Evaluation and zoning of seismic vulnerability of Sanandaj city's worn out texture, with passive defense considerations, using the IHWP and GIS model

Authors

1 Master Student of Urban Design, Department of Urban Planning and Design, Sanandaj Branch, Islamic Azad University, Sanandaj, Iran.

2 Assistant Professor of Urban Planning, Department of Urban Planning and Design, Sanandaj Branch, Islamic Azad University, Sanandaj, Iran

Abstract

According to the rapid global growth in urban population and the concentration of facilities and infrastructure in cities, in the event of an earthquake, the city's vulnerability is very widespread and it would threaten so many lives and properties.Therefore,providing logical solutions and applying passive defense principles can be an effective way to meet citizens at the event of crises. The research has been done on the basis of documentary methods, in Sanandaj.In order to achieve goals of the research, using the library studies, and existing documents, the necessary indicators to determine the vulnerability of urban textures to earthquakes were identified and extracted. In the next step, using the multi-criteria decision-making techniques such as the hierarchical analysis process and using Delphi fuzzy method, the level of importance of the effective indicators on the degree of vulnerability was identified. The purpose of using Delphi method is to reach an agreement between experts in relation to a particular topic, which is done by using a survey of experts on a variety of occasions and with regard to their feedback. The advantages of this method is providing unbiased answers, frequency and statistical analysis of the results of questionnaires. Results show that with the movement to the depths of neighborhoods, magnitude of the vulnerability of the monuments has been increased. The results also show that 26.87% of the buildings had the highest vulnerability, 36.6% had high vulnerability, 23.03% had a moderate vulnerability, 9.69% had low vulnerability and 36.4% Had the least vulnerability.

Keywords