METHODS AND SYSTEMS FOR QUANTITATIVE ASSESSMENT OF FLOOD RESILIENCY
20220364381 · 2022-11-17
Inventors
Cpc classification
G06Q10/06
PHYSICS
International classification
E04H9/14
FIXED CONSTRUCTIONS
E02B3/10
FIXED CONSTRUCTIONS
Abstract
Techniques for a pin-point assessment of resilience and resistance of structures against flooding are disclosed. The model is based on dimensionless analytical functions related to the variation of functionality during a period of interest, including the losses in the disaster and the recovery path. This evolution in time including recovery differentiates the resilience approach from the other approaches addressing the loss estimation and their momentary effects. The recovery process is considered to be dependent on societal preparedness, public policies and can take different forms, which is estimated using recovery functions. Based on the resilience, action plans are created to improve resiliency to disasters.
Claims
1. A non-transitory computer-readable medium storing instructions that, when executed by a processor, cause the processor to perform actions comprising: determine an area of interest; determine storm surge modeling data in the area of interest; determine flood modeling data in the area of interest; determine meteorological data in the area of interest; determine topology and structural characteristics of a building in the area of interest; generate, based upon the storm surge modeling data, the flood modeling data, the meteorological data, and the topology and structural characteristics, a computer simulation that approximates an expected structural damage of the building; generate a structural resiliency assessment for the building; and display the structural resiliency assessment for the building.
2. The non-transitory computer-readable medium of claim 1, wherein the instructions cause the processor to generate and display the structural resiliency assessment for a plurality of buildings within the area of interest.
3. A computer-implemented method, comprising: determine structural characteristics of one or more buildings in a region of interest; conduct stochastic spatial modeling of the one or more buildings in the region of interest; determine wind stochastic data in the region of interest; determine local flood modeling data in the region of interest; generate, based at least in part on the structural characteristics, the spatial modeling, the wind stochastic data, and the local flood modeling data, a structural resiliency assessment of the one or more buildings in the region of interest; and display the structural resiliency assessment of the one or more buildings in the region of interest on a display associated with a computer.
4. The computer implemented method of claim 3, wherein determine the structural characteristics comprises determining roof shapes and foundation types of the one or more buildings in the region of interest.
5. The computer-implemented method of claim 3, wherein determine wind stochastic data comprises collecting meteorological analysis data.
6. The computer-implemented method of claim 3, wherein determine local flood modeling data comprises determining flood riverine and coastal modeling data.
7. The computer-implemented method of claim 3, wherein determine local flood modeling data further comprises solving time dependent free surface circulation and transport problems in two and three dimensions.
8. The computer-implemented method of claim 7, wherein determine local flood modeling data further comprises gathering bathymetry, topography, tidal characteristics, nodal attributes, meteorological forcing input, boundary information, river inflow, and wave radiation stress forcing data.
9. The computer-implemented method of claim 3, wherein generate the structural resiliency assessment further comprises generating a two-dimensional hydrodynamic model.
10. The computer-implemented method of claim 9, further comprising generating the two-dimensional hydrodynamic model on individual buildings within the region of interest.
11. The computer-implemented method of claim 3, wherein generate the structural resiliency assessment is based at least in part on the local flood modeling data and spatial modeling data on individual buildings.
12. The computer-implemented method of claim 3, wherein generate the structural resiliency assessment comprises solving a recovery function of the form
f.sub.rec(t)=a(a exp[−b(t−t.sub.0E)]/T.sub.RE)+(1−a)(a/2){1+cos[πb(t−t.sub.0E)]/T.sub.RE}
13. The computer-implemented method of claim 3, further comprising generate a resiliency index for the region of interest.
14. The computer-implemented method of claim 13, wherein the resiliency index is generated according to the form
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0015] A better understanding of the features, advantages and principles of the present disclosure will be obtained by reference to the following detailed description that sets forth illustrative embodiments, and the accompanying drawings of which:
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
DETAILED DESCRIPTION
[0022] The following detailed description and provides a better understanding of the features and advantages of the inventions described in the present disclosure in accordance with the embodiments disclosed herein. Although the detailed description includes many specific embodiments, these are provided by way of example only and should not be construed as limiting the scope of the inventions disclosed herein.
[0023] With reference to
[0024] The storm surge model may further require information such as, but not limited to, bathymetry, topography, tidal characteristics, nodal attributes, meteorological forcing input, boundary information, river inflow, wave radiation stress forcing, among other relevant information.
[0025] A two-dimensional hydrodynamic model may be generated to simulate the dynamic effect of flooding on individual properties, such as residential and commercial properties.
[0026] Third, a structural damage assessment model may be generated by combining the flooding information with specific property information.
[0027] Defining recovery is difficult since the recovery process is (very) complex and has various associated dimensions. For instance, recovery of a poor neighborhood from a disaster is usually slower compared to that of a rich neighborhood, as expected. Currently, there is no suggested representation for recovery from hurricanes. Earthquake studies have been suggested and recovery functions related to earthquake recovery may be used for all damage states. However, if flood momentum is not too high, there may be only minor or moderate damage, and recovery can be very fast. If flood momentum is very high, there may be severe damage or destruction, and recovery can be relatively slow. Assignment of separate recovery functions to different communities (i.e. poor, fair, and good condition) may provide more accurate resiliency estimates. The recovery function is based on the response of the affected system/society and includes the following linear combination of exponential and trigonometric recovery functions shown in Equation 1 below.
f.sub.rec(t)=a(a exp[−b(t−t.sub.0E)]/T.sub.RE)+(1−a)(a/2){1+cos[πb(t−t.sub.0E)]/T.sub.RE} Equation 1
[0028] According to Equation 1, shown above, a and b are constant values that are calculated using curve fitting to the available data sources. Parameter a represents the level of society preparedness in face of hurricane. The value t.sub.0E is the instance of time when the extreme hurricane strikes and can be assigned to zero. T.sub.RE is the recovery time necessary to go back to pre-disaster condition evaluated starting from t.sub.0E. The exponential recovery part is found to be suitable when the initial response was fast because of the high level of resources and preparedness, and it slowed down later. The trigonometric recovery component is considered when the response is initially slow due to the lack of resources and preparedness, and it improved over time.
[0029]
[0030]
[0031] Actual recovery times may also be used for damage states. The actual recovery time can be less than, equal to, or greater than the expected recovery time for each damage state. Actual recovery times for minor damage, moderate damage, severe damage, and destruction can be calculated assuming it follows Rayleigh distribution with mean values of 5, 120, 360, and 720, respectively.
[0032] The quantification of resilience is strictly connected to the quantification of functionality (or quality or serviceability) of the system, in time. After the occurrence of an extreme event, that can be flooding in this case, the investigated structural system loses some of its functionality owing to occurrence of flood damages. Consequently, after receiving repair actions, the total functionality of the building can be restored at time T.sub.RE. Therefore, the area above the recovery curve in
[0033] Equation 2, shown above, is a measure of Resilience index and has the merit of combining all the dimensions, properties, and results of resilience in a single scalar metric defined over the interval [0,1].
[0034]
[0035]
[0036] Memory elements 620 include one or more physical memory devices such as, for example, a local memory and one or more storage devices. Local memory refers to random access memory (RAM) or other non-persistent memory device(s) generally used during actual execution of the program code. Storage device may be implemented as a hard disk drive (HDD), solid state drive (SSD), or other persistent data storage device. Computing system 600 may also include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the number of times program code must be retrieved from storage device during execution.
[0037] Stored in the memory 620 are both data and several components that are executable by the processor 610. In particular, stored in the memory 620 and executable by the processor 610 are code for modeling and simulating an expected structural damage of a building (640) and code for generating a structural resiliency assessment (650) for the building. Also stored in the memory 620 may be a data store 625 and other data. The data store 625 can include an electronic repository or database relevant to modeling and simulation results. In addition, an operating system may be stored in the memory 620 and executable by the processor 610. In an embodiment, model data are stored in the data store 625, such as model parameters.
[0038] For example, a computer data model of the present disclosure may refer to an electronic digitally stored set of executable instructions and data values, associated with one another, which are capable of receiving and responding to a programmatic or other digital call, invocation, or request for resolution based upon specified input values, to yield one or more stored output values that can serve as the basis of computer-implemented recommendations, output data displays, or machine control, among other things. Persons of skill in the field find it convenient to express models using mathematical equations, but that form of expression does not confine the models disclosed herein to abstract concepts; instead, each model herein has a practical application in a computer in the form of stored executable instructions and data that implement the model using the computer. The model may include a model of past events on the one or more fields, a model of the current status of the one or more fields, and/or a model of predicted events on the one or more fields. Model and field data may be stored in data structures in memory, rows in a database table, in flat files or spreadsheets, or other forms of stored digital data.
[0039] Input/output (I/O) devices 660 such as a keyboard, a display device, and a pointing device may optionally be coupled to computing system 600. The I/O devices may be coupled to computing system 600 either directly or through intervening I/O controllers. A network adapter may also be coupled to computing system to enable computing system to become coupled to other systems, computer systems, remote printers, and/or remote storage devices through intervening private or public networks. Modems, cable modems, Ethernet cards, and wireless transceivers are examples of different types of network adapter that may be used with computing system 600.
[0040] The described methods may be used as routines, or instructions, that cause a computer to perform various acts. Some of these acts include retrieving information necessary to perform a structural resiliency assessment. Referring back to
[0041] A person of ordinary skill in the art will recognize that any process or method disclosed herein can be modified in many ways. The process parameters and sequence of the steps described and/or illustrated herein are given by way of example only and can be varied as desired. For example, while the steps illustrated and/or described herein may be shown or discussed in a particular order, these steps do not necessarily need to be performed in the order illustrated or discussed.
[0042] The various exemplary methods described and/or illustrated herein may also omit one or more of the steps described or illustrated herein or comprise additional steps in addition to those disclosed. Further, a step of any method as disclosed herein can be combined with any one or more steps of any other method as disclosed herein.
[0043] Unless otherwise noted, the terms “connected to” and “coupled to” (and their derivatives), as used in the specification and claims, are to be construed as permitting both direct and indirect (i.e., via other elements or components) connection. In addition, the terms “a” or “an,” as used in the specification and claims, are to be construed as meaning “at least one of.” Finally, for ease of use, the terms “including” and “having” (and their derivatives), as used in the specification and claims, are interchangeable with and shall have the same meaning as the word “comprising.
[0044] The processor as disclosed herein can be configured with instructions to perform any one or more steps of any method as disclosed herein. The system and related methods may well be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types or equations for a useful, transformative, and physical purpose. The embodiments may be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
[0045] As used herein, the term “or” is used inclusively to refer items in the alternative and in combination.
[0046] Embodiments of the present disclosure have been shown and described as set forth herein and are provided by way of example only. One of ordinary skill in the art will recognize numerous adaptations, changes, variations, and substitutions without departing from the scope of the present disclosure. Several alternatives and combinations of the embodiments disclosed herein may be utilized without departing from the scope of the present disclosure and the inventions disclosed herein. Therefore, the scope of the presently disclosed inventions shall be defined solely by the scope of the appended claims and the equivalents thereof.
[0047] It should be emphasized that the above-described embodiments of the present disclosure are merely possible examples of implementations, merely set forth for a clear understanding of the principles of the disclosure. Many variations and modifications may be made to the above-described embodiment(s) without departing substantially from the principles of the disclosure. All such modifications and variations are intended to be included herein within the scope of this disclosure and protected by the following claims.