Professional Documents
Culture Documents
9.1 INTRODUCTION
9.1.1 overvIeW
This chapter defined hazards (or threats) in a very broad sense, that is, they can degrade perfor-
mance of a single infrastructure asset or community (network) of infrastructure assets. However,
one of the common attributes of those hazards and the resulting performance or response of the
assets to them is that both the hazards as well as the performances change with time. Thus, a
single snapshot reaction by the stakeholders (whether this reaction is an assessment, acceptance,
treatment, or some combination of the same) might be necessary, but definitely not sufficient. The
infrastructure stakeholders have to react dynamically, as needed, in response to hazards. In order
to facilitate such dynamism, a system of monitoring may be implemented. This chapter addresses
some of the MH attributes of single assets and networks of assets both from a snapshot and time
marching viewpoints.
If we consider some of the recent considerations of MH monitoring (MHM), we start by noting
that several potential hazards, which might be related to earthmoving and/or surface mining, can
be monitored via image-based technologies. Specifically, construction operations associated with
earthmoving and surface mining activities are generally associated with higher risk evidenced by the
U.S. Mine Safety and Health Administration (MSHA) reports. According to MSHA (2009), more
than 30% of the total fatalities in coal and metal/nonmetal mining from 2004 to 2008 were caused
by heavy machinery. Manual inspections and internal controls, such as checklists, are predomi-
nantly used for minimizing risk. These procedures are not only expensive and time-consuming, but
success of these procedures depends on competency of the personnel deployed (Ahmad and Gibb
2004). With recent advances, spatial-based technologies have been gaining attention to reduce these
risk factors. Hence, Chi and Caldas (2012) investigated the use of an automated, image-based safety
assessment method for earthmoving and surface mining activities. Based on a literature review, they
focused on three risk factors associated with operator errors: excessive operation speeds, danger-
ous access to the unsafe areas, and close proximity between objects such as heavy machinery and
workers. Then they identified best practices and spatial data needs for safety assessment in relation
to these risk factors to investigate image-based data collection devices and algorithms for spatial
safety assessment. The analyzed algorithms were designed to systematically collect and interpret
safety-related data. Based on a case study, they conclude that the applied safety rules enabled auto-
mated violation detection.
Another monitoring activity that involves several hazards can be found in the wastewater infra-
structure community. Sewer or wastewater pipes are a significant portion of wastewater systems
forming the pathway between points of wastewater generation and treatment plants or outfalls.
More than 1 million miles of these pipes are supposed to exist in the United States and require
considerable resources to maintain them in operating condition. Given constrained resources, pri-
oritization is required and risk-based methodologies are gaining attention.
Salman and Salem (2012) note that even though identifying probability of failure for sewer pipes
through deterioration models has attracted the attention of several researchers, determining the con-
sequences of failure and incorporating this information to prioritize sewers has not been fully exam-
ined. Hence, authors attempted to generate a risk assessment tool to prioritize sewer pipes considering
401
402 Multihazard Considerations in Civil Infrastructure
consequences-of-failure values using a weighted scoring system. Authors used the data sets from the
Metropolitan Sewer District of Greater Cincinnati that serves approximately 230,000 residential and
commercial users by managing a sewer network that has an approximate total length of 3,000 miles.
Each pipe was evaluated with respect to a set of factors and a weighted sum of the performance of
the pipe was calculated. ArcGIS software was used to obtain the required information for each fac-
tor and to geographically represent the consequence of failure values for the overall sewer network.
Thus, one limitation of the proposed methodology is availability of high-quality data sets that can be
imported into a GIS software package. Three different risk assessment prioritization methods were
used: multiplication of probability and consequences of failure, risk matrices, and fuzzy inference
systems. They report that the use of fuzzy inference systems resulted in a more flexible method to
combine probability and consequences of failure, as it allowed modeling of the fuzziness around
boundary values for different levels of probability. One interesting aspect identified by the authors is
the lack of data sets to include other utility lines such as water pipes, power lines, and gas pipes in the
proximity of sewer pipes to consider interaction in estimating consequences of failure.
Types of MH monitoring
1. Type I MHM: The system will have specific monitoring components where each compo-
nent can monitor a specific individual hazard. More often than not, however, this type of
monitoring will produce information that has compound effects of more than one hazard.
Currently, this is the most prevalent type of monitoring. This type of MHM is a generaliza-
tion of the serendipity principle; see Ettouney and Alampalli (2012).
2. Type II MHM: A particular measurement of a component or system degradation can
isolate the contributions of different hazards that result in the measured degradation.
Formally, the Type II MHM is initiated by observing a particular behavior of the system
or component of interest, u. This component or system has been subjected to a set of haz-
ards Hi, where i = 1,2,NH and NH is the number of hazards. The objective in this type
of MHM is to quantify the relative contributions of each of the hazards in the observed
behavior u.
3. Type III MHM: A carefully designed monitoring system with several types of monitoring
methods (visual, nondestructive testing [NDT], or structural health monitoring [S.H.M.])
that can identify the degradation effects of more than one hazard. It is more costly, but it
can result, if designed properly, in more accurate and beneficial information.
We note that Type II is the inverse of Type I. Whereas Type III is always a superset of Type I. It can
also be designed so as to use its built-in versatility to be a superset of Type II.
There are practical benefits for each of the three types of MHM as shown in Table 9.1.
Figure 9.2 illustrates the differences between the three MHM types. We explore different types
of MHM via practical case studies later in this chapter.
TABLE 9.1
Types of MHM
MHM Types Objectives/Benefits
Type I Measures extent of degradation
Cost savings (lesser number of systems)
Additional system safety (due to monitoring of more hazards by single system)
Simplicity of operations (lesser number of systems)
Type II Measures extent of degradation
Measures/infers/isolates cause of degradation
Targeted maintenance, rehabilitation, and replacement decisions (identifying which hazard caused which
degradation)
Operational and maintenance cost savings
Type III More accurate than other types in isolating causes of degradations
More accurate than other types in estimating extent of degradations
404 Multihazard Considerations in Civil Infrastructure
Types of MH monitoring
As such, E can be a measure of visual inspection V.I. since V.I. includes a subjective estimate of
both. Similarly, condition ratings, CR, whether it is for a component or system, is an estimator of
exposure. We consider V.I. or CR as a form of exposure MHM system since both aim at monitoring
performance of the system under consideration to multitudes of hazards. Other exposure monitor-
ing techniques are S.H.M. and NDT methods. See Ettouney and Alampalli (2012a and 2012b) for
comprehensive discussions of those popular techniques.
Ri = g( E, C ) (9.2)
Hazards
Short-term hazards Long-term hazards
System: capacity/
Hazards/demands Consequences
vulnerability
(as function of time) (as function of time)
(as function of time)
1. Resilience is a subset of risk with the main difference being that it studies the quality
or efficiency of continued operation (OE) and time of recovery (T) after major hazards.
Formally,
Re = Re(OE, T ) (9.3)
2. Resilience is a function of the 4Rs (Robustness R1, Resourcefulness R2, Recovery R3, and
Redundancy R4). Formally,
Thus, for resilience MHM we have to monitor the MH attributes of either OE and T, or R1, R2, R3,
and R4.
9.3.1.2 Model
In this example, we assume that there are three specific hazards that can affect the condition rating
(see Ettouney and Alampalli 2012b) of a structural system (we use a post-tensioned bridge girder
as an example): (1) corrosion of tendons (COR), (2) wear and tear of tendons (WT), and (3) tem-
perature constraints at ends of the girders (TMP). When the inspector visually observes deteriora-
tion of the girder (V.I.), it is not obvious as to the cause of the deterioration. Given the fact that a
retrofit for each of these can be different from the others, it is essential to accurately estimate the
cause of the deterioration in order to embark on an appropriate retrofit measure (see Ettouney and
Alampalli 2012a and 2012b). Figure 9.4 shows the BN schematics of this situation. Table 9.2 shows
TMP COR WT
V.I.
TABLE 9.2
States of Nodal Variables
Variable Number of States State
TMP 3 High, medium, low
COR 2 Damaged, pristine
WT 2 Damaged, pristine
V.I. 4 Service, poor, fair, good
Multihazard Exposure, Risk, and Resilience Monitoring 407
the states of nodal variables of the model while Table 9.9 (Appendix 9A) contains the definitions
of the nodal variables of the model.
9.3.1.3 CPTs
The different CPTs of the network shown in Figure 9.4 are shown in Appendix 9B. These CPTs will
govern the uncertain behavior of different variables of the BN. We used our best judgment in filling
the different tables in a realistic manner for illustration purposes. For more on different methods of
developing CPTs, see Chapter 5.
9.3.1.4 Results
The prior (historical) marginal probabilities for the BN model are shown in Figure 9.5. The V.I.
observations indicate, in general, poor performance for the bridge. They also show that the prob-
abilities of damage due to COR or WT are about the same (71% vs. 77%, respectively). Of course,
historical performance can only be utilized as a guide, more specific and current information is
needed in order to make appropriate management decisions.
FIGURE 9.6 Hard evidence of V.I. state of Poor condition (hard evidence).
9.3.2.2 Model
We expand the model shown in Figure 9.4 with only a single monitoring method, V.I., into three
general monitoring methods: V.I., S.H.M., and NDT. The utilization of the three methods potentially
Multihazard Exposure, Risk, and Resilience Monitoring 409
TMP COR WT
TABLE 9.3
States of Nodal Variables
Variable Number of States State
TMP 3 High, medium, low
COR 2 Damaged, pristine
WT 2 Damaged, pristine
V.I., S.H.M., NDT 4 Pristine, damaged
should produce more accurate inferences of the contributions of different hazards under consider-
ations. In this example, we retain the same three hazards (TMP, COR, and WT) to demonstrate one
of the advantages of graph networks: scalability. For we can reuse the same CPTs as before, but just
add new CPTs to accommodate the new variables and links. The model we will be using for this
problem is shown in Figure 9.8. Since all links in the graph are directional links, the model is a BN
model. We assume in this model that V.I. will observe the combined effects of the three hazards. But
S.H.M., being a bit more discriminating, we assume that it can detect the combined effects of TMP
and COR. The NDT process cant measure TMP effects, but it can measure the combined effects of
COR and WT. These assumptions are only for illustration purposes, and their actual ability depends
on the type of NDT and S.H.M. utilized. The states of nodal variables are shown in Table 9.3 while
the definitions of those variables are shown in Table 9.9.
9.3.2.3 CPTs
The different CPTs of the network shown in Figure 9.8 are shown in Appendix 9C. We used our best
judgment in filling the different tables in a realistic manner for illustration purposes. For more on
different methods of developing CPTs, see Chapter 5.
9.3.2.4 Results
Upon executing the model with its CPTs, we obtain the historical (prior) marginal probabilities as
shown in Figure 9.9. We see that historically, based on previous experiences and observations, the
probability of COR damage is expected to be 44% while WT damage is expected to be 41%. Overall,
this is in line with historical observations (of the site under study) of the three monitoring methods
that expect damage probabilities at 44%, 47%, and 44%, for V.I., S.H.M., and NDT, respectively.
410 Multihazard Considerations in Civil Infrastructure
FIGURE 9.9 MH monitoring using several monitoring methods: prior (historical) results.
FIGURE 9.10 MH monitoring using several monitoring methods: visual inspection only.
Let us assume that a current V.I. observation indicates a damaged bridge. The updated marginal
probabilities of BN based on this observation are shown in Figure 9.10. We can infer from this
observation that the COR damage probability is about 67%, while that of WT is about 58%. Thus,
the bridge manager has isolated the potential relative contributions of the different hazards slightly
better. The COR is more probable to have caused more damage than WT. An appropriate decision
for mitigation may be made under this circumstance (combined observation and inference).
The previous results that are based on only V.I. observations show an increase in potential dam-
age from both V.I. and WT sources. So if the decision-maker needs more verification, then he/she
might decide to embark on another monitoring method, say, S.H.M. The resulting observation pro-
duces soft evidence with probability of damage of 85% versus pristine probability of 15%. We can
now recompute the BN model with this S.H.M. soft evidence combined with the hard evidence
Multihazard Exposure, Risk, and Resilience Monitoring 411
FIGURE 9.11 MH monitoring using several monitoring methods: combined visual inspection and structural
health monitoring observations.
obtained by the V.I. monitoring method. The results are shown in Figure 9.11. Now, the COR dam-
age probability has increased to 79%, while a WT damage probability has decreased slightly to 54%.
The combined monitoring methods helped in clarifying the source of the damage and confirmed the
damage to be COR rather than WT. The decision to mitigate the COR effects can now proceed with
a relatively greater degree of confidence.
9.3.3.2 Model
In this case study, we consider the situation of a pin-hanger (PIN) steel girder bridge that can be sub-
jected to two hazards: corrosion (COR) and fatigue (FAT). The COR hazard can be monitored visu-
ally by traditional inspection (V.I.). For the purpose of this example, we focus on the remaining FAT
life that cant be observed visually. S.H.M. strain monitoring can be used to estimate the remaining
FAT life (see Alampalli and Lund 2006). We note that both COR and FAT can result in the fail-
ure of the PIN. Specifically, FAT can cause failure in the PIN through crack initiation, which can
result in the sudden fracture of the PIN. COR will result in the rusting of the PIN, which will cause
loss in the structural cross-sectional area. This loss of area will result in an increase of internal
stresses, which will ultimately cause the failure of PIN. Ettouney and Alampalli (2012) explained
this process at length. The COR of the PIN cross section is related to the visual inspection of the
steel girder and PIN (V.I.). We use BN to represent this particular problem as shown in Figure9.12.
In order to reduce the size of the CPT of the exposure, E, we added an intermediate variable called
observation. The observation variable will be conditional on the two other observation variables:
S.H.M. and V.I. Then, it will be one of the parents of the exposure, in addition to FAT and COR
variables. We will include two consequence variables in this model, C_1 and C_2. These will rep-
resent system-related consequences and system-independent consequences, respectively. The two
412 Multihazard Considerations in Civil Infrastructure
FAT COR
C_1 E
C_2 C
Ri
consequence variables will control a single consequence variable, C. Finally, the model risk, Ri, is
controlled by exposure and consequences, E and C. Table 9.4 shows the states of nodal variables of
this model while Table 9.9 defines the random variables of the model.
9.3.3.3 CPTs
The different CPTs of the network of Figure 9.12 are shown in Appendix 9D. We used our best
judgment in filling the different tables in a realistic manner for illustration purposes. For more on
different methods of developing CPTs, see Chapter 5.
9.3.3.4 Results
The historical probabilities are shown in Figure 9.13. It is clear that the monitored bridge has some
problems. This is reflected in the damage probabilities for both hazards, COR and FAT, which show
Multihazard Exposure, Risk, and Resilience Monitoring 413
TABLE 9.4
States of Nodal Variables
Variable Number of States State
COR 2 Damaged, pristine
FAT 2 Damaged, pristine
S.H.M. 4 Service, poor, fair, good
V.I. 4 Service, poor, fair, good
Observations 4 Service, poor, fair, good
C_1, C_2 2 High con., low con
E 4 Service, poor, fair, good
C 3 High C, med. C., low C
Ri 3 High, med., low
76% and 69% damage probabilities, respectively. The historical results also show a high-risk prob-
ability of 60% compared with a low-risk probability of 12%. Clearly, the bridge needs attention,
especially given the computed high consequences probability at 67%.
1. Upon improving the observed state, how much would that affect the state of damage of
each of the hazards?
2. What are the relative improvements of the damages of each hazard?
3. How much the overall high-risk state will be improved?
Assuming that a mitigation project will improve the V.I. observation to Good, the BN model is
recalculated. The results are shown in Figure 9.14. The results indicate that a Good rating from V.I.
monitoring would reduce the high-risk probability to 17% while improving the low-risk probability
to 44%. In addition, both FAT and COR hazards effects will improve to pristine conditions with
probabilities of 94% and 97%, respectively.
The dramatic increases of conditions of both hazards effects would render performing an
S.H.M. monitoring effort as not necessary since they seem to be clear cut (unlike the situation in
CaseStudy9.3). Of course, an S.H.M. observation of Good, in addition to the Good V.I. observation,
might slightly improve the overall picture, as shown in Figure 9.15. However, the small improve-
ment in the additional gained information might not warrant expending the S.H.M. effort.
FIGURE 9.13 Prior (historical) probabilities of a two-hazards model with two monitoring methods.
infrastructure can result from multitudes of hazards, the process can be considered as a rep-
resentative MH situation. In that case study, we used inference to assign potential sources of
deterioration (as represented by visual inspection ratings). Sometimes, for planning purposes,
the manager is interested in forecasting the future influence of individual hazards based on
current observations. Given the complex interactions between different variables, we have to
utilize the capability of the dynamic graph network (DGN) technique that is capable of model-
ing such interactions in as much resolution as the manager deems suitable. DGN modeling also
enables us not only to project potential condition ratings (as represented by visual inspection)
but also to infer future exposures to individual hazards that collectively result in deterioration.
Multihazard Exposure, Risk, and Resilience Monitoring 415
FIGURE 9.14 Improved state of damage and risk upon visual inspection observations.
By forecasting the exposure to individual hazards, the manager is better equipped to optimize
future maintenance and rehabilitation efforts.
9.4.1.2 Model
For DGN modeling, the first step is to define the time slice, which are the discrete times at which
the probabilities of the variables need to be estimated (see Chapter 5). For this problem, we start
at a time slice of t = t 0 that represents the current time. We will forecast the behavior into two
416 Multihazard Considerations in Civil Infrastructure
FIGURE 9.15 Improved state of damage and risk upon visual inspection and structural health monitoring
observations.
future time slices, which are separated by an equal time interval. The second component of DGN
is to identify the template, which is a graph network that governs the behavior of the variables and
their links at each time slice. For our immediate purpose, we consider the BN model of Figure
9.4 as a DGN (dynamic Bayesian network [DBN] in this case, since the template is a BN model)
template. We will use the visual inspection ratings as the interface variables, which link one
time slice to another. The overall DBN scheme is illustrated in Figure 9.16. The states of nodal
variables of the model are shown in Table 9.5 while the definitions of the variables are shown in
Table 9.9.
Multihazard Exposure, Risk, and Resilience Monitoring 417
Time slice t = t 0
Past time: Smoothing
TMP COR WT
V.I.
Time slice t = t 1
Current time: Filtering
TMP COR WT
V.I.
Future time: Prediction (forecasting)
Time slice t = t 2
TMP COR WT
TABLE 9.5
States of Nodal Variables
Variable Number of States State
TMP 3 High, medium, low
COR 2 Damaged, pristine
WT 2 Damaged, pristine
V.I. 2 Service, poor, fair, good
418 Multihazard Considerations in Civil Infrastructure
The final component that needs development in any DBN (or CGN) project is the temporal links.
In this case, we establish a temporal link of the V.I. variable, which is essentially a transfer matrix
between time slices, defined as matrix T, such that
0.6 0 0 0
0.3 0.55 0 0
[T ] = (9.5)
0.08 0.35 0.6 0
0.02 0.1 0.4 1
Note that the proposed matrix allows for only reduced condition ratings as time marches forward.
9.4.1.3 CPTs
The different CPTs of the network of Figure 9.4, which is the same as the template of the current
model, are shown in Appendix 9B.
9.4.1.4 Results
Since the BN model of Section 9.3.1 is the same as the BN of the template of this example, the prior
(historical) probabilities of the two models should be identical; the results are shown in Figure 9.5. Let
us assume that the initial observation at time t = t0 of V.I. to be a fair rating, that is, the state vector is
0
0
{V .I .} = (9.6)
1
0
We assume that the initial V.I. observations are as in Equation 9.6. Executing the BN template model
will result in the initial inferred hazard marginal probabilities as shown in Figure 9.17. Note that the
probability of COR damage is inferred to be higher than the probability of the WT damage at 56%
compared with 49%.
We now apply the transition matrices to V.I. to estimate probabilities of V.I. in time slices t = t1
and t = t2. Thus,
0
0.55
{V .I .}t = t1 = (9.7)
0.35
0.1
and
0
0.3025
{V .I .}t = t2 = (9.8)
0.4025
0.295
We can apply the marginals from Equations 9.7 and 9.8 as soft evidence (observations); we can solve
the DBN problem at both time slices. The resultant marginal probabilities are shown in Figures 9.18
and 9.19 for time slices t = t1 and t = t2, respectively.
We note that the probability of damage due to WT is higher than COR in both time periods
t=t1 and t = t2. This is an important MH inference, since it will enable the decision-maker to allo-
cate mitigation budgets more accurately. The DBN modeling enabled the decision-maker to isolate
future potential damages of different hazards using current observations/evidence.
Figures 9.18 and 9.19 now show estimations of expected hazards effects in future time slices. The
asset manager can use these estimates for better planning.
9.4.1.5 Remarks
This case study explored the forecasting potential in an MH environment. We can easily use the
same technique for back projection (usually called smoothing). Say the manager is interested in
identifying the most probable hazard source of the current condition rating (as observed in a visual
inspection process). In such a situation, we might need to introduce a soft evidence to describe the
V.I. observation at t = t0 instead of the hard evidence (V.I. = Fair) we used. We leave this study to
the reader as an exercise.
9.4.2.2 Model
One of the basic foundations of MHM/LCCA is visual inspection at regular time slices as shown in
Figure 9.20. Based on this, we explore the LCCA process in an MH environment by offering a simple
example. As usual, DBN is based on a time slice template. The nth generic time slice of the problem at
hand is shown in Figure 9.21. The system under consideration is subjected to two hazards: combined
Multihazard Exposure, Risk, and Resilience Monitoring 421
FIGURE 9.20 An inspector observing a truss bridge for inferring life-cycle cost analysis.
effects of corrosion and fatigue, CorrFat, and an abnormal hazard, Abn. H. The objective is to compute
life-cycle cost (LCC) as represented by the absolute (monetary) risk for the system. For this example,
we consider three temporal links between nodes V.I., C_2, and a link between Rin -1 END and Rin START
as shown in Figure 9.22, which shows four time slices. This implies that we will use, for estimating the
LCC forecasts, an assumed or known transfer matrices of visual inspection, and consequences that are
independent of the structural condition of the bridge structure (such as traffic volume, detour length, or
management costs). The transfer matrices of V.I. and C_2 are, as usual, assumed to be time-independent.
However, note that we are now using three risk variables in the nth generic single time such that
All risk variables Rin START , Rin END, and Rin change as time slices change. The required LCC after
N time slices is described by the marginal probability of RiN END.
The variables of the model of Figure 9.21 have been all discussed in previous examples. However,
both risk variables, Rin START and Rin END, are now used in a different context; it is meant to be the
cumulative LCC/risk at end of time slice n; as such, it exhibits a few properties that need additional
considerations. These are the following:
The states of both Rin START and Rin END need to encompass all possible values (in this case
monetary values) of the variable in the time span of the LCA.
Since there is a temporal link between Rin -1 END and Rin START , the states of both need to be
identifiable in each time slice. For example, if Rin -1 END and Rin START are chosen so as to be
422 Multihazard Considerations in Civil Infrastructure
Corr-Fat Abn.H.
V.I.
C_1 E
C_2 C Ri
Ri|START Ri|END
discrete, its rank needs to be equal to N, which is the number of time slices. If N is large, this
may present difficulties during the preparation of the CPT of Rin. To avoid such difficulty,
a reasonable solution would be to define both Rin -1 END and Rin START as continuous random
variables. Methodologies for solving BN with continuous random variables are discussed in
details by Fenton and Neil (2013). In our example, we choose both Rin START and Rin END to be
discreet with a rank of 4. This will allow us to use three time slices, plus the initial conditions.
Description of the variables and their ranks and states are shown in Table 9.6. The definitions of
these variables are shown in Table 9.9.
9.4.2.2.1 Transfer Matrices
As before, the transfer matrices are used to relate the probabilities of states of pertinent variables,
{X}, from time slice n to time slice n + 1, such that
{X}t = n +1 = [T ]{X}t = n (9.9)
We use a transfer matrix for V.I. (assuming a rank of 2 for the node, as in Table 9.6) as
0.7 0
[T ] = (9.10)
0.3 1
Future time: Prediction (forecasting) Current time: Filtering Past time: Smoothing
FIGURE 9.22 Three time slices of DBN model of life-cycle analysis including MH effects.
423
424 Multihazard Considerations in Civil Infrastructure
TABLE 9.6
States of Nodal Variables
Variable Number of States State
Corr-Fat 2 Damaged, pristine
Abn.H. 2 H. level, L. level
V.I. 2 Damaged, pristine
E 3 H. level, M. level, L. level
C_1, C_2 2 High con., low con.
C 3 High C, med. C. low C
ri 3 High, med., low
Ri|START 4 $5.00E+07, $1.50E+07, $5.00E+06, $1.00E+06
Ri|END 4 $5.00E+07, $1.50E+07, $5.00E+06, $1.00E+06
The transfer matrix relating LCC (risk) variables from one slice to another is also governed by
Equation 9.9. However, the expression needs to accommodate the length of the time slice and the
discount rate. It needs also to describe the degree of uncertainty, which will govern the marginal
probabilities of costs marching from one time slice to another. If there is complete certainty, the
temporal link equation would be
0 0 0 0
1 0 0 0
{Rin -1 END} = {Rin START } (9.12)
0 1 0 0
0 0 1 0
Of course, there is always uncertainty, especially when we are involved in projecting future events.
In addition, one of the advantages of using DBN is to be able to easily specify uncertainty in a
simple manner. For this problem we induce some uncertainty in the temporal link such that
0.01 0 0 0
0.85 0.10 0.05 0
{Rin -1 END} = {Rin START } (9.13)
0.14 0.80 0.15 0.05
0 0.10 0.80 0.95
9.4.2.3 CPTs
The different CPTs of the network of Figure 9.21 are shown in Appendix 9E. We used our best
judgment in filling the different tables in a realistic manner for illustration purposes. For more on
different methods of developing CPTs, see Chapter 5.
9.4.2.4 Results
9.4.2.4.1 Historical (Prior) and Initial Time Slice/Period Probabilities
For this problem, we are initially interested in two sets of results: historical probability of the network
and the initial (current) probabilities. We obtain the historical (prior) probabilities by simply execut-
ing the network template using the CPTs of Appendix 9E. The results are shown in Figure9.23.
Multihazard Exposure, Risk, and Resilience Monitoring 425
TABLE 9.7
Initial and Historical Risk, Ri|END
(
p Ri END )
State Historical Initial, t = t0
$1,000,000.00 60.00% 68.00%
$5,000,000.00 30.00% 27.00%
$15,000,000.00 8.00% 5.00%
$50,000,000.00 2.00% 0.00%
Average Ri|END $4,300,000 $2,780,000
We then execute the current (initial) state (t = t0 ) by introducing the initial consequences state
C_2=Low_Cons. We also assume that the initial condition of the system is V.I. = Pristine. The
results are shown in Figure 9.24. Note that the absolute risk Ri|END is reduced from its historical aver-
age from an average of $4,300,000 to an average of $2,780,000 as computed from Table 9.7. This is
an expected reduction due to the observation of lower C_2 than its historical values.
LCC i = j =1
pij Cost j (9.14)
where pj is the probability of Ri|END at state Costj at end of period t = ti. Note that the LCC|i is merely
the risk Ri|END at each time slice.
As an example, we compute the needed LCC|i by executing the DBN for three time slices. The
results are shown in Figures 9.25 through 9.27. The resulting LCC|i are shown in Table 9.8 and
illustrated in Figure 9.28.
428 Multihazard Considerations in Civil Infrastructure
TABLE 9.8
Life-Cycle Costs, LCC|i in an MH Environment
(
p Ri END )
State Historical Initial, t = t0 t = t1 t = t2 t = t3
$1,000,000.00 60.00% 68.00% 30.81% 4.68% 2.26%
$5,000,000.00 30.00% 27.00% 35.99% 17.10% 8.12%
$15,000,000.00 8.00% 5.00% 23.47% 42.13% 30.66%
$50,000,000.00 2.00% 0.00% 9.73% 36.09% 58.96%
Average Ri|END, also LCC|i $4,300,000 $2,780,000 $10,492,085 $25,265,637 $34,508,239
LCA projections
40,000,000.00
35,000,000.00
30,000,000.00
25,000,000.00
LCA ($)
20,000,000.00
15,000,000.00
10,000,000.00
5,000,000.00
$-
t0 t1 t2 t3
Time slice
TABLE 9.9
Definitions of Nodal Variables
Used in Case
Variable Study Number Definition
Abn.H. 9.5 Subjective estimate of an abnormal hazard that might affect the system. An abnormal
hazard can be earthquake, flood, high wind, or bomb blast.
C 9.4, 9.5 Measure of consequences of exposure level as well as different social and economic
factors. In this example, consequences are estimated subjectively. Obviously,
consequences are higher when the exposure of the system is higher. Similarly,
different social and economic factors can affect levels of consequences.
C_1, C_2 9.4, 9.5 C_i is the total consequences due to the ith hazard. Since exposures to hazards are
different, so it is reasonable to assume that consequences to each hazard are also
different.
COR 9.19.4 Probability of level of corrosion-related loss of area for the type and age of bridges.
Corr-Fat 9.5 This variable estimates the deterioration of the system (or component) resulting from
both corrosion and fatigue.
E 9.4, 9.5 Estimate of the exposure of the system.
FAT 9.4 Probability of fatigue crack severity level for the type and age of structures.
NDT 9.3 Estimate of what an NDT monitoring would reveal in regard to the systems health.
Observations 9.4 Combined estimate of observations of two monitoring methods: visual inspection
(V.I.) and structural health monitoring (S.H.M.).
Ri 9.4 In this example, Risk, Ri, is a function of consequences and exposure.
Ri|END 9.5 Absolute risk estimate at the end of the time slice.
Ri|START 9.5 Absolute risk estimate at the start of the time slice.
S.H.M. 9.3, 9.4 Estimate of what an S.H.M. monitoring would reveal in regard to the systems health.
TMP 9.19.3 Probability of deterioration due to temperature effects for the type and age of
structure.
V.I. 9.19.5 Probability of particular condition rating.
WT 9.19.3 Probability of degradation due to normal wear and tear effects for that type and age
of bridges
ri 9.5 Estimate of change in risk within the time slice.
Multihazard Exposure, Risk, and Resilience Monitoring 433
TABLE 9.10
CPT of COR
Pristine 0.2918
COR
Damaged 0.7082
TABLE 9.11
CPT of TMP
Low 0.0921
TMP Medium 0.5527
High 0.3553
TABLE 9.12
CPT of V.I.
WT Pristine Damaged
COR Pristine Damaged Pristine Damaged
TMP Low Medium High Low Medium High Low Medium High Low Medium High
Good 0.5935 0.4207 0.2089 0.3585 0.2342 0.1392 0.1709 0.0774 0.0042 0.0397 0.0014 0.0000
Fair 0.3815 0.4861 0.4763 0.4717 0.4068 0.3058 0.3291 0.2816 0.1203 0.2751 0.0920 0.0014
V.I.
Poor 0.0249 0.0908 0.2751 0.1570 0.2816 0.3486 0.3291 0.4068 0.5160 0.4763 0.5519 0.3143
Service 0.0001 0.0025 0.0397 0.0129 0.0774 0.2064 0.1709 0.2342 0.3595 0.2089 0.3548 0.6843
TABLE 9.13
CPT of WT
Pristine 0.2372
WT
Damaged 0.7628
TABLE 9.14
CPT of COR
Pristine 0.5625
COR
Damaged 0.4375
TABLE 9.15
CPT of NDT
WT Pristine Damaged
COR Pristine Damaged Pristine Damaged
Pristine 0.8127 0.5550 0.4147 0.2918
NDT
Damaged 0.1873 0.4450 0.5853 0.7082
TABLE 9.16
CPT of S.H.M.
COR Pristine Damaged
TMP Low Medium High Low Medium High
Pristine 0.9206 0.7628 0.6087 0.3913 0.2372 0.0794
S.H.M.
Damaged 0.0794 0.2372 0.3913 0.6087 0.7628 0.9206
TABLE 9.17
CPT of TMP
Low 0.3621
TMP Medium 0.4525
High 0.1854
TABLE 9.19
CPT of WT
Pristine 0.5910
WT
Damaged 0.4090
TABLE 9.20
CPT of C
C_2 Low Con. High Con.
C_1 Low Con. High Con. Low Con. High Con.
Low C 0.9067 0.3553 0.0921 0.0000
C Med. C 0.0933 0.5527 0.5527 0.0933
High C 0.0000 0.0921 0.3553 0.9067
TABLE 9.21
CPT of C_1
E Good Fair Poor Service
Low Con. 0.9750 0.6087 0.2948 0.0051
C_1
High Con. 0.0250 0.3913 0.7052 0.9949
TABLE 9.22
CPT of C_2
Low Con. 0.1698
C_2
High Con. 0.8302
TABLE 9.23
CPT of COR
Pristine 0.2372
COR
Damaged 0.7628
TABLE 9.24
CPT of E
Observations Good Fair Poor Service
COR Pristine Damaged Pristine Damaged Pristine Damaged Pristine Damaged
FAT Pristine Damaged Pristine Damaged Pristine Damaged Pristine Damaged Pristine Damaged Pristine Damaged Pristine Damaged Pristine Damaged
Good 0.6723 0.4989 0.3521 0.2453 0.3309 0.2342 0.2089 0.0266 0.2064 0.0774 0.0397 0.0003 0.0258 0.0035 0.0168 0.0000
Fair 0.2949 0.3957 0.4362 0.3634 0.3772 0.4068 0.4763 0.1851 0.3486 0.2816 0.2751 0.0624 0.2670 0.0759 0.1285 0.0000
E
Poor 0.0321 0.0979 0.1851 0.2796 0.2233 0.2816 0.2751 0.4362 0.3058 0.4068 0.4763 0.5940 0.5154 0.3976 0.3882 0.0794
Service 0.0008 0.0074 0.0266 0.1116 0.0685 0.0774 0.0397 0.3521 0.1392 0.2342 0.2089 0.3434 0.1918 0.5231 0.4666 0.9206
TABLE 9.25
CPT of FAT
Pristine 0.3148
FAT
Damaged 0.6852
TABLE 9.26
CPT of Observations
V.I. Good Fair Poor Service
S.H.M. Good Fair Poor Service Good Fair Poor Service Good Fair Poor Service Good Fair Poor Service
Good 0.9206 0.4749 0.2799 0.2342 0.3585 0.2041 0.1207 0.1116 0.1116 0.0289 0.0042 0.0002 0.0397 0.0065 0.0000 0.0000
Observations
Fair 0.0794 0.4749 0.4845 0.4068 0.4717 0.4229 0.3149 0.2796 0.2796 0.2369 0.1203 0.0383 0.2751 0.1334 0.0112 0.0000
Poor 0.0000 0.0497 0.2125 0.2816 0.1570 0.3002 0.3694 0.3634 0.3634 0.4839 0.5160 0.4807 0.4763 0.5001 0.3622 0.0794
Service 0.0000 0.0005 0.0231 0.0774 0.0129 0.0727 0.1950 0.2453 0.2453 0.2504 0.3595 0.4807 0.2089 0.3600 0.6266 0.9206
TABLE 9.28
CPT of S.H.M.
COR Pristine Damaged
FAT Pristine Damaged Pristine Damaged
Good 0.3063 0.0039 0.0018 0.0000
Fair 0.2939 0.1564 0.0743 0.0000
S.H.M.
Poor 0.2377 0.5947 0.4620 0.0551
Service 0.1620 0.2451 0.4620 0.9449
TABLE 9.29
CPT of V.I.
COR Pristine Damaged
FAT Pristine Damaged Pristine Damaged
Good 0.7176 0.0231 0.0068 0.0000
Fair 0.2814 0.2125 0.1112 0.0005
V.I.
Poor 0.0010 0.4845 0.4410 0.1319
Service 0.0000 0.2799 0.4410 0.8676
TABLE 9.30
CPT of Abn.H
L. Level 0.6000
Abn.H.
H. Level 0.4000
TABLE 9.31
CPT of C
C_2 Low Con. High Con.
C_1 Low Con. High Con. Low Con. High Con.
Low C 0.9067 0.3553 0.0921 0.0000
C Med. C 0.0933 0.5527 0.5527 0.0933
High C 0.0000 0.0921 0.3553 0.9067
TABLE 9.32
CPT of C_1
E L. Level M. Level H. Level
Low con. 0.7082 0.4319 0.2082
C_1
High con. 0.2918 0.5681 0.7918
TABLE 9.33
CPT of C_2
Low Con. 0.3148
C_2
High Con. 0.6852
TABLE 9.34
CPT of Corr-Fat
Pristine 0.5500
Corr-Fat
Damaged 0.4500
TABLE 9.36
CPT of E
V.I. Pristine Damaged
Abn. H. L. Level H. Level L. Level H. Level
Corr-Fat Pristine Damaged Pristine Damaged Pristine Damaged Pristine Damaged
L. Level 0.8240 0.0355 0.0029 0.0001 0.7942 0.0116 0.0010 0.0000
E M. Level 0.1726 0.4292 0.3009 0.0800 0.2048 0.2885 0.2048 0.0117
H. Level 0.0033 0.5353 0.6962 0.9199 0.0010 0.6999 0.7942 0.9883
TABLE 9.38
CPT of Ri|START
_1.00E+06 0.9999
_5.00E+06 0.0001
Ri|START
_1.50E+07 0.0001
_5.00E+07 0.0001
TABLE 9.39
CPT of V.I.
Corr-Fat Pristine Damaged
Pristine 0.9998 0.3148
V.I.
Damaged 0.0002 0.6852
REFERENCES
Ahmad, K. and Gibb, A. 2004. Towards effective safety performance measurementEvaluation of exist-
ing techniques and proposals for the future. In: Rowlinson, S. (ed.), Construction Safety Management
Systems, Spon Press, London.
Alampalli, S. and Lund, R. Estimating fatigue life of bridge components using measured strains, Journal of
Bridge Engineering, ASCE, 11(6), 2006, 725736.
Chi, S. and Caldas, C.H. Automated object identification using optical video cameras on construction sites,
Computer Aided Civil and Infrastructure Engineering, 26(5), 2011, 368380.
Chi, S. and Caldas, C.H. Image-based safety assessment: Automated spatial safety risk identification of earth-
moving and surface mining activities, Journal of Construction Engineering and Management, 138(3),
March 1, 2012, 341351.
Ettouney, M. and Alampalli, S. 2012a. Infrastructure Health in Civil Engineering: Theory and Applications,
CRC Press, Boca Raton, FL.
Ettouney, M. and Alampalli, S. 2012b. Infrastructure Health in Civil Engineering: Applications and
Management, CRC Press, Boca Raton, FL.
Ettouney, M., Alampalli, S., and Agrawal, A. Theory of multihazards for bridge structures, Bridge Structures,
Vol. 1. No. 3, 2005, pp. 281291.
Fenton, N. and Neil, M. 2013. Risk Assessment and Decision Analysis with Bayesian Networks, CRC Press,
Boca Raton, FL.
MSHA (Mine Safety and Health Administration). 2009. MSHA fatality statistics. http://www.msha.gov/stats/
charts/chartshome.htm (accessed on May 14, 2009).
Salman, B. and Salem, O. Risk assessment of wastewater collection lines using failure models and criticality
ratings, Journal of Pipeline Systems Engineering and Practice, ASCE, 3(3), August 1, 2012, 6876.