the structure as a system is relatively scarce. The most vulnerable components of the structure (for example, bridge systems usually use pier columns) are generally used to replace the structural system vulnerability. However, there is no effective method for fragility reasoning from components to structural systems; most of them consider the response demand parameters of a single structure, construct its demand model, and achieve the purpose of simplifying the analysis, without considering the failure probability under the joint action of multiple performance limit states

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Vulnerability Assessment Method for Structural Systems Based on Explicitly Connected Bayesian Networks
  • A Vulnerability Assessment Method for Structural Systems Based on Explicitly Connected Bayesian Networks
  • A Vulnerability Assessment Method for Structural Systems Based on Explicitly Connected Bayesian Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The content of the present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments. It should be understood that this embodiment is only used to illustrate the present invention, and is not intended to limit the scope of the present invention. After reading the present invention, those skilled in the art will fall within the scope of the appended application to the modifications of various equivalent forms of the present invention. the scope defined by the claims.

[0047] Taking a reinforced concrete multi-span continuous girder bridge as an example, the Bayesian network theory of explicit connectivity is applied to the seismic vulnerability analysis of the structural system. The method specifically includes the following steps:

[0048] S1. To divide the structure into layers, the system should be layered according to the characteristics of the structures concerned. Usually, the structure is decompos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for assessing the vulnerability of a structural system based on an explicit connected Bayesian network (ECBN). This method aims at the limitations of the traditional fragility analysis which mainly focuses on the component level and seldom considers the probabilistic dependencies between components to carry out system failure probability reasoning. The present invention considers the joint effect of multiple component damage by displaying connected Bayesian networks, and proposes The root node prior probability evaluation model based on the multi-dimensional performance limit state equation strives to truly reflect the damage state of the components and improve the evaluation accuracy; the AHP is used to consider the probability dependencies between components and construct the conditional probability information of the intermediate nodes of the Bayesian network. It is especially practical in the absence of damage data, and the reasoning from component vulnerability to structural system vulnerability is finally realized through variable elimination algorithm. Make up for the lack of research on the vulnerability assessment of large-scale engineering structure systems, and provide scientific support for the safe construction and effective operation of major engineering structure systems.

Description

technical field [0001] The invention belongs to the technical field of reliability analysis and evaluation, and relates to a failure probability analysis method of an engineering structure system. The method considers the joint effect of various component probability dependencies and different performance limit states of the structure, and develops a method based on an explicit connected Bayesian network (ECBN). A new method for vulnerability analysis of structural systems. Background technique [0002] Structural vulnerability is defined as the conditional probability of a structure suffering a specific damage state under different levels of external action, which is a branch of structural reliability analysis. Vulnerability first originated in the early 1970s and was applied to the seismic probability risk analysis of nuclear power plants. The seismic vulnerability analysis of structures usually uses ground peak acceleration (PGA), spectral acceleration (SA) and other par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62G06Q10/06
CPCG06Q10/0635G06F18/29
Inventor 王其昂刘书奎东兆星
Owner 徐州大通建设集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products