Understanding Fragility Curve Derivation #10
-
Hi! I am trying to understand the process of deriving fragility function through source code. I have understood that it is based on Bayesian Cloud Analysis (Jalayer et. al (2014)). But I could not understand the exact purpose of following portion of the codes. Is there any documentation or explanation of these steps? I have already read two papers: Martin et.al (2021) and Jalayer et.al. (2014). Thanks and Regards, |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Hi Sanish, Thank you for your message. The portion of code in the first picture allow you to perform a censored regression on the distribution of EDPs vs IMLs. You can read more about censored regression in the work by Peter J. Stafford, but in summary this process requires you to do an optimization to minimize a log-likelihood function. The two helper functions inside the block allow to perform this in Python. Let me know if you have any other questions. Cheers |
Beta Was this translation helpful? Give feedback.
Hi Sanish,
Thank you for your message. The portion of code in the first picture allow you to perform a censored regression on the distribution of EDPs vs IMLs. You can read more about censored regression in the work by Peter J. Stafford, but in summary this process requires you to do an optimization to minimize a log-likelihood function. The two helper functions inside the block allow to perform this in Python.
On the second block you actually compute the probability of exceeding each damage state at using the cloud analysis methodology.
Let me know if you have any other questions.
Cheers
L.M.
CensoredRegression_v0.pdf