Resource Type

Journal Article 16

Year

2024 2

2022 1

2020 3

2017 3

2014 2

2013 1

2012 1

2011 2

2009 1

open ︾

Keywords

masonry buildings 2

seismic vulnerability assessment 2

vulnerability 2

Arctic Ocean 1

Artificial Neural Networks 1

Bayesian belief network 1

Building Code of Pakistan 1

Cascading failures 1

Climate change 1

Critical vulnerability 1

Deception attacks 1

Defenses 1

Industrial robots 1

Intergovernmental Panel on Climate Change 1

International negotiation 1

Intuitive building 1

Long-term goal 1

Multi-graph convolutional networks 1

Performance improvement 1

Power systems 1

open ︾

Search scope:

排序: Display mode:

Application of BCP-2007 and UBC-97 in seismic vulnerability assessment of gravity designed RC buildings

Muhammad Usman ALI, Shaukat Ali KHAN, Muhammad Yousaf ANWAR

Frontiers of Structural and Civil Engineering 2017, Volume 11, Issue 4,   Pages 396-405 doi: 10.1007/s11709-017-0436-4

Abstract: Recent earthquakes in Pakistan (Kashmir 2005, Balochistan 2008, and Balochistan 2013) revealed the vulnerabilityThis study investigates, through an analytical framework, the seismic vulnerability of these and otherDerived vulnerability curves show that the previous framework overestimated the damage and hence thevulnerability.Comparison of vulnerability parameters with previous studies show slight difference in performance of

Keywords: Building Code of Pakistan     earthquake engineering     seismic effects     vulnerability assessment of buildings     vulnerability framework    

Seismic vulnerability assessment of water supply network in Tianjin, China

Yanxi CHEN,Zhiguang NIU,Jiaqi BAI,Yufei WANG

Frontiers of Environmental Science & Engineering 2014, Volume 8, Issue 5,   Pages 767-775 doi: 10.1007/s11783-014-0632-6

Abstract: the most serious natural hazard to a WSN, and seismic risk assessment is essential to identify its vulnerabilityusing a WSN located in the airport area of Tianjin in northern China as a case study, a quantitative vulnerabilityHowever, to consider the vulnerability of the whole system, fuzzy cluster analysis was used to distinguishFinally, the vulnerability was quantified by these functions.In this study, a whole seismic vulnerability assessment method for a WSN was built, and these analyses

Keywords: water supply network     seismic vulnerability assessment     finite element     fuzzy mathematics    

Hazard and vulnerability evaluation of water distribution system in cases of contamination intrusion

Kunlun XIN, Tao TAO, Yong WANG, Suiqing LIU

Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 6,   Pages 839-848 doi: 10.1007/s11783-012-0409-8

Abstract: In this paper, it proposed an index system for hazard and vulnerability evaluations of water distributionUsing the method proposed herein, both the hazard index and vulnerability index were calculated for eachconcentration of contaminant and the total absorption are the most important factors in hazard and vulnerability

Keywords: water distribution network     hazard     vulnerability     contaminant accident    

The use of Artificial Neural Networks to estimate seismic damage and derive vulnerability functions for

Tiago Miguel FERREIRA, João ESTÊVÃO, Rui MAIO, Romeu VICENTE

Frontiers of Structural and Civil Engineering 2020, Volume 14, Issue 3,   Pages 609-622 doi: 10.1007/s11709-020-0623-6

Abstract: The analysis is carried out on the basis of a vulnerability index computed with a hybrid seismic vulnerabilitycomputer routine that uses the ANN as an approximation function is developed and applied to derive a new vulnerabilitydeveloped in this study allowed to obtain much better approximations than those achieved with the original vulnerabilitySimilarly, the proposed vulnerability curve expression was found to provide a more accurate damage prediction

Keywords: Artificial Neural Networks     seismic vulnerability     masonry buildings     damage estimation     vulnerability curves    

Variability and vulnerability of carbon pools in Southern Ocean and western Arctic Ocean and their exploratory

Chen Liqi

Strategic Study of CAE 2009, Volume 11, Issue 10,   Pages 79-85

Abstract: Vulnerability of the both carbon pools was appreciated for their roles in world oceanic carbon cycle.

Keywords: carbon cycle     variability and vulnerability     Southern Ocean     Arctic Ocean     exploring engineering technology    

Assessment of robustness of structures: Current state of research

Colin BRETT, Yong LU

Frontiers of Structural and Civil Engineering 2013, Volume 7, Issue 4,   Pages 356-368 doi: 10.1007/s11709-013-0220-z

Abstract: Some associated concepts, such as redundancy and vulnerability, will be discussed and interpreted in

Keywords: structural robustness     abnormal exposure     vulnerability     collapse     consequence    

A step forward towards a comprehensive framework for assessing liquefaction land damage vulnerability

Mahmood AHMAD, Xiao-Wei TANG, Jiang-Nan QIU, Feezan AHMAD, Wen-Jing GU

Frontiers of Structural and Civil Engineering 2020, Volume 14, Issue 6,   Pages 1476-1491 doi: 10.1007/s11709-020-0670-z

Abstract: earthquakes has highlighted the need to develop a model that better interprets the liquefaction land damage vulnerabilitymodel has a better performance and provides a substitutive novel LLDV framework for characterizing the vulnerability

Keywords: Bayesian belief network     liquefaction-induced damage potential     cone penetration test     soil liquefaction     structural learning and domain knowledge    

Interpreting the vulnerability of power systems in cascading failures using multi-graph convolutional Research Article

Supaporn LONAPALAWONG, Changsheng CHEN, Can WANG, Wei CHEN

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 12,   Pages 1848-1861 doi: 10.1631/FITEE.2200035

Abstract: Analyzing the of in is generally regarded as a challenging problem. Although existing studies can extract some critical rules, they fail to capture the complex subtleties under different operational conditions. In recent years, several deep learning methods have been applied to address this issue. However, most of the existing deep learning methods consider only the grid topology of a power system in terms of topological connections, but do not encompass a power system's spatial information such as the electrical distance to increase the accuracy in the process of graph convolution. In this paper, we construct a novel power- that uses power system topology and spatial information to optimize the edge weight assignment of the line graph. Then we propose a multi-graph convolutional network (MGCN) based on a graph classification task, which preserves a power system's spatial correlations and captures the relationships among physical components. Our model can better handle the problem with that have parallel lines, where our method can maintain desirable accuracy in modeling systems with these extra topology features. To increase the interpretability of the model, we present the MGCN using layer-wise relevance propagation and quantify the contributing factors of model classification.

Keywords: Power systems     Vulnerability     Cascading failures     Multi-graph convolutional networks     Weighted line graph    

Simplified seismic scenario analysis of existing masonry buildings accounting for local site effects

Frontiers of Structural and Civil Engineering 2024, Volume 18, Issue 2,   Pages 309-318 doi: 10.1007/s11709-024-0982-5

Abstract: This study discusses the effects of local sites and hazard amplification on the seismic vulnerabilitydifferent moment magnitudes, and source-to-site distances to obtain more accurate results for the seismic vulnerabilitydifferent scenarios with/without site effects were compared and illustrated in maps to discuss changes in vulnerabilityevaluation procedure by including geo-hazard-based assessment, the importance of site effects on the vulnerabilityframework integrating field data and local site effects is believed to advance the current applications for vulnerability

Keywords: masonry buildings     seismic vulnerability assessment     cultural heritage     local site effect    

Liquefaction assessment using microtremor measurement, conventional method and artificial neural network (Case study: Babol, Iran)

Sadegh REZAEI,Asskar Janalizadeh CHOOBBASTI

Frontiers of Structural and Civil Engineering 2014, Volume 8, Issue 3,   Pages 292-307 doi: 10.1007/s11709-014-0256-8

Abstract: By using the fundamental frequency and amplification factor, the value of vulnerability index ( ) was

Keywords: liquefaction     microtremor     vulnerability index     artificial neural networks (ANN)     microzonation    

Seismic fragility assessment of revised MRT buildings considering typical construction changes

Rakesh DUMARU, Hugo RODRIGUES, Humberto VARUM

Frontiers of Structural and Civil Engineering 2020, Volume 14, Issue 1,   Pages 241-266 doi: 10.1007/s11709-019-0560-4

Abstract: The present study investigates the vulnerability assessment of the prototype revised Mandatory Rule ofThe vulnerability was also reduced through infill walls, where the probability of exceeding partial-collapse

Keywords: mid-rise buildings     revised NBC 205: 2012     masonry infill walls     configurations of infill walls     vulnerability    

CORMAND2: A Deception Attack Against Industrial Robots Article

Hongyi Pu,Liang He,Peng Cheng,Jiming Chen,Youxian Sun

Engineering 2024, Volume 32, Issue 1,   Pages 186-201 doi: 10.1016/j.eng.2023.01.013

Abstract:

Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks, particularly with the dawn of the Industrial Internet-of-Things (IIoT). To gain a comprehensive understanding of these cyber risks, vulnerabilities of industrial robots were analyzed empirically, using more than three million communication packets collected with testbeds of two ABB IRB120 robots and five other robots from various Original Equipment Manufacturers (OEMs). This analysis, guided by the confidentiality–integrity–availability (CIA) triad, uncovers robot vulnerabilities in three dimensions: confidentiality, integrity, and availability. These vulnerabilities were used to design Covering Robot Manipulation via Data Deception (CORMAND2), an automated cyber–physical attack against industrial robots. CORMAND2 manipulates robot operation while deceiving the Supervisory Control and Data Acquisition (SCADA) system that the robot is operating normally by modifying the robot’s movement data and data deception. CORMAND2 and its capability of degrading the manufacturing was validated experimentally using the aforementioned seven robots from six different OEMs. CORMAND2 unveils the limitations of existing anomaly detection systems, more specifically the assumption of the authenticity of SCADA-received movement data, to which we propose mitigations for.

Keywords: Industrial robots     Vulnerability analysis     Deception attacks     Defenses    

SHM-based F-AHP bridge rating system with application to Tsing Ma Bridge

Qi LI, You-lin XU, Yue ZHENG, An-xin GUO, Kai-yuen WONG, Yong XIA

Frontiers of Structural and Civil Engineering 2011, Volume 5, Issue 4,   Pages 465-478 doi: 10.1007/s11709-011-0135-5

Abstract: The criticality and vulnerability analyses are performed largely based on the field measurement dataThe procedures for determining relative weighs and fuzzy synthetic ratings for both criticality and vulnerability

Keywords: health monitoring (SHM)     bridge rating method     fuzzy based analytic hierarchy approach     criticality and vulnerability    

Efficient vulnerability detection based on an optimized rule-checking static analysis technique Article

Deng CHEN,Yan-duo ZHANG,Wei WEI,Shi-xun WANG,Ru-bing HUANG,Xiao-lin LI,Bin-bin QU,Sheng JIANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3,   Pages 332-345 doi: 10.1631/FITEE.1500379

Abstract: Our technique improves the performance of static analysis tools by filtering vulnerability rules in terms

Keywords: Rule-based static analysis     Software quality     Software validation     Performance improvement    

Coal seam roof and floor hydrogeology conditions evaluation of Pingshuo No.1 mine and measures of preventing water bursting

Zhang Zhongwen,Wu Qiang,Fu Enjun,Fan Zhenli

Strategic Study of CAE 2011, Volume 13, Issue 11,   Pages 94-101

Abstract: mining and geology conditions, and evaluates the roof hydrogeology conditions and floor water bursting vulnerability

Keywords: three maps method     vulnerability index method     water hazards of coal mine     prevented measures of water    

Title Author Date Type Operation

Application of BCP-2007 and UBC-97 in seismic vulnerability assessment of gravity designed RC buildings

Muhammad Usman ALI, Shaukat Ali KHAN, Muhammad Yousaf ANWAR

Journal Article

Seismic vulnerability assessment of water supply network in Tianjin, China

Yanxi CHEN,Zhiguang NIU,Jiaqi BAI,Yufei WANG

Journal Article

Hazard and vulnerability evaluation of water distribution system in cases of contamination intrusion

Kunlun XIN, Tao TAO, Yong WANG, Suiqing LIU

Journal Article

The use of Artificial Neural Networks to estimate seismic damage and derive vulnerability functions for

Tiago Miguel FERREIRA, João ESTÊVÃO, Rui MAIO, Romeu VICENTE

Journal Article

Variability and vulnerability of carbon pools in Southern Ocean and western Arctic Ocean and their exploratory

Chen Liqi

Journal Article

Assessment of robustness of structures: Current state of research

Colin BRETT, Yong LU

Journal Article

A step forward towards a comprehensive framework for assessing liquefaction land damage vulnerability

Mahmood AHMAD, Xiao-Wei TANG, Jiang-Nan QIU, Feezan AHMAD, Wen-Jing GU

Journal Article

Interpreting the vulnerability of power systems in cascading failures using multi-graph convolutional

Supaporn LONAPALAWONG, Changsheng CHEN, Can WANG, Wei CHEN

Journal Article

Simplified seismic scenario analysis of existing masonry buildings accounting for local site effects

Journal Article

Liquefaction assessment using microtremor measurement, conventional method and artificial neural network (Case study: Babol, Iran)

Sadegh REZAEI,Asskar Janalizadeh CHOOBBASTI

Journal Article

Seismic fragility assessment of revised MRT buildings considering typical construction changes

Rakesh DUMARU, Hugo RODRIGUES, Humberto VARUM

Journal Article

CORMAND2: A Deception Attack Against Industrial Robots

Hongyi Pu,Liang He,Peng Cheng,Jiming Chen,Youxian Sun

Journal Article

SHM-based F-AHP bridge rating system with application to Tsing Ma Bridge

Qi LI, You-lin XU, Yue ZHENG, An-xin GUO, Kai-yuen WONG, Yong XIA

Journal Article

Efficient vulnerability detection based on an optimized rule-checking static analysis technique

Deng CHEN,Yan-duo ZHANG,Wei WEI,Shi-xun WANG,Ru-bing HUANG,Xiao-lin LI,Bin-bin QU,Sheng JIANG

Journal Article

Coal seam roof and floor hydrogeology conditions evaluation of Pingshuo No.1 mine and measures of preventing water bursting

Zhang Zhongwen,Wu Qiang,Fu Enjun,Fan Zhenli

Journal Article