On Damage Identification in Civil Structures Using Tensor Analysis Nguyen Lu Dang Khoa1 , Bang Zhang1 , Yang Wang1 , Wei Liu2 , Fang Chen1 , Samir Mustapha3 , and Peter Runcie1 1

3

National ICT Australia, Eveleigh NSW 2015, Australia {khoa.nguyen, bang.zhang, yang.wang, fang.chen, peter.runcie}@nicta.com.au 2 Advanced Analytics Institute, University of Technology, Sydney, Australia [email protected] Department of Mechanical Engineering, American University of Beirut, Lebanon [email protected] Abstract. Structural health monitoring is a condition-based technology to monitor infrastructure using sensing systems. In structural health monitoring, the data are usually highly redundant and correlated. The measured variables are not only correlated with each other at a certain time but also are autocorrelated themselves over time. Matrix-based two-way analysis, which is usually used in structural health monitoring, can not capture all these relationships and correlations together. Tensor analysis allows us to analyse the vibration data in temporal, spatial and feature modes at the same time. In our approach, we use tensor analysis and one-class support vector machine for damage detection, localization and estimation in an unsupervised manner. The method shows promising results using data from lab-based structures and also data collected from the Sydney Harbour Bridge, one of iconic structures in Australia. We can obtain a damage detection accuracy of 0.98 and higher for all the data. Locations of damage were captured correctly and different levels of damage severity were well estimated. Keywords: Tensor analysis, structural health monitoring, damage identification, unsupervised learning

1

Introduction

Most structural and mechanical system maintenance is time-based, which an inspection is carried out after a predefined amount of time. Structural health monitoring (SHM) is a condition-based technology to monitor infrastructure using sensing systems. The potential for life-safety and economic benefits has motivated the needs for SHM, facilitating the shift from time-based to conditionbased maintenance [8]. Damage identification is a key problem in SHM. It is classified by Rytter into four different levels of complexity [14]: – Level 1 (Detection): to detect if damage is present in the structure.

2

Khoa et al.

– Level 2 (Localization): to locate the position of the damage. – Level 3 (Assessment): to estimate the extent of the damage. – Level 4 (Prediction): to give information about the safety of the structure, e.g. a remaining life estimation. Among the four, level 4 requires an understanding of the physical characteristics of the damage progression in the structure. Machine learning methods can solve levels from 1 to 3, which level 1 can be solved using an unsupervised learning while levels 2 and 3 usually require a supervised learning approach [18]. Since we usually only have data associated with healthy states of structures, an unsupervised approach is more practical. In SHM, the data are usually highly redundant and correlated. There are many sensors at different locations collecting similar vibration data over time. For instance, numerous sensors are installed at different locations on a long-span bridge to measure vibration signals due to traffic loading over long periods of time. One vehicle event at a specific time has multiple signals measured by different sensors. The measured variables are not only correlated with each other at a certain time but also autocorrelated themselves over time. Two-way analysis using matrix, which is usually used in SHM, can not capture all these relationships and correlations together. It is normally based on a matricization of a multiway array and then matrix-based techniques such as principal component analysis (PCA) or singular value decomposition (SVD) are used to analyse the data. However, unfolding the multiway data and analyse them using two-way methods may result in information loss and misinterpretation, especially when the data are noisy [1]. Tensor analysis allows us to analyse data in multiple modes at the same time [9]. This work is part of the efforts which have applied SHM to the Sydney Harbour Bridge. Unsupervised tensor analysis combined with one-class support vector machine (SVM) is used for damage identification including detection, localization and estimation of the damage. The contribution of the paper is as follows. – SHM sensing data are formed as a tensor, from which tensor analysis is used to obtain the latent subspaces from the multiway data. Using tensor decomposition, data are mapped to a subspace with much lower dimension so that the learning can be done effectively and efficiently. – Damage detection, localization and estimation are achieved in an unsupervised approach, which is more practical for a SHM problem. – Experiments using data obtained from laboratory-based structures and the Sydney Harbour Bridge show the effectiveness of the approach in damage identification. The remainder of the paper is organized as follows. Sections 2 and 3 summarize the related work and background for this work. Section 4 describes our damage identification approach using tensor analysis and one-class SVM. Experimental results are in Section 5. We conclude our work in Section 6.

On Damage Identification Using Tensor Analysis

2

3

Related Work

Unsupervised methods in SHM normally train the model using only healthy data. Events which significantly deviate from the normal behaviour of the trained model are considered as damage. Worden et al. used Mahalanobis distance to find anomalies in the data, which are likely to be damage [17]. Chan et al. [6] used auto-associative neural networks for damage detection of the three cablesupported bridges in Hong Kong. However, due to the limitation of unsupervised learning techniques as noted in [18], these methods are only able to detect damage. Not much work available to discuss damage localization and estimation in an unsupervised approach. Tensor analysis has been successfully used in many application domains including chemistry, neuroscience, social network analysis and computer vision [1, 10]. Prada [13] used three-way analysis of SHM data for damage detection and feature selection. However, this work was purely used to detect damage, not to localize and estimate the extent of damage. Sun et al. [16] proposed different methods on dynamically updating component matrices from a Tucker decomposition for online applications like computer network intrusion detection. Liu et al. [12] utilized the common substructures of graphs to accelerate the Tucker factorization for dynamic graphs. A difference with our work is they focus on Tucker analysis while we do that for CP, which has its simplicity in interpretation of the results.

3 3.1

Background Tensor Analysis for SHM Data

In SHM, usually many sensors at different locations are used to measure the vibration signals over time. The data can be considered as a three-way tensor (f eature × location × time) as described in Figure 1. Feature is the information extracted from the raw signals in time domain (e.g. features in frequency domain). Location represents sensors, and time is data snapshots at different timestamps. Each cell of the tensor is a feature value extracted from a particular sensor at a certain time. Each slice along the time axis shown in Figure 1 is a frontal slice representing all feature signals across all locations at a particular time. For simplicity, in this paper we represent a tensor as a three-way array, which is often a case in SHM. However, it is also possible to generalize all the theories for a n-way array. Two typical approaches for tensor decomposition are CP decomposition (CANDECOMP/ PARAFAC decomposition and Tucker decomposition [9]. After a decomposition from a three-way tensor, three component matrices can be obtained representing information in each mode. In the case of SHM data as in Figure 1, they are associated with feature (denoted matrix A), location (matrix B) and time modes (matrix C), respectively. In CP method, it is able to interpret the artifact in each mode separately using its corresponding component matrix. In Tucker method, any component can interact with other component in other mode quantified by the core tensor [2]. It makes the interpretation of a Tucker

4

Khoa et al.

model more difficult than CP. Therefore, in this work we only use CP method for damage identification. Time Feature

Decomposition

Location Tensor

A Feature

B Location

C Time

Fig. 1: Tensor data in SHM. CP Decomposition The CP decomposition factorizes a tensor as a sum of a finite number of rank-one tensors. In case of a three-way tensor X ∈ RI×J×K , it is expressed as R X X = λr A:r ◦ B:r ◦ C:r + E, (1) r=1

where R is the latent factor, A:r , B:r and C:r are r-th columns of component matrices A ∈ RI×R , B ∈ RJ×R and C ∈ RK×R , and λ is the weight vector so that the columns of A, B, C are normalized to length one. The symbol ‘◦’ represents a vector outer product. E is a three-way tensor containing the residuals. It can also be written in term of the k-th frontal slice of X : Xk = ADk B T + Ek ,

(2)

where the diagonal matrix Dk = diag(λCk: ) (Ck: is the k-th row of matrix C). CP decomposition is typically solved using alternating least square (ALS) technique. The technique iteratively solves each component matrix using a least square method by fixing all the other components and repeats the procedure until it converges [9]. The results by CP are unique provided that we permute the rank-one components [10]. 3.2

One-class Support Vector Machine

In this work, we use one-class SVM [15] as an anomaly detection method. SVM is well-known for its strong regularization property which is the ability to generalize the model to new data. One-class SVM finds a small region containing most of data points and the anomalies elsewhere. It is done by mapping data into a feature space using kernel and then separating them from the origin with maximum margin. This can be shown as an optimization problem: n

1 1 X k w k2 + ξi − ρ w,ξ,ρ 2 vn i=1 min

s.t. w · xi ≥ ρ − ξi ,

ξi ≥ 0,

(3)

i = 1, . . . , n,

where w and ρ are parameters of the model and can be learned from a training process. ξi is a slack variable for controlling how much training error is allowed.

On Damage Identification Using Tensor Analysis

5

{xi }ni=1 is a training event, ‘·’ is the dot product, and v controls the rate of anomalies in the data. This optimization problem can be solved by Lagrangian multiplier and quadratic programming. Once a model is obtained from training data, it can generate a decision value for every new instance. A new instance with a negative decision value is an anomaly, indicating a damaged event [15].

4

Tensor Analysis for Damage Identification

This section describes an approach to identify damage using tensor analysis. Excitations to structures are measured by accelerometers or other kinds of sensors. Next, features are extracted from the raw data of all accelerometers, which form a three-way tensor data. Then the tensor is decomposed into matrices of different modes as described in previous section. Analysis of these factor matrices will help to identify the damage of the structure. 4.1 Damage Detection Given a three-way tensor X (f eature × location × time) which represents data in a healthy condition of a structure, we want to decide if a new event Xn (a frontal slice of size f eature × location) is an anomaly with respect to all other healthy events in the training data. Therefore, subspace corresponding to the time mode after decomposition will be used to detect damage. Building a Benchmark Model X is decomposed into three component matrices A, B and C using CP decomposition. Each row of C represents an event in time mode. Using one-class SVM, we build a model using healthy training events which are represented by rows of the component matrix C. Damage Detection Due to an arrival of a new event (a new frontal slide in time mode), an additional row will be added to the component matrix C. As in Equation 2, Xk = ADk B T . When a new frontal slice Xn comes, we have: Xn ≈ ADn B T , where Dn = diag(λCn: ) which is a diagonal matrix based on the new row Cn: of component matrix C caused by the new slice Xn . The new row Cn: can be obtained via Dn [13]: Dn = arg min ||Xn − ADn B T ||,

(4)

which can be solved using a least square method. After having Cn: , this new row will be checked if it agrees with the benchmark model built in the training, answering the condition of the structure. In case of one-class SVM, a negative decision value indicates that the new event is likely a damaged event. The damage detection method is described in Algorithm 1. 4.2 Damage Localization and Estimation In order to locate the position of the damage, components of the decomposed matrix in location mode are analysed to extract meaningful artifacts from different states of the structure. By analysing and comparing these components, it is able to find anomalies, which correspond to damaged locations.

6

Khoa et al.

Algorithm 1 Damage detection Input: Component matrices A, B, C, trained SVM model, a new frontal slice Xn Output: +1/ − 1 if Xn corresponds to a healthy/damaged event, respectively Compute the new row x = Cn: of C so that Dn = arg min ||Xn − ADn B T || and Dn = diag(λCn: ). Feed this event to the trained SVM model and estimate its decision value s. If s < 0 return −1, otherwise return +1.

To estimate the extent of the damage, we analyse decision values returned from the one-class SVM model. The rationality is that a structure with a more severe damage (e.g. a longer crack) will behave more differently from a normal behaviour. Different ranges of the decision values may present different severity levels of damage. These analyses will be shown in the experimental results.

5 5.1

Experimental Results Case Studies

We conducted experiments on two case studies, representing two typical types of civil structures. One case study is an laboratory-based building structure obtained from Los Alamos National Laboratory (LANL) [11], and the other is the Sydney Harbour Bridge. For the Sydney Harbour Bridge data, it includes both laboratory testing and field trial. Building Data A dataset was obtained from LANL [11]. The data are from a three-story building structure constructed of Unistrut columns and aluminium floor plates. Plates and columns were connected by bolts and brackets. Dimensions of the structure and floor layout are presented in Figure 2. A shaker was used to generate excitation. As it appears in Figure 2, two accelerometers were attached to each joint, resulting in eight accelerometers within each floor. There were 270 vibration events generated. Each event contained 8192 samples, which were sampled at 1600 Hz. Among those events, 150 healthy events were created using different shaker input levels and bandwidths to represent different environmental and operational conditions. In the remaining 120 events, there were 30 events with damage in location 1A (i.e. corner A at level 1), 60 events with damage in location 3C, and 30 events with damage in both locations (i.e. 1A and 3C). The damage was introduced by loosening the bolts and then hand tightening them, or by removing bolts and brackets at the joints, allowing the plate to move freely relative to the column. The Sydney Harbour Bridge The Sydney Harbour Bridge is one of major bridges in Australia, which was opened in 1932. There are 800 jack arches on the underside of the deck of the bus lane (lane seven) needed to be monitored, as shown in Figure 3a. Vibration data caused by passing vehicles were recorded by three-axis accelerometers installed under the deck of lane seven. Each joint was instrumented with a sensor node, which connected to three accelerometers mounted to the joint in left, middle and right positions as shown in Figure 3c.

On Damage Identification Using Tensor Analysis

7

Fig. 2: Three-story building and floor layout [11]. There are two datasets used: a bridge specimen built from laboratory and real data collected from the bridge.

(b) Laboratory specimen

(a) Lane 7, the first lane from the left

(c) Field trial with cracking

Fig. 3: The Sydney Harbour Bridge. Specimen data: A steel reinforced concrete beam was manufactured with a similar geometry to those on the Sydney Harbour Bridge. The data were collected from two sets of sensor nodes placed on the base of the joint, one nodes is positioned at the tip while the other was mounted 750 mm away from the tip. The locations of three accelerometers from each node are similar to those on the joints of the bridge. The excitation was made using an impact hammer. Once

8

Khoa et al.

the node was triggered by a hammer, it records data for 3 seconds at a sampling rate of 500 Hz, resulting in 1500 samples for each event. After testing the benchmark in a healthy condition, a crack was gradually introduced into the specimen with four level of crack dimensions: (75 × 50)mm, (150 × 50)mm, (225 × 50)mm and (270 × 50)mm. The same test was conducted again in each damage severity. About 200 events were collected in healthy condition and in each level of damage severity. Bridge data: For this case study, only two instrumented joints on the bridge were considered (named joints 1 and 2). A known crack existed in joint 2 at the time of measurement while joint 1 was in a good condition. An event is defined as a time period during which a motor vehicle is driving across the joint. An event is normally triggered after the acceleration value is greater than a pre-set threshold. After the triggering occurs, the node records for a period of 1.5 seconds at a sampling rate of 400 Hz. Each event contains 100 samples before the event started and 500 samples are collected during and after the event. Denote Ai an instantaneous acceleration at i-th sample, Ar the rest vector which is the average of three readings (x, y, z) from the first 100 samples. One metric is extracted from three-axis readings: V = |Ai | − |Ar |, which is independent on the accelerometer orientations. 5.2 Feature Extraction For all datasets, the features in the frequency domain were created as follows. For every vibration event, the data from each accelerometer were standardized to have zero mean and one standard deviation. Then the data were converted to the frequency domain using Fourier transform. Differences between vibrations of adjacent accelerometers in each location in the frequency domain were used as features. The rationality is that if a joint is healthy the accelerometers attached to it would move together. If the joint is damaged they would move differently. These features will be reflected in the differences of the signals. Building Data For every event, the difference between signals collected by two accelerometers at a joint (in total there are 12 joints in three stories) in the frequency domain was taken. Then only frequency up to 150Hz was selected as features. So the data is a tensor of (768 features × 12 locations × 270 events). Specimen Data For each sensor node, differences between V feature mentioned above of accelerometers 1 and 2, 1 and 3, and 2 and 3 in the frequency domain were used as features. Only frequency up to the first 150Hz was selected. Finally we had a tensor of (450 × 6 × 960). Bridge Data Since only accelerometers in the same joints of the bridge are synchronized in time, only data from one joint was put in the tensor. It is all right since the vibration of each joint is quite independent to each other in this case. Since we have healthy data in joint 1 and damaged data in joint 2, to demonstrate the effective of the method we combined the data from joints 1 and 2. Events from three accelerometers from joint 2 were used as damaged events while data from three accelerometers in joint 1 were used as the healthy events. Then differences between V feature of accelerometers 1 and 2, 1 and 3, and 2 and 3 in the frequency domain were used as features. Only frequency up to the first 150Hz was selected. Finally we had a tensor of (150 × 3 × 1341).

On Damage Identification Using Tensor Analysis

5.3

9

Results

For building dataset, 100 healthy events were randomly selected as training data. The other were used for testing. There were 150 healthy events randomly selected as training data for specimen dataset and 500 random healthy events were used for training in bridge dataset. As described in Section 4.1, a benchmark model was built on the training tensor data and each new event (a tensor frontal slide) was test against the model to detect damage. To increase the reliability of the results, multiple testing was used. In stead of computing the decision values for each event (single testing), we took a median value of a block of 10 sequential events in chronological order. The reported accuracy was a block accuracy. The rationality for this is that there may be noisy events overtime but the health status of sequential events in a short time should be very similar. All the results shown were averaged over ten trials of experiment. The tensor toolbox for Matlab [4] was used for tensor operations and LIBSVM for Matlab was used for one-class SVM [7]. In order to decide the number of rank-one tensors R in the CP method, core consistency diagnostic technique (CORCONDIA) described in [5] was applied, in which a Tucker core is used for assessing the appropriateness of a CP model. This technique was implemented using the N-way Toolbox for Matlab [3]. Damage Detection In this section, the damage detection using method described in Section 4.1 was investigated. For CP, we tried different values of R from one to five and used CORCONDIA method to decide the appropriate one. For one-class SVM model, the rate of anomalies ν = 5% was selected. precision∗recall We use F1 = 2 precision+recall as a damage detection accuracy. Figure 4 shows the F1 scores for all new test instances in three datasets using both single testing and multiple testing. The best results almost agree with the parameter selection method (CORCONDIA). CORCONDIA selected R = 2 for the specimen and bridge data and R = 1 for the building data. Since R = 2 also gave similar results for the building data, we selected R = 2 for all datasets and it will be used for damage localization and estimation. Then we have F1 scores of 0.99, 0.98 and 1 (using multiple testing) for the building, specimen and bridge datasets, respectively. The results also show that multiple testing can significantly improve the detection results, especially for the specimen data. 1

1

0.9

0.9

0.8

0.8

0.7

0.7

0.8

Single testing Multiple testing F1 score

F1 score

0.7 0.6 0.5 0.4

0.6 0.5 0.4

0.3

0.3

0.2

0.2

0.1

0.1

0 1

2

3 R

4

(a) Building data

5

F1 score

1 0.9

0 1

Single testing Multiple testing

0.6 0.5 0.4 0.3 0.2

Single testing Multiple testing 2

3 R

4

(b) Specimen data

0.1 5

0 1

2

3 R

4

(c) Bridge data

Fig. 4: Damage detection accuracy using different values of R.

5

10

Khoa et al.

Damage Localization Figure 5 shows two components of the location mode (R = 2) with color values for all sensor locations in the building data. The first component corresponded to a healthy state of the building when there was no damage while the second component presented a damaged state. In the damaged state, the colors with high values correctly associated with locations of known damage (1A and 3C). Therefore, this analysis is promising to localize damage in structures. For the bridge dataset, since all three accelerometers were in the same joint, there was no need to localize the damage. 3B

3C

3B

3C

0.7

0.7

3A

3D

0.6

3A

3D

0.6

2B

2C

0.5

2B

2C

0.5

2A

2D

1B

1C

1A

1D

0.4 2A

2D

0.4

0.3 1B

1C

0.3

0.2 1A

1D

0.1

(a) Location mode - First component

0.2 0.1

(b) Location mode - Second component

Fig. 5: Damage localization for building dataset. Damage Estimation The decision values returned from the one-class SVM model were used to characterize the level of damage. The result in Figure 6 presents the decision values of every test event in the building and specimen data using one-class SVM (we did not do that for the bridge data since there are no ground truth for damage severity in this case). The dotted lines show the boundary between healthy and damaged events. Different ranges of the decision values matched with different severity levels of damage described in the datasets. In Figure 6a, the first 50 events (i.e. 5 blocks) were decision values from healthy data. The next 30 events were damaged data when the damage occurred in both locations 1A and 3C (among them the first and the next 15 events had different levels of severity). The following 60 events corresponded to damage in location 3C with four levels of damage severity. And the last 30 events presented the decision values for damaged events in location 1A in two levels of severity. Moreover, for the same kind of damage, the decision values were lower when damage happened in both locations compared with those occurred in one location only. Figure 6b shows that the decision values successfully separated healthy and damaged events. In addition, events with more severe damage had lower decision values. Therefore, it suggests that we can use the decision values obtained by CP and one-class SVM as structural health scores to characterize the damage severity in an unsupervised manner. Comparison with a Traditional Approach In this section, we will compare between the tensor approach with the approach without using tensor. For all datasets, individual one-class SVM model was built for each sensor location using the same train and test data with the same feature as in previous experiments.

On Damage Identification Using Tensor Analysis 0.5

0.2 Healthy events Damage 1 Damage 2 Damage 3 Damage 4

−1

0

Healthy events Damage 1A & 3C Damage 3C Damage 1A

Decision values

Decision values

0 −0.5

−1.5 −2

−0.2

−0.4

−0.6

−2.5 −3 0

11

5

10 Test event index

15

(a) Building dataset

20

−0.8 0

20

40 60 Test event index

80

100

(b) Specimen with four levels of damage

Fig. 6: Damage characterization using decision values obtained by CP and oneclass SVM.

F1 score

An average detection accuracy of all the location models was used to compared against the tensor approach. Figure 7 shows the F1 score (multiple testing) of the two approaches for all three datasets. It shows that the tensor approach has better detection accuracies than the one without using tensor, especially for the specimen dataset. Moreover, it is impossible for the damage localization and estimation using the results obtained from each location model. 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0

Tensor model Location model

Building Specimen Datasets

Bridge

Fig. 7: Comparison between tensor and location models.

6

Conclusion

This work presents a damage identification approach using tensor analysis for SHM applications where sensing data were converted to a three-way tensor form. A structural benchmark model was built using one-class SVM on a component matrix in time mode learned from the tensor decomposition. Then new events were updated using a simple least square approach and were tested against the benchmark model to detect damage. Moreover, in our approach damage detection, localization and assessment were achieved in an unsupervised manner. The approach was shown to work very well using data from lab-based structures and real data from the Sydney Harbour Bridge. We can obtain a damage detection

12

Khoa et al.

F1 scores of 0.98 and higher for all the datasets. Damage was localized correctly and different levels of damage severity were well estimated.

References 1. Acar, E., Yener, B.: Unsupervised multiway data analysis: A literature survey. IEEE Transactions on Knowledge and Data Engineering 21(1), 6–20 (2009) 2. Acar, E., Aykut-Bingol, C., Bingol, H., Bro, R., Yener, B.: Multiway analysis of epilepsy tensors. Bioinformatics 23(13), i10–i18 (2007) 3. Andersson, C.A., Bro, R.: The n-way toolbox for {MATLAB}. Chemometrics and Intelligent Laboratory Systems 52(1), 1 – 4 (2000) 4. Bader, B.W., Kolda, T.G., et al.: Matlab tensor toolbox version 2.5. Available online (January 2012), http://www.sandia.gov/~tgkolda/TensorToolbox/ 5. Bro, R., Kiers, H.A.L.: A new efficient method for determining the number of components in parafac models. Journal of Chemometrics 17(5), 274–286 (2003) 6. Chan, T.H., Ni, Y.Q., Ko, J.M.: Neural network novelty filtering for anomaly detection. In: Cheng, F. (ed.) 2nd International Workshop on Structural Health Monitoring. pp. 133–137. Technomic Pub. Co., Standford, USA (1999) 7. Chang, C.C., Lin, C.J.: LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2, 27:1–27:27 (2011) 8. Farrar, C.R., Worden, K.: An introduction to structural health monitoring. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 365(1851), 303–315 (2007) 9. Kolda, T.G., Bader, B.W.: Tensor decompositions and applications. SIAM Review 51(3), 455–500 (September 2009) 10. Kolda, T.G., Sun, J.: Scalable tensor decompositions for multi-aspect data mining. In: ICDM 2008: Proceedings of the 8th IEEE International Conference on Data Mining. pp. 363–372 (December 2008) 11. LANL: Los alamos national laboratory website (2013), http://institute.lanl. gov/ei/software-and-data/, (last visited: 01/06/2013) 12. Liu, W., Chan, J., Bailey, J., Leckie, C., Kotagiri, R.: Utilizing common substructures to speedup tensor factorization for mining dynamic graphs. In: Proceedings of the 21st ACM international conference on Information and knowledge management. pp. 435–444. CIKM ’12, ACM, New York, NY, USA (2012) 13. Prada, M.A., Toivola, J., Kullaa, J., Hollmn, J.: Three-way analysis of structural health monitoring data. Neurocomputing 80(0), 119 – 128 (2012), special Issue on Machine Learning for Signal Processing 2010 14. Rytter, A.: Vibration-based inspection of civil engineering structures. Ph.D. thesis, University of Aalborg, Denmark (1993) 15. Sch¨ olkopf, B., Williamson, R.C., Smola, A.J., Shawe-Taylor, J., Platt, J.C.: Support vector method for novelty detection. In: NIPS. pp. 582–588 (1999) 16. Sun, J., Tao, D., Papadimitriou, S., Yu, P.S., Faloutsos, C.: Incremental tensor analysis: Theory and applications. ACM Trans. Knowl. Discov. Data 2(3), 11:1– 11:37 (Oct 2008) 17. Worden, K., Manson, G., Fieller, N.: Damage detection using outlier analysis. Journal of Sound and Vibration 229(3), 647–667 (2000) 18. Worden, K., Manson, G.: The application of machine learning to structural health monitoring. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 365(1851), 515–537 (2007)

On Damage Identification in Civil Structures Using ...

Damage identification is a key problem in SHM. It is classified by ... cluding chemistry, neuroscience, social network analysis and computer vision [1,. 10]. ... Sun et al. [16] proposed different methods on dynamically updating compo- nent matrices from a Tucker decomposition for online applications like computer network ...

555KB Sizes 0 Downloads 170 Views

Recommend Documents

Uncertainty Identification of Damage Growth ...
updated simultaneously, Bayesian inference becomes computationally expensive due to .... unknown model parameters, it is a computational intensive process ...

Damage Localization Using a Statistical Test on ...
finite element models of a truss and of a plate. Keywords: Ambient vibration; Covariance analysis; Damage localization; Hypothesis testing; Load vectors.

Identification of Equivalent Damage Growth Parameters ...
Annual Conference of the Prognostics and Health Management Society, 2010. 1. Identification of ..... MPa m , Paris Law constant C of 1.5E-10, and an assumed ...

Polony Identification Using the EM Algorithm Based on ...
Wei Li∗, Paul M. Ruegger†, James Borneman† and Tao Jiang∗. ∗Department of ..... stochastic linear system with the em algorithm and its application to.

Notes on the identification of VARs using external ...
Jul 26, 2017 - tool to inspect the underlying drivers of ri,t. One way to .... nent bi,2sb,t in the error term and delivers a consistent estimate of bi1. The estimate,.

Identification of Equivalent Damage Growth Parameters ...
1 University of Florida, Gainesville, FL, 32611, USA [email protected] .... Bayesian updating and least square fit are often used for identifying unknown model ...

Species Identification using MALDIquant - GitHub
Jun 8, 2015 - Contents. 1 Foreword. 3. 2 Other vignettes. 3. 3 Setup. 3. 4 Dataset. 4. 5 Analysis. 4 .... [1] "F10". We collect all spots with a sapply call (to loop over all spectra) and ..... similar way as the top 10 features in the example above.

Character Identification in Movie Using Movie Script - IJRIT
M.Tech Student, Department of Computer Science and Engineering ... Names for the clusters are then manually selected from the cast list. ..... Video and Image processing in multimedia system, Cloud Computing and Biometric systems.

Character Identification in Movie Using Movie Script - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue ..... In this paper, the preserved statistic properties are utilized and a proposal to .... processing in multimedia system, Cloud Computing and Biometric systems.

speaker identification and verification using eigenvoices
approach, in which client and test speaker models are confined to a low-dimensional linear ... 100 client speakers for a high-security application, 60 seconds or more of ..... the development of more robust eigenspace training techniques. 5.

Sparse-parametric writer identification using ...
grated in operational systems: 1) automatic feature extrac- tion from a ... 1This database has been collected with the help of a grant from the. Dutch Forensic ...

Sparse-parametric writer identification using heterogeneous feature ...
Retrieval yielding a hit list, in this case of suspect documents, given a query in the form .... tributed to our data set by each of the two subjects. f6:ЮаЯвбЗbзбйb£ ...

Identification Using Stability Restrictions
algebra and higher computational intensity, due to the increase in the dimen- sion of the parameter space. Alternatively, this assumption can be motivated.

LANGUAGE IDENTIFICATION USING A COMBINED ...
over the baseline system. Finally, the proposed articulatory language. ID system is combined with a PPRLM (parallel phone recognition language model) system ...

Multipath Medium Identification Using Efficient ...
proposed method leads to perfect recovery of the multipath delays from samples of the channel output at the .... We discuss this connection in more detail in the ...

Sparse-parametric writer identification using heterogeneous feature ...
The application domain precludes the use ... Forensic writer search is similar to Information ... simple nearest-neighbour search is a viable so- .... more, given that a vector of ranks will be denoted by ╔, assume the availability of a rank operat

Sparse-parametric writer identification using ...
f3:HrunW, PDF of horizontal run lengths in background pixels Run lengths are determined on the bi- narized image taking into consideration either the black pixels cor- responding to the ink trace width distribution or the white pixels corresponding t

SPEAKER IDENTIFICATION IMPROVEMENT USING ...
Air Force Research Laboratory/IFEC,. 32 Brooks Rd. Rome NY 13441-4514 .... Fifth, the standard error for the percent correct is zero as compared with for all frames condition. Therefore, it can be concluded that using only usable speech improves the

Electromagnetic field identification using artificial neural ... - CiteSeerX
resistive load was used, as the IEC defines. This resistive load (Pellegrini target MD 101) was designed to measure discharge currents by ESD events on the ...

An Empirical Study on Uncertainty Identification in ... - Semantic Scholar
etc.) as information source to produce or derive interpretations based on them. However, existing uncertainty cues are in- effective in social media context because of its specific characteristics. In this pa- per, we propose a .... ity4 which shares

Uncertainty Reduction of Damage Growth Properties Using ... - UFL MAE
prognosis techniques, it is necessary to incorporate the measured data into a damage .... with initial half-crack size ai subjected to fatigue loading with constant ...