Seismic vulnerability assessment of urban buildings is among the most crucial procedures to post-disaster response and recovery of infrastructure systems.The present study proceeds to estimate the seismic vulnerabilit...Seismic vulnerability assessment of urban buildings is among the most crucial procedures to post-disaster response and recovery of infrastructure systems.The present study proceeds to estimate the seismic vulnerability of urban buildings and proposes a new framework training on the two objectives.First,a comprehensive interpretation of the effective parameters of this phenomenon including physical and human factors is done.Second,the Rough Set theory is used to reduce the integration uncertainties,as there are numerous quantitative and qualitative data.Both objectives were conducted on seven distinct earthquake scenarios with different intensities based on distance from the fault line and the epicenter.The proposed method was implemented by measuring seismic vulnerability for the seven specified seismic scenarios.The final results indicated that among the entire studied buildings,71.5%were highly vulnerable as concerning the highest earthquake scenario(intensity=7 MM and acceleration calculated based on the epicenter),while in the lowest earthquake scenario(intensity=5 MM),the percentage of vulnerable buildings decreased to approximately 57%.Also,the findings proved that the distance from the fault line rather than the earthquake center(epicenter)has a significant effect on the seismic vulnerability of urban buildings.The model was evaluated by comparing the results with the weighted linear combination(WLC)method.The accuracy of the proposed model was substantiated according to evaluation reports.Vulnerability assessment based on the distance from the epicenter and its comparison with the distance from the fault shows significant reliable results.展开更多
Software developers endeavor to build their products with the least number of bugs.Despite this,many vulnerabilities are detected in software that threatens its integrity.Various automated software i.e.,vulnerability ...Software developers endeavor to build their products with the least number of bugs.Despite this,many vulnerabilities are detected in software that threatens its integrity.Various automated software i.e.,vulnerability scanners,are available in the market which helps detect and manage vulnerabilities in a computer,application,or a network.Hence,the choice of an appropriate vulnerability scanner is crucial to ensure efficient vulnerability management.The current work serves a dual purpose,first,to identify the key factors which affect the vulnerability discovery process in a network.The second,is to rank the popular vulnerability scanners based on the identified attributes.This will aid the firm in determining the best scanner for them considering multiple aspects.The multi-criterion decision making based ranking approach has been discussed using the Intuitionistic Fuzzy set(IFS)and Technique for Order of Preference by Similarity to Ideal Solution(TOPSIS)to rank the various scanners.Using IFS TOPSIS,the opinion of a whole group could be simultaneously considered in the vulnerability scanner selection.In this study,five popular vulnerability scanners,namely,Nessus,Fsecure Radar,Greenbone,Qualys,and Nexpose have been considered.The inputs of industry specialists i.e.,people who deal in software security and vulnerability management process have been taken for the ranking process.Using the proposed methodology,a hierarchical classification of the various vulnerability scanners could be achieved.The clear enumeration of the steps allows for easy adaptability of the model to varied situations.This study will help product developers become aware of the needs of the market and design better scanners.And from the user’s point of view,it will help the system administrators in deciding which scanner to deploy depending on the company’s needs and preferences.The current work is the first to use a Multi Criterion Group Decision Making technique in vulnerability scanner selection.展开更多
Based on the widely used DRASTIC method, a fuzzy pattern recognition and optimization method was proposed and applied to the fissured-karstic aquifer of Zhangji area for assessing groundwater vulnerability to pollutio...Based on the widely used DRASTIC method, a fuzzy pattern recognition and optimization method was proposed and applied to the fissured-karstic aquifer of Zhangji area for assessing groundwater vulnerability to pollution. The result is compared with DRASTIC method. It is shown that by taking the fuzziness into consideration, the fuzzy pattern recognition and optimization method reflects more efficiently the fuzzy nature of the groundwater vulnerability to pollution and is more applicable in reality.展开更多
Two common problems for a typical Power distribution system are voltage collapse & instability. Challenge is to identify the vulnerable nodes and apply the effective corrective actions. This paper presents a proba...Two common problems for a typical Power distribution system are voltage collapse & instability. Challenge is to identify the vulnerable nodes and apply the effective corrective actions. This paper presents a probabilistic fuzzy approach to assess the node status and proposes feeder reconfiguration as a method to address the same. Feeder reconfiguration is altering the topological structures of distribution feeders by changing the open/closed states of the sectionalizing and ties switches. The solution is converge using a probabilistic fuzzy modeled solution, which defines the nodal vulnerability index (VI) as a function of node voltage and node voltage stability index and predicts nodes critical to voltage collapse. The information is further used to plan best combination of feeders from each loop in distribution system to be switched out such that the resulting configuration gives the optimal performance i.e. best voltage profile and minimal kW losses. The proposed method is tested on established radial distribution system and results are presented.展开更多
On the basis of dialectics basic laws and mathematical theorems of variable sets,this paper proposes a variable sets method for urban flood vulnerability assessment.In this method,the comprehensive relative membership...On the basis of dialectics basic laws and mathematical theorems of variable sets,this paper proposes a variable sets method for urban flood vulnerability assessment.In this method,the comprehensive relative membership degree of multi-indices is represented by an index relative difference degree,which follows the characteristics of dialectical philosophy and mathematics.According to the quality-quantity exchange theorem,the relative difference degree of two adjacent levels(h and h+1),whose index standard interval values cross the boundaries,equals 0 in the urban flood vulnerability assessment.On the basis of the opposite unity theorem,the sum of relative membership degrees should be equal to 1 when indices lie in the adjacent degrees h and h+1.The variable sets method is proved to be theoretically rigorous and computationally simple.This paper takes 29 cities of Hunan province as an example to assess the urban flood vulnerability,and then compares the results from this newly developed method with the assessment results obtained from the fuzzy comprehensive evaluation and fuzzy set pair analysis methods.展开更多
文摘Seismic vulnerability assessment of urban buildings is among the most crucial procedures to post-disaster response and recovery of infrastructure systems.The present study proceeds to estimate the seismic vulnerability of urban buildings and proposes a new framework training on the two objectives.First,a comprehensive interpretation of the effective parameters of this phenomenon including physical and human factors is done.Second,the Rough Set theory is used to reduce the integration uncertainties,as there are numerous quantitative and qualitative data.Both objectives were conducted on seven distinct earthquake scenarios with different intensities based on distance from the fault line and the epicenter.The proposed method was implemented by measuring seismic vulnerability for the seven specified seismic scenarios.The final results indicated that among the entire studied buildings,71.5%were highly vulnerable as concerning the highest earthquake scenario(intensity=7 MM and acceleration calculated based on the epicenter),while in the lowest earthquake scenario(intensity=5 MM),the percentage of vulnerable buildings decreased to approximately 57%.Also,the findings proved that the distance from the fault line rather than the earthquake center(epicenter)has a significant effect on the seismic vulnerability of urban buildings.The model was evaluated by comparing the results with the weighted linear combination(WLC)method.The accuracy of the proposed model was substantiated according to evaluation reports.Vulnerability assessment based on the distance from the epicenter and its comparison with the distance from the fault shows significant reliable results.
文摘Software developers endeavor to build their products with the least number of bugs.Despite this,many vulnerabilities are detected in software that threatens its integrity.Various automated software i.e.,vulnerability scanners,are available in the market which helps detect and manage vulnerabilities in a computer,application,or a network.Hence,the choice of an appropriate vulnerability scanner is crucial to ensure efficient vulnerability management.The current work serves a dual purpose,first,to identify the key factors which affect the vulnerability discovery process in a network.The second,is to rank the popular vulnerability scanners based on the identified attributes.This will aid the firm in determining the best scanner for them considering multiple aspects.The multi-criterion decision making based ranking approach has been discussed using the Intuitionistic Fuzzy set(IFS)and Technique for Order of Preference by Similarity to Ideal Solution(TOPSIS)to rank the various scanners.Using IFS TOPSIS,the opinion of a whole group could be simultaneously considered in the vulnerability scanner selection.In this study,five popular vulnerability scanners,namely,Nessus,Fsecure Radar,Greenbone,Qualys,and Nexpose have been considered.The inputs of industry specialists i.e.,people who deal in software security and vulnerability management process have been taken for the ranking process.Using the proposed methodology,a hierarchical classification of the various vulnerability scanners could be achieved.The clear enumeration of the steps allows for easy adaptability of the model to varied situations.This study will help product developers become aware of the needs of the market and design better scanners.And from the user’s point of view,it will help the system administrators in deciding which scanner to deploy depending on the company’s needs and preferences.The current work is the first to use a Multi Criterion Group Decision Making technique in vulnerability scanner selection.
基金Project (No. ICA4-CT-2001-10039) supported by Manporivers(Management policies for priority water pollutants and their effects onfoods and human health: general methodology and application toChinese river basins)
文摘Based on the widely used DRASTIC method, a fuzzy pattern recognition and optimization method was proposed and applied to the fissured-karstic aquifer of Zhangji area for assessing groundwater vulnerability to pollution. The result is compared with DRASTIC method. It is shown that by taking the fuzziness into consideration, the fuzzy pattern recognition and optimization method reflects more efficiently the fuzzy nature of the groundwater vulnerability to pollution and is more applicable in reality.
文摘Two common problems for a typical Power distribution system are voltage collapse & instability. Challenge is to identify the vulnerable nodes and apply the effective corrective actions. This paper presents a probabilistic fuzzy approach to assess the node status and proposes feeder reconfiguration as a method to address the same. Feeder reconfiguration is altering the topological structures of distribution feeders by changing the open/closed states of the sectionalizing and ties switches. The solution is converge using a probabilistic fuzzy modeled solution, which defines the nodal vulnerability index (VI) as a function of node voltage and node voltage stability index and predicts nodes critical to voltage collapse. The information is further used to plan best combination of feeders from each loop in distribution system to be switched out such that the resulting configuration gives the optimal performance i.e. best voltage profile and minimal kW losses. The proposed method is tested on established radial distribution system and results are presented.
基金supported by the National Natural Science Foundation of China(Grant Nos.51209032,51379027,51109025)Specialized Research Fund for the Doctoral Program of Higher Education(Grant No.20100041120004)the Fundamental Research Funds for the Central Universities(Grnat No.DUT13JS06)
文摘On the basis of dialectics basic laws and mathematical theorems of variable sets,this paper proposes a variable sets method for urban flood vulnerability assessment.In this method,the comprehensive relative membership degree of multi-indices is represented by an index relative difference degree,which follows the characteristics of dialectical philosophy and mathematics.According to the quality-quantity exchange theorem,the relative difference degree of two adjacent levels(h and h+1),whose index standard interval values cross the boundaries,equals 0 in the urban flood vulnerability assessment.On the basis of the opposite unity theorem,the sum of relative membership degrees should be equal to 1 when indices lie in the adjacent degrees h and h+1.The variable sets method is proved to be theoretically rigorous and computationally simple.This paper takes 29 cities of Hunan province as an example to assess the urban flood vulnerability,and then compares the results from this newly developed method with the assessment results obtained from the fuzzy comprehensive evaluation and fuzzy set pair analysis methods.