2014
DOI: 10.1111/mice.12105
|View full text |Cite
|
Sign up to set email alerts
|

Simulation‐Based Seismic Risk Assessment of Gas Distribution Networks

Abstract: The basic function of a gas distribution sys- tem, essentially composed of buried pipelines, reduc- tion stations, and demand nodes, is to deliver gas from sources to end users. The objective of the article is to discuss the evaluation of seismic risk of gas networks in compliance with the performance-based earthquake en- gineering framework adapted to spatially distributed sys- tems. In particular, three issues are addressed: (1) spatial seismic hazard characterization in terms of ground shak- ing and permane… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
41
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 66 publications
(41 citation statements)
references
References 41 publications
(57 reference statements)
0
41
0
Order By: Relevance
“…In the literature, scholars have studied CIS vulnerability under different types of disruptive events, including (1) random failures, which are modeled by randomly selecting a certain fraction of system components to make them fail (Motter and Lai, ; Crucitti et al., ; Albert et al., ; Yazdani and Jeffrey, ; Dobson et al., ; Ouyang and Dueñas‐Osorio, ; Carreras et al., ; Dobson et al., ; Ren and Dobson, ; Ouyang et al., ; Newman, ; Hong et al., ); (2) natural hazards, whose scenarios are simulated by hazard generation models (FEMA, ) and their impacts on system components are described by fragility curves (Dueñas‐Osorio et al., ; Adachi and Ellingwood, ; Esposito et al., ; Franchin and Cavalieri, ; Cavallaro et al., ; FEMA, ; Ouyang and Dueñas‐Osorio, ); (3) malicious attacks, which are simulated by removing important components (Hines et al., ; Holmgren, ; Rosas‐Casals et al., ; Holme et al., ; Bompard et al., ; Mishkovski et al., ; Zio et al., ; Alderson et al., ; Ouyang et al., ; Wang et al., ; Afshari Rad and Kakhki, ; Hasani and Khosrojerdi, ; Newell, ; Bogloee et al. ); and (4) some combinations of the above events (Levitin and Hausken, ; Levitin, ; Miller‐Hooks et al., ).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the literature, scholars have studied CIS vulnerability under different types of disruptive events, including (1) random failures, which are modeled by randomly selecting a certain fraction of system components to make them fail (Motter and Lai, ; Crucitti et al., ; Albert et al., ; Yazdani and Jeffrey, ; Dobson et al., ; Ouyang and Dueñas‐Osorio, ; Carreras et al., ; Dobson et al., ; Ren and Dobson, ; Ouyang et al., ; Newman, ; Hong et al., ); (2) natural hazards, whose scenarios are simulated by hazard generation models (FEMA, ) and their impacts on system components are described by fragility curves (Dueñas‐Osorio et al., ; Adachi and Ellingwood, ; Esposito et al., ; Franchin and Cavalieri, ; Cavallaro et al., ; FEMA, ; Ouyang and Dueñas‐Osorio, ); (3) malicious attacks, which are simulated by removing important components (Hines et al., ; Holmgren, ; Rosas‐Casals et al., ; Holme et al., ; Bompard et al., ; Mishkovski et al., ; Zio et al., ; Alderson et al., ; Ouyang et al., ; Wang et al., ; Afshari Rad and Kakhki, ; Hasani and Khosrojerdi, ; Newell, ; Bogloee et al. ); and (4) some combinations of the above events (Levitin and Hausken, ; Levitin, ; Miller‐Hooks et al., ).…”
Section: Introductionmentioning
confidence: 99%
“…In the literature, scholars have studied CIS vulnerability under different types of disruptive events, including (1) random failures, which are modeled by randomly selecting a certain fraction of system components to make them fail (Motter and Lai, 2002;Crucitti et al, 2004;Albert et al, 2004;Yazdani and Jeffrey, 2011;Dobson et al, 2007;Carreras et al, 2004;Dobson et al, 2004;Ren and Dobson, 2008;Newman, 2003;Hong et al, 2017); (2) natural hazards, whose scenarios are simulated by hazard generation models (FEMA, 2015) and their impacts on system components are described by fragility curves (Dueñas-Osorio et al, 2007;Adachi and Ellingwood, 2008;Esposito et al, 2015;Franchin and Cavalieri, 2015;Cavallaro et al, 2014;FEMA, 2015;Ouyang and Dueñas-Osorio, 2014);…”
Section: Introductionmentioning
confidence: 99%
“…Systemic disaster risk evaluation of CISs has attracted continuous attention in the scientific literature in recent decades (e.g. Adachi & Ellingwood, 2008;Cavalieri, Franchin, Buritica Cortes, & Tesfamariam, 2014;Dueñas-Osorio & Rojo, 2011;Esposito et al, 2014;Jayaram & Baker, 2010;Mieler, Stojadinovic, Budnitz, Comerio, & Mahin, 2015;Pitilakis, Alexoudi, Argyroudis, Monge, & Martin, 2006;Reed, Powell, & Westerman, 2010;Song, Der Kiureghian, & Sackman, 2007;Wang, Au, & Fu, 2010).…”
Section: Introductionmentioning
confidence: 99%
“…The downside to this is that our reliance on these systems is now so great that their disruption can lead to disproportionate consequences for the communities that rely on them (Bocchini et al, 2014;Cavalieri et al, 2014;Cavallaro et al, 2014;Duenas-Osorio and Rojo, 2011;Faturechi and Miller-Hooks, 2014;Wilkinson et al, 2013;Wilkinson et al, 2012a). Although it is well recognized that resilient networks are crucial to communities, the features of a resilient network are only partially understood (Argyroudis et al, 2015;Buldyrev et al, 2010;Esposito et al, 2015;Franchin and Cavalieri, 2015;Fu et al, 2014a;O'Rourke et al, 2005).…”
Section: Introductionmentioning
confidence: 99%