SlideShare a Scribd company logo
Seismic Performance
    Assessment of
Interdependent Lifeline
    Utility Systems


   Hüseyin Can Ünen
   Istanbul Technical University, Turkey
Born in 1982, Ankara, Turkey.




B.Sc.: Civil Engineering, Middle East Technical
University, Ankara (2004).
M.Sc.: Satellite Communications and Remote
Sensing, Istanbul Technical University (2006).
Currently a Ph.D. Student in Geomatics Engineering,
Istanbul Technical University.
Study topics: Surveying, Geographic Information
Systems, Disaster Management.
Why Lifeline Networks?
Electric power, potable water,
communication, transportation, natural
gas, waste water, etc.
Vital to the health, safety, and social
activities of the community. Also vital to
the functioning of an urban industrialized
society.
Serviceability of power, water and
communication systems are essential for
survival and also for response and
recovery efforts following a disaster.
INTERDEPENDENCY

Interdependency: A bidirectional relationship between
two infrastructures through which the state of each
infrastructure influences or is correlated to the state of the
other.

or

The connections among agents in different infrastructures
in a general system of systems.
INTERDEPENDENCY
Aim: To achieve more accurate and reliable
 seismic performance assessment of lifeline
 utility networks.




      Water network         Power network
Interdependent Network Analysis (INA) Model

                                 Topological Model                              Structural Model
                                                      INVENTORY


                                                                HAZARD                         FRAGILITY
                                       SYSTEM
                                     CONNECTIVITY
                                                                                STRUCTURAL
                                                                                  DAMAGE
   Monte Carlo Simulations (n)




                                       COMPONENT
                                         FAILURE


                                     RE-STRUCTURING
                                       OF NETWORK


                                      PERFORMANCE      Connectivity Loss
                                       ASSESSMENT
                                                       Service Flow Reduction
Determination of Structural Damage

Estimation of damage levels to the structures are made by
implementing fragility functions, which give the probability
that a limit state is exceeded, or by damage functions giving
the amount of expected damage, given an input level of
shaking.
Structural Damage Analysis
 Damage levels to the structures are estimated by using
 given level of ground shaking and

   Fragility functions: the probability that a limit state is exceeded,
     OR
   Damage functions: the amount of expected damage

 Results:                                  Hazard
                                          Definition
                                                       Inventory
                                                       Selection
                                                                    Fragility
                                                                    Models
   Damage state probability
   Expected damage
                                                               Damage Analysis
   Repair rate
   Break rate
   Leak rate                                                  Structural Damage
Topologically modeled networks are
                                             built of links (pipelines, power lines)
Water network facilities   Water pipelines
                                             and nodes (network facilities).


                                             Modeling can be done if the
                                             connectivity and flow patterns of the
                                             system are known.


                                             System performances are assessed
                                             by applying connectivity and flow
                                             algorithms.



                 Water network
System Performance Measures
 CONNECTIVITY LOSS

   Quantifies the decrease in the number of generation
   facilities with connecting paths to the distribution facilities.
   Calculation of the parameter relies on the topological
   structure of the network and the existence of paths
   connecting supply and demand elements.
System Performance Measures
 SERVICE FLOW REDUCTION

   Quantifies the amount of flow that does not meet the
   distribution vertex demands.
   Adresses the impact on the end users.
   Demands and capacities must also be known in addition to
   the network topology.
Interdependent Network Analysis (INA) Model

                                 Topological Model                              Structural Model
                                                      INVENTORY


                                                                HAZARD                         FRAGILITY
                                       SYSTEM
                                     CONNECTIVITY
                                                                                STRUCTURAL
                                                                                  DAMAGE
   Monte Carlo Simulations (n)




                                       COMPONENT
                                         FAILURE


                                     RE-STRUCTURING
                                       OF NETWORK


                                      PERFORMANCE      Connectivity Loss
                                       ASSESSMENT
                                                       Service Flow Reduction
System Outcomes
 When the expected damage to pipelines,
 facilities, and buildings known, they can be
 used for:

   Improving resiliency of the networks.

   Developing retrofit strategies.

  Estimating the repair cost and workmanship
  needed.
THANK YOU

More Related Content

Similar to Unen Lifelines @ ISCRAM 2009 Summerschool

A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
IRJET Journal
 
01255490crosstalk noise
01255490crosstalk noise01255490crosstalk noise
01255490crosstalk noisesandeep patil
 
B210917
B210917B210917
B210917irjes
 
PPT (1).pptx
PPT (1).pptxPPT (1).pptx
PPT (1).pptx
HarindranathSivankut
 
IEEE ICC 2012 - Dependability Assessment of Virtualized Networks
 IEEE ICC 2012 - Dependability Assessment of Virtualized Networks IEEE ICC 2012 - Dependability Assessment of Virtualized Networks
IEEE ICC 2012 - Dependability Assessment of Virtualized NetworksStenio Fernandes
 
Anuj 21PCE039.pptx
Anuj 21PCE039.pptxAnuj 21PCE039.pptx
Anuj 21PCE039.pptx
RahulKumar964014
 
Addressing the Challenge of Wafer Map Classification in Semiconductor Manufac...
Addressing the Challenge of Wafer Map Classification in Semiconductor Manufac...Addressing the Challenge of Wafer Map Classification in Semiconductor Manufac...
Addressing the Challenge of Wafer Map Classification in Semiconductor Manufac...
yieldWerx Semiconductor
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Modeling the Complexity of Critical Infrastructures
Modeling the Complexity of Critical InfrastructuresModeling the Complexity of Critical Infrastructures
Modeling the Complexity of Critical Infrastructures
Community Protection Forum
 
Wireless chemical sensor network
Wireless chemical sensor networkWireless chemical sensor network
Wireless chemical sensor networkmarjan09
 
IRJET- A Literature Study on Fault Recognition in Different System
IRJET- A Literature Study on Fault Recognition in Different SystemIRJET- A Literature Study on Fault Recognition in Different System
IRJET- A Literature Study on Fault Recognition in Different System
IRJET Journal
 
Architecture for reliable service discovery
Architecture for reliable service discoveryArchitecture for reliable service discovery
Architecture for reliable service discoveryambitlick
 
CTA 2013 Robustezza Strutturale e Resilienza di Sistemi Strutturali e Infrast...
CTA 2013 Robustezza Strutturale e Resilienza di Sistemi Strutturali e Infrast...CTA 2013 Robustezza Strutturale e Resilienza di Sistemi Strutturali e Infrast...
CTA 2013 Robustezza Strutturale e Resilienza di Sistemi Strutturali e Infrast...Franco Bontempi
 
Friedenthal.sandford
Friedenthal.sandfordFriedenthal.sandford
Friedenthal.sandfordNASAPMC
 
Impact of design complexity on software quality - A systematic review
Impact of design complexity on software quality - A systematic reviewImpact of design complexity on software quality - A systematic review
Impact of design complexity on software quality - A systematic review
Anh Nguyen Duc
 
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
IJECEIAES
 
Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention Network
Shamika Ganesan
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
IEEEBEBTECHSTUDENTSPROJECTS
 

Similar to Unen Lifelines @ ISCRAM 2009 Summerschool (20)

A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...
 
01255490crosstalk noise
01255490crosstalk noise01255490crosstalk noise
01255490crosstalk noise
 
B210917
B210917B210917
B210917
 
PPT (1).pptx
PPT (1).pptxPPT (1).pptx
PPT (1).pptx
 
IEEE ICC 2012 - Dependability Assessment of Virtualized Networks
 IEEE ICC 2012 - Dependability Assessment of Virtualized Networks IEEE ICC 2012 - Dependability Assessment of Virtualized Networks
IEEE ICC 2012 - Dependability Assessment of Virtualized Networks
 
ppt-HUNGARY
ppt-HUNGARYppt-HUNGARY
ppt-HUNGARY
 
Anuj 21PCE039.pptx
Anuj 21PCE039.pptxAnuj 21PCE039.pptx
Anuj 21PCE039.pptx
 
Addressing the Challenge of Wafer Map Classification in Semiconductor Manufac...
Addressing the Challenge of Wafer Map Classification in Semiconductor Manufac...Addressing the Challenge of Wafer Map Classification in Semiconductor Manufac...
Addressing the Challenge of Wafer Map Classification in Semiconductor Manufac...
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Modeling the Complexity of Critical Infrastructures
Modeling the Complexity of Critical InfrastructuresModeling the Complexity of Critical Infrastructures
Modeling the Complexity of Critical Infrastructures
 
Wireless chemical sensor network
Wireless chemical sensor networkWireless chemical sensor network
Wireless chemical sensor network
 
IRJET- A Literature Study on Fault Recognition in Different System
IRJET- A Literature Study on Fault Recognition in Different SystemIRJET- A Literature Study on Fault Recognition in Different System
IRJET- A Literature Study on Fault Recognition in Different System
 
Architecture for reliable service discovery
Architecture for reliable service discoveryArchitecture for reliable service discovery
Architecture for reliable service discovery
 
CTA 2013 Robustezza Strutturale e Resilienza di Sistemi Strutturali e Infrast...
CTA 2013 Robustezza Strutturale e Resilienza di Sistemi Strutturali e Infrast...CTA 2013 Robustezza Strutturale e Resilienza di Sistemi Strutturali e Infrast...
CTA 2013 Robustezza Strutturale e Resilienza di Sistemi Strutturali e Infrast...
 
NETCOM ESTA
NETCOM ESTANETCOM ESTA
NETCOM ESTA
 
Friedenthal.sandford
Friedenthal.sandfordFriedenthal.sandford
Friedenthal.sandford
 
Impact of design complexity on software quality - A systematic review
Impact of design complexity on software quality - A systematic reviewImpact of design complexity on software quality - A systematic review
Impact of design complexity on software quality - A systematic review
 
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
 
Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention Network
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
2014 IEEE JAVA NETWORK SECURITY PROJECT Integrated security analysis on casca...
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

Unen Lifelines @ ISCRAM 2009 Summerschool

  • 1. Seismic Performance Assessment of Interdependent Lifeline Utility Systems Hüseyin Can Ünen Istanbul Technical University, Turkey
  • 2. Born in 1982, Ankara, Turkey. B.Sc.: Civil Engineering, Middle East Technical University, Ankara (2004). M.Sc.: Satellite Communications and Remote Sensing, Istanbul Technical University (2006). Currently a Ph.D. Student in Geomatics Engineering, Istanbul Technical University. Study topics: Surveying, Geographic Information Systems, Disaster Management.
  • 3. Why Lifeline Networks? Electric power, potable water, communication, transportation, natural gas, waste water, etc. Vital to the health, safety, and social activities of the community. Also vital to the functioning of an urban industrialized society. Serviceability of power, water and communication systems are essential for survival and also for response and recovery efforts following a disaster.
  • 4. INTERDEPENDENCY Interdependency: A bidirectional relationship between two infrastructures through which the state of each infrastructure influences or is correlated to the state of the other. or The connections among agents in different infrastructures in a general system of systems.
  • 6. Aim: To achieve more accurate and reliable seismic performance assessment of lifeline utility networks. Water network Power network
  • 7. Interdependent Network Analysis (INA) Model Topological Model Structural Model INVENTORY HAZARD FRAGILITY SYSTEM CONNECTIVITY STRUCTURAL DAMAGE Monte Carlo Simulations (n) COMPONENT FAILURE RE-STRUCTURING OF NETWORK PERFORMANCE Connectivity Loss ASSESSMENT Service Flow Reduction
  • 8. Determination of Structural Damage Estimation of damage levels to the structures are made by implementing fragility functions, which give the probability that a limit state is exceeded, or by damage functions giving the amount of expected damage, given an input level of shaking.
  • 9. Structural Damage Analysis Damage levels to the structures are estimated by using given level of ground shaking and Fragility functions: the probability that a limit state is exceeded, OR Damage functions: the amount of expected damage Results: Hazard Definition Inventory Selection Fragility Models Damage state probability Expected damage Damage Analysis Repair rate Break rate Leak rate Structural Damage
  • 10. Topologically modeled networks are built of links (pipelines, power lines) Water network facilities Water pipelines and nodes (network facilities). Modeling can be done if the connectivity and flow patterns of the system are known. System performances are assessed by applying connectivity and flow algorithms. Water network
  • 11. System Performance Measures CONNECTIVITY LOSS Quantifies the decrease in the number of generation facilities with connecting paths to the distribution facilities. Calculation of the parameter relies on the topological structure of the network and the existence of paths connecting supply and demand elements.
  • 12. System Performance Measures SERVICE FLOW REDUCTION Quantifies the amount of flow that does not meet the distribution vertex demands. Adresses the impact on the end users. Demands and capacities must also be known in addition to the network topology.
  • 13. Interdependent Network Analysis (INA) Model Topological Model Structural Model INVENTORY HAZARD FRAGILITY SYSTEM CONNECTIVITY STRUCTURAL DAMAGE Monte Carlo Simulations (n) COMPONENT FAILURE RE-STRUCTURING OF NETWORK PERFORMANCE Connectivity Loss ASSESSMENT Service Flow Reduction
  • 14. System Outcomes When the expected damage to pipelines, facilities, and buildings known, they can be used for: Improving resiliency of the networks. Developing retrofit strategies. Estimating the repair cost and workmanship needed.