SlideShare uma empresa Scribd logo
1 de 40
Baixar para ler offline
Neural networks based techniques for
damage identification of bridges:
a review of recent advances
Sapienza University of Rome – StroNGER s.r.l.
S. Arangio
stefania.arangio@uniroma1.it, stefania.arangio@stronger2012.com
Cagliari, September 5th 2013
2/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Introduction
Part I
Conclusions
Part II
Neural networks and Bayesian enhancements
Outline
Case study:
Bayesian neural networks
for the assessment of the bridge of the ANCRiSST benchmark problem
Soft computing approaches for the structural assessment of bridges
3/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Introduction
Part I
Conclusions
Part II
Neural networks and Bayesian enhancements
Outline
Case study:
Bayesian neural networks
for the assessment of the bridge of the ANCRiSST benchmark problem
Soft computing approaches for the structural assessment of bridges
4/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Methods for structural identification and damage detection
Input – output
techniques
• The structure has to be artificially excited and
in case of large structures it is not always
possible
• The operation of the structure has to be
interrupted
Only output
techniques
• The excitation is given by the ambient
vibration
• Measurements in real operational conditions
• Suitable in case of continuous monitoring
Traditional
methods
Soft computing
methods
• Time domain
approaches
• Frequency
domain
approaches
• Neural
networks
• Genetic
algorithms
• Fuzzy Logic
Introduction
5/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Examples of structural assessment
by using soft computing methods (2008-2013)
Adeli H., Jiang X., Intelligent infrastructures – Neural Networks, wavelets, and Chaos Theory for Intelligent Transportation Systems and
Smart Structures, CRC Press, Taylor & Francis, Boca Raton, Florida, 2009
Al-Rahmani A.H., Rasheed H.A., Najjar A.Y., A combined soft computing-mechanics approach to inversely predict damage in bridges,
Procedia Computer Science, 8, 461 – 466, 2012
Arangio S., Beck J.L. Bayesian neural networks for bridges integrity assessment, Structural Control & Health Monitoring, 2012; 19(1), 3-21.
Arangio S., Bontempi F. Soft Computing based Multilevel Strategy for Bridge Integrity Monitoring, Computer-Aided Civil and Infrastructure
Engineering 2010; 25, 348-362.
Bhattacharyya P., Banerji P., Improved Damage Classification and Detection on a Model Bridge using Fuzzy Neural Networks, 4th
International Conference on Structural Health Monitoring of Intelligent Infrastructure (SHMII-4), 22-24 July 2009, Zurich, Switzerland,
2009.
Cheng J., An artificial neural network based genetic algorithm for estimating the reliability of long span suspension bridges, Finite Elements
in Analysis and Design, 46, 658–667, 2010.
Cheng J., Li Q.S., Reliability analysis of structures using artificial neural network based genetic algorithms, Comput. Methods Appl. Mech.
Engrg., 197, 3742–3750, 2008.
Firouzi A., Rahai A., An integrated ANN-GA for reliability based inspection of concrete bridge decks considering extent of corrosion-induced
cracks and life cycle costs, Scientia Iranica, 19 (4), 974–981, 2012.
Flood I., Towards the next generation of artificial neural networks for civil engineering, Advanced Engineering Informatics 22, 4–14, 2008
Freitag S., Graf W., Kaliske M. Recurrent neural networks for fuzzy data, Integrated Computer-Aided Engineering - Data Mining in
Engineering, 2011; 18(3), 265-280.
Graf W.S., Freitag S., Sickert U., Kaliske M., Structural Analysis with Fuzzy Data and Neural Network Based Material Description,
Computer-Aided Civil and Infrastructure Engineering 27, 640–654, 2012.
Li S., Li H., Liu Y., Lan C., Zhou W., Ou J., SMC structural health monitoring benchmark problem using monitored data from an actual cable-
stayed bridge, Structural Control and Health Monitoring, published online form March 26th 2013, DOI:10.1002/stc.1559
Mehrjoo M., Khaji N., Moharrami H., Bahreininejad A., Damage detection of truss bridge joints using Artificial Neural Networks, Expert
Systems with Applications 35, 1122–1131, 2008.
Park J.H., Kim J.T, Honga D.S., Hoa D.D., Yib J.H., Sequential damage detection approaches for beams using time-modal features and
artificial neural networks, Journal of Sound and Vibration, 323, 451–474, 2009.
Sgambi L., Gkoumas K., Bontempi F. Genetic Algorithms for the Dependability Assurance in the Design of a Long-Span Suspension Bridge,
Computer-Aided Civil and Infrastructure Engineering 2012; 27(9), 655-675.
Tsompanakis Y., Lagaros N.D., Stavroulakis G. Soft computing techniques in parameter identification and probabilistic seismic analysis of
structures, Advances in Engineering Software 2008, 39(7), 612-624.
Wang Y.M., Elhag T.M.S., An adaptive neuro-fuzzy inference system for bridge risk assessment, Expert Systems with Applications 34,
3099–3106, 2008.
Zhou H.F., Ni Y.Q., Ko J.M., Constructing input to neural networks for modeling temperature-caused modal variability: Mean temperatures,
effective temperatures
Introduction
6/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Introduction
Part I
Conclusions
Part II
Neural networks and Bayesian enhancements
Outline
Case study:
Bayesian neural networks
for the assessment of the bridge of the ANCRiSST benchmark problem
Soft computing approaches for the structural assessment of bridges
7/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
PartII
Nonlinear feed-forward basis functions
( ) 







+








+= ∑∑ ==
)2(
0
1
)1(
0
)1(
1
)2(
, k
D
j
jiji
M
j
kjk bbxwgwfy wx
∑=
+=
D
i
jijij bxwa
1
)1(
0
)1(
( )kk afy =
∑=
+=
M
j
kjkjk bzwa
1
)2(
0
)2(
( )jj agz =
NEURAL NETWORK
MODEL
( ) ( )







= ∑=
M
j
jjwfy
1
, xwx φ
output units
hidden units
activations
weights
bias
Neural network model
8/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Traditional learning
t
ij
t
ij
t
ij www ∆+= −
η1
ij
ij
W
E
W
∂
∂
−=∆
η Learning rate
Weights updating
Minimization of a
sum of squares error function
Model fitting is obtained by modifications of the coefficients w
t = correct value
y = network value
( ) 







+








+= ∑∑ ==
)2(
0
1
)1(
0
)1(
1
)2(
, k
D
j
jiji
M
j
kjk bbxwgwfy wx
Gradient descent algorithm [traingd]
Conjugate gradient algorithm [traincg]
Quasi – Newton algorithm [trainbfg]
Levenberg – Marquardt algorithm [trainlm]
( ){ } ∑∑∑
== =
+−=
W
i
i
N
n
oN
t
t
n
t
n wxytE
1
2
1 1
2
2
;
2
1 α
w
9/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Probabilistic interpretation
( ){ } 



−−∝ 2
;
2
exp),,,( ww nn xytMxtp
β
β
1) Probabilistic interpretation
of the network output
2) Probability model
for the prediction error
);( wxyt −=ε
Gaussian µ = 0
σD
2 = 1/β
3) Predictive PDF
The output
approximates the
conditional average of
the target data
hyperparameter
4) Prior PDF
( )






−=
2
2
exp
1
),( w
Z
Mwp
W
α
α
α
Gaussian µ = 0
σw
2 = 1/α
hyperparameter
10/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Network learning as inference
10
=),,( MwDp β
( )
( ){ }








−− ∑∑=
N
n
N
t
n
t
t
n
D
o
xyt
Z 1
2
;
2
exp
1
w
β
β
Likelihood
( ) ( )
( )MDp
MwpMwDp
Dwp
,,
,,,
)M,,,(
βα
αβ
βα =Bayes
theorem
evidence
priorxlikelihood
posterior =
( ) ( ){ } ∑∑∑ ==
+−=
W
i
i
N
n
N
t
n
t
t
n wxytwE
o
1
2
1
2
2
;
2
αβ
w
( ) ( ){ }∑∑=
−=−
N
n
N
t
n
t
t
n
o
xytMwDp
1
2
;
2
,,log w
β
β
( ) ∑=
=−
W
i
iwMwp
1
2
2
,log
α
α
max (posterior) = min (negative log posterior)
=− )M,,,(log βαDwp ( ) ( )=−− MwpMwDp ,log,,log αβ
( )






−=
2
2
exp
1
),( w
Z
Mwp
W
α
α
α
Prior
( )Mwp
( )MDwp ,
( )
( )
( ){ }








−−= ∑∑=
N
n
N
t
n
t
t
n
D
o
xyt
Z
MwDp
1
2
;
2
exp
1
,, w
β
β
β
( )






−=
2
2
exp
1
),( w
Z
Mwp
W
α
α
α
( ){ }∑ ∑ ∑= =
+−
=−
N
n
N
t
W
i
i
n
t
t
n
o
wxyt
Dwp
1 1
2
2
;
2
),,,(log
αβ
βα
w
M
DATA PRE- PROCESSING
OUTPUT
NETWORK ARCHITECTURE
n°INPUT
n°UNIT IN THE HIDDEN LAYERS
POSTERIOR: BAYES’ THEOREM
( ) ( )
( )MDp
MwpMwDp
Dwp
,,
,,,
),,,(
βα
αβ
βα =M
w = wMAP?
yes
INFERENCE OF NEW DATA
DATA POST PROCESSING
PROBABILISTIC MODEL
• NOISE MODEL
• PREDICTIVE PDF
• LIKELIHOOD
• PRIOR
),,,( Mxtp βw
( )MwDp ,, β
),( Mwp α
OPTIMIZATION
(MINIMUM OF )),,,(log MβαDwp−
no
INPUT
ED EW
( )Mwp
( )MDwp ,
1) Model fitting
12/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Bayesian techniques for neural networks
• Level 1 Model fitting: inferring the model parameters given the
model and the data
• Level 2 Optimization of the hyperparameters α and β
• Level 3 Model class selection: optimal model complexity
• Level 4 Automatic relevance determination (ARD):
evaluation of the relative importance of different inputs
Network learning as inference (model fitting) is only one level in
which Bayesian inference can be applied in the neural network
field
Hierarchical multi-level approach
PartI
POSTERIOR FOR α, β
TRAINING: OPTIMIZATION
w = wMAP?
?( ) ( )DMEVDMEV ii 1−>
INFERENCE OF NEW DATA
CHOOSE MODEL Mi-1
?
POSTERIOR FOR Mi
α, β = αMP, βMP
DATA PRE- PROCESSING
OUTPUT
NETWORK MODEL Mi
N HIDDEN = i
N INPUT = k
POSTERIOR FOR w
yes
DATA POST PROCESSING
PROBABILISTIC MODEL
no
INPUT
CHOOSE INITIAL α, β
INITIALIZE WEIGHTS w
RE-ESTIMATION OF α, β
yes
no
Wγ ≈
yes
no
i= i+1
is α1,…,αk
‘very large’?
k= k-1
yes
no
( ) ( )
( )MDp
MwpMwDp
Dwp
,,
,,,
),,,(
βα
αβ
βα =M
1st level
Model fitting
POSTERIOR FOR α, β
TRAINING: OPTIMIZATION
w = wMAP?
?( ) ( )DMEVDMEV ii 1−>
INFERENCE OF NEW DATA
CHOOSE MODEL Mi-1
?
POSTERIOR FOR Mi
α, β = αMP, βMP
DATA PRE- PROCESSING
OUTPUT
NETWORK MODEL Mi
N HIDDEN = i
N INPUT = k
POSTERIOR FOR w
yes
DATA POST PROCESSING
PROBABILISTIC MODEL
no
INPUT
CHOOSE INITIAL α, β
INITIALIZE WEIGHTS w
RE-ESTIMATION OF α, β
yes
no
Wγ ≈
yes
no
i= i+1
is α1,…,αk
‘very large’?
k= k-1
yes
no
( ) ( )
( )MDp
MwpMwDp
Dwp
,,
,,,
),,,(
βα
αβ
βα =M
1st level
Model fitting
2nd level
Evaluating the hyperparameters α, β
( ) ( )
( )MDp
MpMDp
Dp
βαβα
βα
,,,
),,( =M
15/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Issues in neural network design: selection of the optimal model
RULES OF THUMBS
-…between the input layer size and the output
layer size (Blum, 1992)
- (Software Neuroshell, 2000)
- (Berry and Lynoff, 1997)
- n = dimension needed to capture 70-80% of the
variance
(Boger and Guterman, 1997)
OPTIMAL NUMBER OF UNITS
(“OCKHAM’S RAZOR”)
)(
3
2
oI NNn +=
INn ⋅<2
examplesNn ⋅<
30
1
They aren’t rigorous methods
INPUT
LAYER
OUTPUT
LAYER
HIDDEN
LAYERS
PartI
POSTERIOR FOR α, β
TRAINING: OPTIMIZATION
w = wMAP?
?( ) ( )DMEVDMEV ii 1−>
INFERENCE OF NEW DATA
CHOOSE MODEL Mi-1
?
POSTERIOR FOR Mi
α, β = αMP, βMP
DATA PRE- PROCESSING
OUTPUT
NETWORK MODEL Mi
N HIDDEN = i
N INPUT = k
POSTERIOR FOR w
yes
DATA POST PROCESSING
PROBABILISTIC MODEL
no
INPUT
CHOOSE INITIAL α, β
INITIALIZE WEIGHTS w
RE-ESTIMATION OF α, β
yes
n
o
Wγ ≈
yes
no
i= i+1
is α1,…,αk
‘very large’?
k= k-1
yes
no
( ) ( )
( )MDp
MwpMwDp
Dwp
,,
,,,
),,,(
βα
αβ
βα =M
1st level
Model fitting
2nd level
Evaluating the hyperparameters α, β
3rd level
Model class selection
( ) ( )MpMDpDMp ∝)(
prior = constantevidence
( ) ( )
( )MDp
MpMDp
Dp
βαβα
βα
,,,
),,( =M
POSTERIOR FOR α, β
TRAINING: OPTIMIZATION
w = wMAP?
?( ) ( )DMEVDMEV ii 1−>
INFERENCE OF NEW DATA
CHOOSE MODEL Mi-1
?
POSTERIOR FOR Mi
α, β = αMP, βMP
DATA PRE- PROCESSING
OUTPUT
NETWORK MODEL Mi
N HIDDEN = i
N INPUT = k
POSTERIOR FOR w
yes
DATA POST PROCESSING
PROBABILISTIC MODEL
no
INPUT
CHOOSE INITIAL α, β
INITIALIZE WEIGHTS w
RE-ESTIMATION OF α, β
yes
n
o
Wγ ≈
yes
no
i= i+1
is α1,…,αk
‘very large’?
k= k-1
yes
no
( ) ( )
( )MDp
MwpMwDp
Dwp
,,
,,,
),,,(
βα
αβ
βα =M
1st level
Model fitting
2nd level
Evaluating the hyperparameters α, β
3rd level
Model class selection
( ) ( )MpMDpDMp ∝)(
prior = constantevidence
is α1,…,αk
‘very large’?
4th level
Automatic Relevance Determination
( ) ( )
( )MDp
MpMDp
Dp
βαβα
βα
,,,
),,( =M
18/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Introduction
Part I
Conclusions
Part II
Neural networks and Bayesian enhancements
Outline
Case study:
Bayesian neural networks
for the assessment of the bridge of the ANCRiSST benchmark problem
Soft computing approaches for the structural assessment of bridges
19/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
The ANCRiSST benchmark problem
• Consortium of 20 research institutions
• Established in 2002 with the purpose of:
• assessing current progresses on smart materials and structures technology
• Developing synergies that facilitate joint research projects that cannot easily carried
out by individual centers
In October 2011 they opened for
researchers in the SHM community a
benchmark problem based on a real
bridge: the TianjinYonghe bridge
http://smc.hit.edu.cn/
PartII
20/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Description of the Tianjin Yonghe bridge
Tianjin Hangu
25.15 99.85 260 99.85 25.15
• Cable-stayed bridge
• Opened to traffic since December 1987
• After 19 years of operation damages were detected and the bridge was
retrofitted
• A sophisticated SHM system has been designed and implemented by the
Research Center of Structural Health Monitoring and Control of the Harbin
Institute of Technology
PartII
21/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Structural Health Monitoring System
Tianjin Hangu
2515 5600 5885 5900 5600 5600 5900 5885 5600 2515
1 (3) 2 (4) 3 (5) 7 (9) 9 (10) 11 (12) 13 (14)
Uniaxial/biaxial accelerometers
Hygrothermograph
Anemometer
1, 3, 5, 7, 9 11, 13 2, 4, 6, 8, 10, 12, 14
During 2008:
• Continuous monitoring system
• 14 uniaxial accelerometers on the bridge deck (downward and upward)
• On the top of the tower: 1 biaxial accelerometer; 1 anemometer; 1 temperature
sensor
downward and upward
PartII
22/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
damaged area
Damage situation 1
Cracks at the closure segment
at both side spans
August 2008:
2 damages are detected
PartII
23/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Damage situation 2
Damaged piers
PartII
24/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Available data set
Health condition Damaged condition
• Time histories of the accelerations
recorded at the 14 deck sensors
on January 1st and January 17th 2008
(registrations of 1 h carried out for 24 h )
• Environmental information
(wind, temperature)
• Biaxial accelerations at the top of the
tower
• Time histories of the accelerations
recorded at the same 14 deck sensors
on July 30th 2008
(registrations of 1 h carried out for 24 h)
• Accelerations collected by field testing
August 7th to 10th 2008 (not used)
PartII
25/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
PartII Procedure for neural network training
time history of the
acceleration recorded at
sensor #
Structural system
Ambient excitation
1+−dtf 2−tf tf1−tf 1+tfTraining of the neural
network model in
undamaged condition
2+tf
Test of the trained neural
network model on a new time
history
26/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
PartII Neural network based damage detection strategy
14 groups of networks have been created
(one for each measurement point e one for each hour of measurements)
14 (points) x24 (hours) = 336 neural network models
Tianjin Hangu
1 (3) 2 (4) 3 (5) 7 (9) 9 (10) 11 (12) 13 (14)
accelerometers
27/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
PartII Detection of anomalies
If ∆e ≈ 0
the structure is considered as undamaged
If ∆e is large an anomaly is detected
28/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
PartII
Damaged area
Error in the approximation of the accelerations in the undamaged sections
Training Undamaged
Damage detection
Tianjin Hangu
29/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
PartII Bayesian model class selection
The most plausible class can be obtained applying Bayes’ Theorem:
( ) ( )( , ) |j jj
p M D p D M p M∝M M
prior = cost
evidence
provided by D
The various model can be compared by evaluating their evidence






−
+





+−−
γγ
α
N
E MP
W
2
ln
2
12
ln
2
1
ln
2
1
A
++++− jjMP
MP
D HH
N
E ln2!lnln
2
ββ( )=iMDpln
Data fit term
Penalizing term
“Ockham factor”
30/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
PartII Bayesian model class selection
The chosen model has 3 hidden units
Model 1 2 3 4 5
N parameters 7 13 19 25 31
gamma 2,00 3,03 4,02 5,00 6,00
MP
j
MP
D
MP
j
β
N
Eβ ln
2
+− 20770 22682 25078 22153 23500
( ) MP
j
MP
j
HH ln2!ln + 2,08 3,99 5,95 8,01 10,16
data fit term 20772 22686 25084 22161 23510
MP
j
MP
W
MP
j
α
W
Eα ln
2
ln
2
1
++− A -13,08 -79,32 -158 -213 -266






−
+





γNγ
2
ln
2
12
ln
2
1
-3,31 -3,51 -3,66 -3,8 -3,86
penalizing term -16 -83 -162 -217 -270
log evidence 20756 22603 24922 21944 23240
31/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
PartII
BAYESIANMODELSELECTION
32/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
PartII Error in the approximation of the undamaged conditions
downriver
upriver
∆e at the various locations
Data for training: January 1st 2008 (H1 to H24)
Data for testing: January 17th 2008 (H1 to H24)
Undamaged conditions
33/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
PartII Error in the approximation of the damaged conditions
∆e at the various locations
Data for training: January 1st 2008 (H1 to H24)
Data for testing: July 30th 2008 (H1 to H24
Damaged conditions!
34/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
PartII Difference of the errors
The difference of error in the approximation suggests the presence of structural
anomalies around sensor #10
35/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Validation of the results: Structural assessment by applying
the Enhanced Frequency Domain Decomposition
• Data collection and signal preprocessing
• Construction of the the Power Spectral
Density matrix (PSD)
• Whelch averaged modified periodgram method
• 50 % overlapping and periodic Hamming windowing
• Singular Value Decomposition (SVD) of the PSD
• Identification of modal frequencies and mode shapes
• Evaluation of the damping
PartII
36/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
0
0,2
0,4
0,6
0 0,5 1 1,5 2 2,5 3
H6
H11
H15
H17
H19
H21
SingularValues(health)
f [Hz]
0
0,1
0,2
0,3
0 0,5 1 1,5 2
AverageSingularValues(health)
f [Hz]
EFDD: Singular Values DecompositionPartII
0
0,5
1
1,5
2
0 0,5 1 1,5 2
AverageSingularValues(damaged)
f [Hz]
0
0,5
1
1,5
2
0 0,5 1 1,5 2 2,5 3
H6
H9
H12
H15
H18
H20
H22
H23
H24
Undamaged conditions Damaged conditions
Average Singular values Average Singular values
37/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Comparison of the mode shapesPartII
The decrease of the frequencies suggests the presence of damage
f=0.4075 Hz
FEM (“AS BUILT” CONDITION)
FEM Mode 1 - f=0.452 Hz FEM Mode 2 - f=0.632 Hz FEM Mode 3 - f=0.937 Hz
Mode 1 - Mode 2 - f=0.594 Hz Mode 3 - f=0.896 Hz
Mode 1 - f=0.262 Hz Mode 2 - f=0.388 Hz Mode 3 - f=0.664 Hz
UNDAMAGED CONDITION
DAMAGED CONDITION
38/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Introduction
Part I
Conclusions
Part II
The ANCRIiST benchmark problem
Description of the bridge and available monitoring data
Outline
Neural network based damage detection strategy
Results
39/39PartIPartIIConclusionsIntroduction
NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES:
A REVIEW OF RECENT ADVANCES
S. Arangio
Conclusions
Soft computing approaches, like the neural networks model, have
proven to be effective for dealing with large quantities of data and,
recently, have been widely used for the structural assessment of Civil
structures and infrastructures.
Neural networks can be significantly improved by applying Bayesian
inference at different levels in a hierarchical way:
Bayesian Neural Networks (BNN)
The BNNs have been applied for processing the monitoring data
coming from the bridge of the ANCRiSST SHM benchmark problem
and have shown to be able to detect the presence of an anomaly.
The current work is focused on the development of methods for the
localization of the detected damage
Conclusions
POSTERIOR FOR α, β
TRAINING: OPTIMIZATION
w = wMAP?
?( ) ( )DMEVDMEV ii 1−>
INFERENCE OF NEW DATA
CHOOSE MODEL Mi-1
?
POSTERIOR FOR Mi
α, β = αMP, βMP
DATA PRE- PROCESSING
OUTPUT
NETWORK MODEL Mi
N HIDDEN = i
N INPUT = k
POSTERIOR FOR w
yes
DATA POST PROCESSING
PROBABILISTIC MODEL
no
INPUT
CHOOSE INITIAL α, β
INITIALIZE WEIGHTS w
RE-ESTIMATION OF α, β
yes
n
o
Wγ ≈
yes
no
i= i+1
is α1,…,αk
‘very large’?
k= k-1
yes
no
email: stefania.arangio@uniroma1.it
stefania.arangio@stronger2012.com
Prof. Bontempi and his research team www.francobontempi.org of
Sapienza University of Rome are gratefully acknowledged.
This research was partially supported by StroNGER s.r.l. from the
fund “FILAS - POR FESR LAZIO 2007/2013 - Support for the
research spin off”.

Mais conteúdo relacionado

Mais procurados

IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane ExtractionIRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane ExtractionIRJET Journal
 
Emerging 3D Scanning Technologies for PropTech
Emerging 3D Scanning Technologies for PropTechEmerging 3D Scanning Technologies for PropTech
Emerging 3D Scanning Technologies for PropTechPetteriTeikariPhD
 
Overview of computer vision and machine learning
Overview of computer vision and machine learningOverview of computer vision and machine learning
Overview of computer vision and machine learningsmckeever
 
A new multiple classifiers soft decisions fusion approach for exons predictio...
A new multiple classifiers soft decisions fusion approach for exons predictio...A new multiple classifiers soft decisions fusion approach for exons predictio...
A new multiple classifiers soft decisions fusion approach for exons predictio...Ismail M. El-Badawy
 
Kate Storrs - Closing the loop between biological and artificial vision - Cre...
Kate Storrs - Closing the loop between biological and artificial vision - Cre...Kate Storrs - Closing the loop between biological and artificial vision - Cre...
Kate Storrs - Closing the loop between biological and artificial vision - Cre...Luba Elliott
 
Hierarchical structure adaptive
Hierarchical structure adaptiveHierarchical structure adaptive
Hierarchical structure adaptiveNEERAJ BAGHEL
 
Research Training Group METRIK
Research Training Group METRIKResearch Training Group METRIK
Research Training Group METRIKMarkus Scheidgen
 
Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)PetteriTeikariPhD
 
184816386 x mining
184816386 x mining184816386 x mining
184816386 x mining496573
 
Bhadale group of companies ai neural networks and algorithms catalogue
Bhadale group of companies ai neural networks and algorithms catalogueBhadale group of companies ai neural networks and algorithms catalogue
Bhadale group of companies ai neural networks and algorithms catalogueVijayananda Mohire
 
Shallow introduction for Deep Learning Retinal Image Analysis
Shallow introduction for Deep Learning Retinal Image AnalysisShallow introduction for Deep Learning Retinal Image Analysis
Shallow introduction for Deep Learning Retinal Image AnalysisPetteriTeikariPhD
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Undergraduate Thesis Presentation
Undergraduate Thesis PresentationUndergraduate Thesis Presentation
Undergraduate Thesis Presentationgiamuhammad
 
Dario izzo - Machine Learning methods and space engineering
Dario izzo - Machine Learning methods and space engineeringDario izzo - Machine Learning methods and space engineering
Dario izzo - Machine Learning methods and space engineeringAdvanced-Concepts-Team
 
IRJET - Object Detection using Deep Learning with OpenCV and Python
IRJET - Object Detection using Deep Learning with OpenCV and PythonIRJET - Object Detection using Deep Learning with OpenCV and Python
IRJET - Object Detection using Deep Learning with OpenCV and PythonIRJET Journal
 

Mais procurados (16)

IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane ExtractionIRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
 
Emerging 3D Scanning Technologies for PropTech
Emerging 3D Scanning Technologies for PropTechEmerging 3D Scanning Technologies for PropTech
Emerging 3D Scanning Technologies for PropTech
 
Overview of computer vision and machine learning
Overview of computer vision and machine learningOverview of computer vision and machine learning
Overview of computer vision and machine learning
 
L026070074
L026070074L026070074
L026070074
 
A new multiple classifiers soft decisions fusion approach for exons predictio...
A new multiple classifiers soft decisions fusion approach for exons predictio...A new multiple classifiers soft decisions fusion approach for exons predictio...
A new multiple classifiers soft decisions fusion approach for exons predictio...
 
Kate Storrs - Closing the loop between biological and artificial vision - Cre...
Kate Storrs - Closing the loop between biological and artificial vision - Cre...Kate Storrs - Closing the loop between biological and artificial vision - Cre...
Kate Storrs - Closing the loop between biological and artificial vision - Cre...
 
Hierarchical structure adaptive
Hierarchical structure adaptiveHierarchical structure adaptive
Hierarchical structure adaptive
 
Research Training Group METRIK
Research Training Group METRIKResearch Training Group METRIK
Research Training Group METRIK
 
Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)
 
184816386 x mining
184816386 x mining184816386 x mining
184816386 x mining
 
Bhadale group of companies ai neural networks and algorithms catalogue
Bhadale group of companies ai neural networks and algorithms catalogueBhadale group of companies ai neural networks and algorithms catalogue
Bhadale group of companies ai neural networks and algorithms catalogue
 
Shallow introduction for Deep Learning Retinal Image Analysis
Shallow introduction for Deep Learning Retinal Image AnalysisShallow introduction for Deep Learning Retinal Image Analysis
Shallow introduction for Deep Learning Retinal Image Analysis
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Undergraduate Thesis Presentation
Undergraduate Thesis PresentationUndergraduate Thesis Presentation
Undergraduate Thesis Presentation
 
Dario izzo - Machine Learning methods and space engineering
Dario izzo - Machine Learning methods and space engineeringDario izzo - Machine Learning methods and space engineering
Dario izzo - Machine Learning methods and space engineering
 
IRJET - Object Detection using Deep Learning with OpenCV and Python
IRJET - Object Detection using Deep Learning with OpenCV and PythonIRJET - Object Detection using Deep Learning with OpenCV and Python
IRJET - Object Detection using Deep Learning with OpenCV and Python
 

Destaque

Blood glucose prediction
Blood glucose predictionBlood glucose prediction
Blood glucose predictionRAVI KANT
 
10,00 Modelling and analysis of geophysical data using geostatistics and mach...
10,00 Modelling and analysis of geophysical data using geostatistics and mach...10,00 Modelling and analysis of geophysical data using geostatistics and mach...
10,00 Modelling and analysis of geophysical data using geostatistics and mach...Beniamino Murgante
 
REHABILITATION AND PREVENTION.
REHABILITATION AND PREVENTION.REHABILITATION AND PREVENTION.
REHABILITATION AND PREVENTION.jksofy
 
TALAT Lecture 2701: Bridge Deck
TALAT Lecture 2701: Bridge DeckTALAT Lecture 2701: Bridge Deck
TALAT Lecture 2701: Bridge DeckCORE-Materials
 
VALUTAZIONI CRITICHE DEI MODELLI NUMERICI E DEI RISULTATI
VALUTAZIONI CRITICHE DEI MODELLI NUMERICI E DEI RISULTATIVALUTAZIONI CRITICHE DEI MODELLI NUMERICI E DEI RISULTATI
VALUTAZIONI CRITICHE DEI MODELLI NUMERICI E DEI RISULTATIStroNGER2012
 
ANALISI STRUTTURALE DI PONTI E DI OPERE COMPLESSE DI INGEGNERIA CIVILE
ANALISI STRUTTURALE DI PONTI E DI OPERE COMPLESSE DI INGEGNERIA CIVILEANALISI STRUTTURALE DI PONTI E DI OPERE COMPLESSE DI INGEGNERIA CIVILE
ANALISI STRUTTURALE DI PONTI E DI OPERE COMPLESSE DI INGEGNERIA CIVILEFranco Bontempi Org Didattica
 
61Resilienza dei centri urbani e rilievo delle costruzioni: un binomio indivi...
61Resilienza dei centri urbani e rilievo delle costruzioni: un binomio indivi...61Resilienza dei centri urbani e rilievo delle costruzioni: un binomio indivi...
61Resilienza dei centri urbani e rilievo delle costruzioni: un binomio indivi...StroNGER2012
 
INFRASTRUTTURE IN AMBITO URBANO: COMPLESSITA’ DI PROGETTO E DURABILITA’
INFRASTRUTTURE IN AMBITO URBANO: COMPLESSITA’ DI PROGETTO E DURABILITA’INFRASTRUTTURE IN AMBITO URBANO: COMPLESSITA’ DI PROGETTO E DURABILITA’
INFRASTRUTTURE IN AMBITO URBANO: COMPLESSITA’ DI PROGETTO E DURABILITA’StroNGER2012
 
I Restauri e la Città: l’esempio del Colosseo e della Casa di Augusto
I Restauri e la Città: l’esempio del Colosseo e della Casa di AugustoI Restauri e la Città: l’esempio del Colosseo e della Casa di Augusto
I Restauri e la Città: l’esempio del Colosseo e della Casa di AugustoStroNGER2012
 
Hambly bridge deck behaviour
Hambly bridge deck behaviourHambly bridge deck behaviour
Hambly bridge deck behaviourRoy Belton
 
Corso di dottorato & Corso di formazione
Corso di dottorato & Corso di formazione Corso di dottorato & Corso di formazione
Corso di dottorato & Corso di formazione StroNGER2012
 
20141202 the evaluation method for concrete decks using gpr(rhee) ss
20141202 the evaluation method for concrete decks using gpr(rhee) ss20141202 the evaluation method for concrete decks using gpr(rhee) ss
20141202 the evaluation method for concrete decks using gpr(rhee) ssKorea Expressway Corporation
 
SISTEMILA RETE STRADALE URBANA:UN’EMERGENZA DEL QUOTIDIANO O UN’OPPORTUNITA’ ...
SISTEMILA RETE STRADALE URBANA:UN’EMERGENZA DEL QUOTIDIANO O UN’OPPORTUNITA’ ...SISTEMILA RETE STRADALE URBANA:UN’EMERGENZA DEL QUOTIDIANO O UN’OPPORTUNITA’ ...
SISTEMILA RETE STRADALE URBANA:UN’EMERGENZA DEL QUOTIDIANO O UN’OPPORTUNITA’ ...StroNGER2012
 
Ispezione dei Ponti. Indagini mirate a particolari critici ai fini della sicu...
Ispezione dei Ponti. Indagini mirate a particolari critici ai fini della sicu...Ispezione dei Ponti. Indagini mirate a particolari critici ai fini della sicu...
Ispezione dei Ponti. Indagini mirate a particolari critici ai fini della sicu...Franco Bontempi
 
Applications of Artificial Neural Networks in Civil Engineering
Applications of Artificial Neural Networks in Civil EngineeringApplications of Artificial Neural Networks in Civil Engineering
Applications of Artificial Neural Networks in Civil EngineeringPramey Zode
 

Destaque (16)

Blood glucose prediction
Blood glucose predictionBlood glucose prediction
Blood glucose prediction
 
10,00 Modelling and analysis of geophysical data using geostatistics and mach...
10,00 Modelling and analysis of geophysical data using geostatistics and mach...10,00 Modelling and analysis of geophysical data using geostatistics and mach...
10,00 Modelling and analysis of geophysical data using geostatistics and mach...
 
REHABILITATION AND PREVENTION.
REHABILITATION AND PREVENTION.REHABILITATION AND PREVENTION.
REHABILITATION AND PREVENTION.
 
CALCESTRUZZO STRUTTURALE - CA e CAP secondo l'Eurocodice 2
CALCESTRUZZO STRUTTURALE - CA e CAP secondo l'Eurocodice 2CALCESTRUZZO STRUTTURALE - CA e CAP secondo l'Eurocodice 2
CALCESTRUZZO STRUTTURALE - CA e CAP secondo l'Eurocodice 2
 
TALAT Lecture 2701: Bridge Deck
TALAT Lecture 2701: Bridge DeckTALAT Lecture 2701: Bridge Deck
TALAT Lecture 2701: Bridge Deck
 
VALUTAZIONI CRITICHE DEI MODELLI NUMERICI E DEI RISULTATI
VALUTAZIONI CRITICHE DEI MODELLI NUMERICI E DEI RISULTATIVALUTAZIONI CRITICHE DEI MODELLI NUMERICI E DEI RISULTATI
VALUTAZIONI CRITICHE DEI MODELLI NUMERICI E DEI RISULTATI
 
ANALISI STRUTTURALE DI PONTI E DI OPERE COMPLESSE DI INGEGNERIA CIVILE
ANALISI STRUTTURALE DI PONTI E DI OPERE COMPLESSE DI INGEGNERIA CIVILEANALISI STRUTTURALE DI PONTI E DI OPERE COMPLESSE DI INGEGNERIA CIVILE
ANALISI STRUTTURALE DI PONTI E DI OPERE COMPLESSE DI INGEGNERIA CIVILE
 
61Resilienza dei centri urbani e rilievo delle costruzioni: un binomio indivi...
61Resilienza dei centri urbani e rilievo delle costruzioni: un binomio indivi...61Resilienza dei centri urbani e rilievo delle costruzioni: un binomio indivi...
61Resilienza dei centri urbani e rilievo delle costruzioni: un binomio indivi...
 
INFRASTRUTTURE IN AMBITO URBANO: COMPLESSITA’ DI PROGETTO E DURABILITA’
INFRASTRUTTURE IN AMBITO URBANO: COMPLESSITA’ DI PROGETTO E DURABILITA’INFRASTRUTTURE IN AMBITO URBANO: COMPLESSITA’ DI PROGETTO E DURABILITA’
INFRASTRUTTURE IN AMBITO URBANO: COMPLESSITA’ DI PROGETTO E DURABILITA’
 
I Restauri e la Città: l’esempio del Colosseo e della Casa di Augusto
I Restauri e la Città: l’esempio del Colosseo e della Casa di AugustoI Restauri e la Città: l’esempio del Colosseo e della Casa di Augusto
I Restauri e la Città: l’esempio del Colosseo e della Casa di Augusto
 
Hambly bridge deck behaviour
Hambly bridge deck behaviourHambly bridge deck behaviour
Hambly bridge deck behaviour
 
Corso di dottorato & Corso di formazione
Corso di dottorato & Corso di formazione Corso di dottorato & Corso di formazione
Corso di dottorato & Corso di formazione
 
20141202 the evaluation method for concrete decks using gpr(rhee) ss
20141202 the evaluation method for concrete decks using gpr(rhee) ss20141202 the evaluation method for concrete decks using gpr(rhee) ss
20141202 the evaluation method for concrete decks using gpr(rhee) ss
 
SISTEMILA RETE STRADALE URBANA:UN’EMERGENZA DEL QUOTIDIANO O UN’OPPORTUNITA’ ...
SISTEMILA RETE STRADALE URBANA:UN’EMERGENZA DEL QUOTIDIANO O UN’OPPORTUNITA’ ...SISTEMILA RETE STRADALE URBANA:UN’EMERGENZA DEL QUOTIDIANO O UN’OPPORTUNITA’ ...
SISTEMILA RETE STRADALE URBANA:UN’EMERGENZA DEL QUOTIDIANO O UN’OPPORTUNITA’ ...
 
Ispezione dei Ponti. Indagini mirate a particolari critici ai fini della sicu...
Ispezione dei Ponti. Indagini mirate a particolari critici ai fini della sicu...Ispezione dei Ponti. Indagini mirate a particolari critici ai fini della sicu...
Ispezione dei Ponti. Indagini mirate a particolari critici ai fini della sicu...
 
Applications of Artificial Neural Networks in Civil Engineering
Applications of Artificial Neural Networks in Civil EngineeringApplications of Artificial Neural Networks in Civil Engineering
Applications of Artificial Neural Networks in Civil Engineering
 

Semelhante a Neural Networks and Bayesian Techniques for Damage Identification of Bridges

2013 icossar sa_sm_fb_upload
2013 icossar sa_sm_fb_upload2013 icossar sa_sm_fb_upload
2013 icossar sa_sm_fb_uploadStroNGER2012
 
Applied mathematics
Applied mathematicsApplied mathematics
Applied mathematicsVisionary_
 
Application of Artificial Neural Networking for Determining the Plane of Vibr...
Application of Artificial Neural Networking for Determining the Plane of Vibr...Application of Artificial Neural Networking for Determining the Plane of Vibr...
Application of Artificial Neural Networking for Determining the Plane of Vibr...IOSRJMCE
 
NS2 ieee 2017 project titles | Final Year IEEE 2018 Network Simulator Projects
NS2 ieee 2017 project titles | Final Year IEEE 2018 Network Simulator ProjectsNS2 ieee 2017 project titles | Final Year IEEE 2018 Network Simulator Projects
NS2 ieee 2017 project titles | Final Year IEEE 2018 Network Simulator ProjectsJAYAPRAKASH JPINFOTECH
 
2017 ieee ns2 project titles | Latest Final Year ieee network Simulator Proje...
2017 ieee ns2 project titles | Latest Final Year ieee network Simulator Proje...2017 ieee ns2 project titles | Latest Final Year ieee network Simulator Proje...
2017 ieee ns2 project titles | Latest Final Year ieee network Simulator Proje...JPINFOTECH JAYAPRAKASH
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksIffat Anjum
 
Development of a EEG-Based Biometric Authentication & Security System
Development of a EEG-Based Biometric Authentication &  Security SystemDevelopment of a EEG-Based Biometric Authentication &  Security System
Development of a EEG-Based Biometric Authentication & Security SystemMd. Mahmudul Hasan Mubin
 
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...sipij
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
IEEE Projects for CSE
IEEE Projects for CSEIEEE Projects for CSE
IEEE Projects for CSETechsparks
 
Resume Song Chen 2016
Resume Song Chen 2016Resume Song Chen 2016
Resume Song Chen 2016Song Chen
 
Reservoir computing fast deep learning for sequences
Reservoir computing   fast deep learning for sequencesReservoir computing   fast deep learning for sequences
Reservoir computing fast deep learning for sequencesClaudio Gallicchio
 
Novel conservative reversible error control circuits based on molecular QCA
Novel conservative reversible error control circuits based on molecular QCANovel conservative reversible error control circuits based on molecular QCA
Novel conservative reversible error control circuits based on molecular QCAVIT-AP University
 
PhilipSamDavisResume
PhilipSamDavisResumePhilipSamDavisResume
PhilipSamDavisResumePhilip Davis
 
PhD Projects in Network Engineering Research Topics
PhD Projects in Network Engineering Research TopicsPhD Projects in Network Engineering Research Topics
PhD Projects in Network Engineering Research TopicsPhD Services
 
5b50dc69-4ca7-41ee-a9dd-b4e8b220b4fe.pdf
5b50dc69-4ca7-41ee-a9dd-b4e8b220b4fe.pdf5b50dc69-4ca7-41ee-a9dd-b4e8b220b4fe.pdf
5b50dc69-4ca7-41ee-a9dd-b4e8b220b4fe.pdfSrinidhirkGowda
 
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehnabati
 
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...ijsrd.com
 
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...ijsrd.com
 

Semelhante a Neural Networks and Bayesian Techniques for Damage Identification of Bridges (20)

2013 icossar sa_sm_fb_upload
2013 icossar sa_sm_fb_upload2013 icossar sa_sm_fb_upload
2013 icossar sa_sm_fb_upload
 
Applied mathematics
Applied mathematicsApplied mathematics
Applied mathematics
 
Application of Artificial Neural Networking for Determining the Plane of Vibr...
Application of Artificial Neural Networking for Determining the Plane of Vibr...Application of Artificial Neural Networking for Determining the Plane of Vibr...
Application of Artificial Neural Networking for Determining the Plane of Vibr...
 
NS2 ieee 2017 project titles | Final Year IEEE 2018 Network Simulator Projects
NS2 ieee 2017 project titles | Final Year IEEE 2018 Network Simulator ProjectsNS2 ieee 2017 project titles | Final Year IEEE 2018 Network Simulator Projects
NS2 ieee 2017 project titles | Final Year IEEE 2018 Network Simulator Projects
 
2017 ieee ns2 project titles | Latest Final Year ieee network Simulator Proje...
2017 ieee ns2 project titles | Latest Final Year ieee network Simulator Proje...2017 ieee ns2 project titles | Latest Final Year ieee network Simulator Proje...
2017 ieee ns2 project titles | Latest Final Year ieee network Simulator Proje...
 
Anuj 21PCE039.pptx
Anuj 21PCE039.pptxAnuj 21PCE039.pptx
Anuj 21PCE039.pptx
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networks
 
Development of a EEG-Based Biometric Authentication & Security System
Development of a EEG-Based Biometric Authentication &  Security SystemDevelopment of a EEG-Based Biometric Authentication &  Security System
Development of a EEG-Based Biometric Authentication & Security System
 
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
IEEE Projects for CSE
IEEE Projects for CSEIEEE Projects for CSE
IEEE Projects for CSE
 
Resume Song Chen 2016
Resume Song Chen 2016Resume Song Chen 2016
Resume Song Chen 2016
 
Reservoir computing fast deep learning for sequences
Reservoir computing   fast deep learning for sequencesReservoir computing   fast deep learning for sequences
Reservoir computing fast deep learning for sequences
 
Novel conservative reversible error control circuits based on molecular QCA
Novel conservative reversible error control circuits based on molecular QCANovel conservative reversible error control circuits based on molecular QCA
Novel conservative reversible error control circuits based on molecular QCA
 
PhilipSamDavisResume
PhilipSamDavisResumePhilipSamDavisResume
PhilipSamDavisResume
 
PhD Projects in Network Engineering Research Topics
PhD Projects in Network Engineering Research TopicsPhD Projects in Network Engineering Research Topics
PhD Projects in Network Engineering Research Topics
 
5b50dc69-4ca7-41ee-a9dd-b4e8b220b4fe.pdf
5b50dc69-4ca7-41ee-a9dd-b4e8b220b4fe.pdf5b50dc69-4ca7-41ee-a9dd-b4e8b220b4fe.pdf
5b50dc69-4ca7-41ee-a9dd-b4e8b220b4fe.pdf
 
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
 
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
 
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
 

Mais de StroNGER2012

Roma e le sue acque:il punto di vista della Protezione Civile
Roma e le sue acque:il punto di vista della Protezione CivileRoma e le sue acque:il punto di vista della Protezione Civile
Roma e le sue acque:il punto di vista della Protezione CivileStroNGER2012
 
Una visione ampia dei sistemi: robustezza e resilienza.
Una visione ampia dei sistemi: robustezza e resilienza.Una visione ampia dei sistemi: robustezza e resilienza.
Una visione ampia dei sistemi: robustezza e resilienza.StroNGER2012
 
L’investigazione antincendio sugli aspetti strutturali: una proposta di codifica
L’investigazione antincendio sugli aspetti strutturali: una proposta di codificaL’investigazione antincendio sugli aspetti strutturali: una proposta di codifica
L’investigazione antincendio sugli aspetti strutturali: una proposta di codificaStroNGER2012
 
Progetto e analisi di ospedali come costruzioni strategiche: visione di siste...
Progetto e analisi di ospedali come costruzioni strategiche: visione di siste...Progetto e analisi di ospedali come costruzioni strategiche: visione di siste...
Progetto e analisi di ospedali come costruzioni strategiche: visione di siste...StroNGER2012
 
norme tecniche di prevenzione incendi
norme tecniche di prevenzione incendinorme tecniche di prevenzione incendi
norme tecniche di prevenzione incendiStroNGER2012
 
Arangio sapienza-may2015
Arangio sapienza-may2015Arangio sapienza-may2015
Arangio sapienza-may2015StroNGER2012
 
Petrini sapienza-may2015
Petrini sapienza-may2015Petrini sapienza-may2015
Petrini sapienza-may2015StroNGER2012
 
Erdogmus sapienza-may2015
Erdogmus sapienza-may2015Erdogmus sapienza-may2015
Erdogmus sapienza-may2015StroNGER2012
 
Avila sapienza-may2015
Avila sapienza-may2015Avila sapienza-may2015
Avila sapienza-may2015StroNGER2012
 
Uso delle fibre di basalto nel risanamento degli edifici storici
Uso delle fibre di basalto nel risanamento degli edifici storiciUso delle fibre di basalto nel risanamento degli edifici storici
Uso delle fibre di basalto nel risanamento degli edifici storiciStroNGER2012
 
Programma IF CRASC 15
Programma IF CRASC 15Programma IF CRASC 15
Programma IF CRASC 15StroNGER2012
 
IDENTIFICAZIONE STRUTTURALE DEL COMPORTAMENTO SPERIMENTALE DI CENTINE INNOVAT...
IDENTIFICAZIONE STRUTTURALE DEL COMPORTAMENTO SPERIMENTALE DI CENTINE INNOVAT...IDENTIFICAZIONE STRUTTURALE DEL COMPORTAMENTO SPERIMENTALE DI CENTINE INNOVAT...
IDENTIFICAZIONE STRUTTURALE DEL COMPORTAMENTO SPERIMENTALE DI CENTINE INNOVAT...StroNGER2012
 
IF CRASC'15 summary
IF CRASC'15 summaryIF CRASC'15 summary
IF CRASC'15 summaryStroNGER2012
 
Corso Ottimizzazione Strutturale Sapienza 2015
Corso Ottimizzazione Strutturale Sapienza 2015Corso Ottimizzazione Strutturale Sapienza 2015
Corso Ottimizzazione Strutturale Sapienza 2015StroNGER2012
 
MIGLIORAMENTO ED ADEGUAMENTO SISMICO DI STRUTTURE ESISTENTI ATTRAVERSO L’UTIL...
MIGLIORAMENTO ED ADEGUAMENTO SISMICO DI STRUTTURE ESISTENTI ATTRAVERSO L’UTIL...MIGLIORAMENTO ED ADEGUAMENTO SISMICO DI STRUTTURE ESISTENTI ATTRAVERSO L’UTIL...
MIGLIORAMENTO ED ADEGUAMENTO SISMICO DI STRUTTURE ESISTENTI ATTRAVERSO L’UTIL...StroNGER2012
 
Analisi strutturale dei meccanismi di collasso di barriere stradali tipo New-...
Analisi strutturale dei meccanismi di collasso di barriere stradali tipo New-...Analisi strutturale dei meccanismi di collasso di barriere stradali tipo New-...
Analisi strutturale dei meccanismi di collasso di barriere stradali tipo New-...StroNGER2012
 
Design Knowledge Gain by Structural Health Monitoring
Design Knowledge Gain by Structural Health MonitoringDesign Knowledge Gain by Structural Health Monitoring
Design Knowledge Gain by Structural Health MonitoringStroNGER2012
 
2° WORKSHOP GRUPPO ITALIANO IABMAS - IABMAS ITALIAN GROUP
2° WORKSHOP GRUPPO ITALIANO IABMAS - IABMAS ITALIAN GROUP2° WORKSHOP GRUPPO ITALIANO IABMAS - IABMAS ITALIAN GROUP
2° WORKSHOP GRUPPO ITALIANO IABMAS - IABMAS ITALIAN GROUPStroNGER2012
 
VULNERABILITA’ DELLE COSTRUZIONI AI FENOMENI GEOLOGICI E IDROGEOLOGICI Parte II
VULNERABILITA’ DELLE COSTRUZIONI AI FENOMENI GEOLOGICI E IDROGEOLOGICI Parte IIVULNERABILITA’ DELLE COSTRUZIONI AI FENOMENI GEOLOGICI E IDROGEOLOGICI Parte II
VULNERABILITA’ DELLE COSTRUZIONI AI FENOMENI GEOLOGICI E IDROGEOLOGICI Parte IIStroNGER2012
 

Mais de StroNGER2012 (20)

Roma e le sue acque:il punto di vista della Protezione Civile
Roma e le sue acque:il punto di vista della Protezione CivileRoma e le sue acque:il punto di vista della Protezione Civile
Roma e le sue acque:il punto di vista della Protezione Civile
 
Una visione ampia dei sistemi: robustezza e resilienza.
Una visione ampia dei sistemi: robustezza e resilienza.Una visione ampia dei sistemi: robustezza e resilienza.
Una visione ampia dei sistemi: robustezza e resilienza.
 
L’investigazione antincendio sugli aspetti strutturali: una proposta di codifica
L’investigazione antincendio sugli aspetti strutturali: una proposta di codificaL’investigazione antincendio sugli aspetti strutturali: una proposta di codifica
L’investigazione antincendio sugli aspetti strutturali: una proposta di codifica
 
Progetto e analisi di ospedali come costruzioni strategiche: visione di siste...
Progetto e analisi di ospedali come costruzioni strategiche: visione di siste...Progetto e analisi di ospedali come costruzioni strategiche: visione di siste...
Progetto e analisi di ospedali come costruzioni strategiche: visione di siste...
 
norme tecniche di prevenzione incendi
norme tecniche di prevenzione incendinorme tecniche di prevenzione incendi
norme tecniche di prevenzione incendi
 
Arangio sapienza-may2015
Arangio sapienza-may2015Arangio sapienza-may2015
Arangio sapienza-may2015
 
Petrini sapienza-may2015
Petrini sapienza-may2015Petrini sapienza-may2015
Petrini sapienza-may2015
 
Erdogmus sapienza-may2015
Erdogmus sapienza-may2015Erdogmus sapienza-may2015
Erdogmus sapienza-may2015
 
Avila sapienza-may2015
Avila sapienza-may2015Avila sapienza-may2015
Avila sapienza-may2015
 
Uso delle fibre di basalto nel risanamento degli edifici storici
Uso delle fibre di basalto nel risanamento degli edifici storiciUso delle fibre di basalto nel risanamento degli edifici storici
Uso delle fibre di basalto nel risanamento degli edifici storici
 
Programma IF CRASC 15
Programma IF CRASC 15Programma IF CRASC 15
Programma IF CRASC 15
 
IDENTIFICAZIONE STRUTTURALE DEL COMPORTAMENTO SPERIMENTALE DI CENTINE INNOVAT...
IDENTIFICAZIONE STRUTTURALE DEL COMPORTAMENTO SPERIMENTALE DI CENTINE INNOVAT...IDENTIFICAZIONE STRUTTURALE DEL COMPORTAMENTO SPERIMENTALE DI CENTINE INNOVAT...
IDENTIFICAZIONE STRUTTURALE DEL COMPORTAMENTO SPERIMENTALE DI CENTINE INNOVAT...
 
IF CRASC'15 summary
IF CRASC'15 summaryIF CRASC'15 summary
IF CRASC'15 summary
 
Corso Ottimizzazione Strutturale Sapienza 2015
Corso Ottimizzazione Strutturale Sapienza 2015Corso Ottimizzazione Strutturale Sapienza 2015
Corso Ottimizzazione Strutturale Sapienza 2015
 
MIGLIORAMENTO ED ADEGUAMENTO SISMICO DI STRUTTURE ESISTENTI ATTRAVERSO L’UTIL...
MIGLIORAMENTO ED ADEGUAMENTO SISMICO DI STRUTTURE ESISTENTI ATTRAVERSO L’UTIL...MIGLIORAMENTO ED ADEGUAMENTO SISMICO DI STRUTTURE ESISTENTI ATTRAVERSO L’UTIL...
MIGLIORAMENTO ED ADEGUAMENTO SISMICO DI STRUTTURE ESISTENTI ATTRAVERSO L’UTIL...
 
Analisi strutturale dei meccanismi di collasso di barriere stradali tipo New-...
Analisi strutturale dei meccanismi di collasso di barriere stradali tipo New-...Analisi strutturale dei meccanismi di collasso di barriere stradali tipo New-...
Analisi strutturale dei meccanismi di collasso di barriere stradali tipo New-...
 
Design Knowledge Gain by Structural Health Monitoring
Design Knowledge Gain by Structural Health MonitoringDesign Knowledge Gain by Structural Health Monitoring
Design Knowledge Gain by Structural Health Monitoring
 
2° WORKSHOP GRUPPO ITALIANO IABMAS - IABMAS ITALIAN GROUP
2° WORKSHOP GRUPPO ITALIANO IABMAS - IABMAS ITALIAN GROUP2° WORKSHOP GRUPPO ITALIANO IABMAS - IABMAS ITALIAN GROUP
2° WORKSHOP GRUPPO ITALIANO IABMAS - IABMAS ITALIAN GROUP
 
Two years 2
Two years 2Two years 2
Two years 2
 
VULNERABILITA’ DELLE COSTRUZIONI AI FENOMENI GEOLOGICI E IDROGEOLOGICI Parte II
VULNERABILITA’ DELLE COSTRUZIONI AI FENOMENI GEOLOGICI E IDROGEOLOGICI Parte IIVULNERABILITA’ DELLE COSTRUZIONI AI FENOMENI GEOLOGICI E IDROGEOLOGICI Parte II
VULNERABILITA’ DELLE COSTRUZIONI AI FENOMENI GEOLOGICI E IDROGEOLOGICI Parte II
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Neural Networks and Bayesian Techniques for Damage Identification of Bridges

  • 1. Neural networks based techniques for damage identification of bridges: a review of recent advances Sapienza University of Rome – StroNGER s.r.l. S. Arangio stefania.arangio@uniroma1.it, stefania.arangio@stronger2012.com Cagliari, September 5th 2013
  • 2. 2/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Introduction Part I Conclusions Part II Neural networks and Bayesian enhancements Outline Case study: Bayesian neural networks for the assessment of the bridge of the ANCRiSST benchmark problem Soft computing approaches for the structural assessment of bridges
  • 3. 3/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Introduction Part I Conclusions Part II Neural networks and Bayesian enhancements Outline Case study: Bayesian neural networks for the assessment of the bridge of the ANCRiSST benchmark problem Soft computing approaches for the structural assessment of bridges
  • 4. 4/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Methods for structural identification and damage detection Input – output techniques • The structure has to be artificially excited and in case of large structures it is not always possible • The operation of the structure has to be interrupted Only output techniques • The excitation is given by the ambient vibration • Measurements in real operational conditions • Suitable in case of continuous monitoring Traditional methods Soft computing methods • Time domain approaches • Frequency domain approaches • Neural networks • Genetic algorithms • Fuzzy Logic Introduction
  • 5. 5/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Examples of structural assessment by using soft computing methods (2008-2013) Adeli H., Jiang X., Intelligent infrastructures – Neural Networks, wavelets, and Chaos Theory for Intelligent Transportation Systems and Smart Structures, CRC Press, Taylor & Francis, Boca Raton, Florida, 2009 Al-Rahmani A.H., Rasheed H.A., Najjar A.Y., A combined soft computing-mechanics approach to inversely predict damage in bridges, Procedia Computer Science, 8, 461 – 466, 2012 Arangio S., Beck J.L. Bayesian neural networks for bridges integrity assessment, Structural Control & Health Monitoring, 2012; 19(1), 3-21. Arangio S., Bontempi F. Soft Computing based Multilevel Strategy for Bridge Integrity Monitoring, Computer-Aided Civil and Infrastructure Engineering 2010; 25, 348-362. Bhattacharyya P., Banerji P., Improved Damage Classification and Detection on a Model Bridge using Fuzzy Neural Networks, 4th International Conference on Structural Health Monitoring of Intelligent Infrastructure (SHMII-4), 22-24 July 2009, Zurich, Switzerland, 2009. Cheng J., An artificial neural network based genetic algorithm for estimating the reliability of long span suspension bridges, Finite Elements in Analysis and Design, 46, 658–667, 2010. Cheng J., Li Q.S., Reliability analysis of structures using artificial neural network based genetic algorithms, Comput. Methods Appl. Mech. Engrg., 197, 3742–3750, 2008. Firouzi A., Rahai A., An integrated ANN-GA for reliability based inspection of concrete bridge decks considering extent of corrosion-induced cracks and life cycle costs, Scientia Iranica, 19 (4), 974–981, 2012. Flood I., Towards the next generation of artificial neural networks for civil engineering, Advanced Engineering Informatics 22, 4–14, 2008 Freitag S., Graf W., Kaliske M. Recurrent neural networks for fuzzy data, Integrated Computer-Aided Engineering - Data Mining in Engineering, 2011; 18(3), 265-280. Graf W.S., Freitag S., Sickert U., Kaliske M., Structural Analysis with Fuzzy Data and Neural Network Based Material Description, Computer-Aided Civil and Infrastructure Engineering 27, 640–654, 2012. Li S., Li H., Liu Y., Lan C., Zhou W., Ou J., SMC structural health monitoring benchmark problem using monitored data from an actual cable- stayed bridge, Structural Control and Health Monitoring, published online form March 26th 2013, DOI:10.1002/stc.1559 Mehrjoo M., Khaji N., Moharrami H., Bahreininejad A., Damage detection of truss bridge joints using Artificial Neural Networks, Expert Systems with Applications 35, 1122–1131, 2008. Park J.H., Kim J.T, Honga D.S., Hoa D.D., Yib J.H., Sequential damage detection approaches for beams using time-modal features and artificial neural networks, Journal of Sound and Vibration, 323, 451–474, 2009. Sgambi L., Gkoumas K., Bontempi F. Genetic Algorithms for the Dependability Assurance in the Design of a Long-Span Suspension Bridge, Computer-Aided Civil and Infrastructure Engineering 2012; 27(9), 655-675. Tsompanakis Y., Lagaros N.D., Stavroulakis G. Soft computing techniques in parameter identification and probabilistic seismic analysis of structures, Advances in Engineering Software 2008, 39(7), 612-624. Wang Y.M., Elhag T.M.S., An adaptive neuro-fuzzy inference system for bridge risk assessment, Expert Systems with Applications 34, 3099–3106, 2008. Zhou H.F., Ni Y.Q., Ko J.M., Constructing input to neural networks for modeling temperature-caused modal variability: Mean temperatures, effective temperatures Introduction
  • 6. 6/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Introduction Part I Conclusions Part II Neural networks and Bayesian enhancements Outline Case study: Bayesian neural networks for the assessment of the bridge of the ANCRiSST benchmark problem Soft computing approaches for the structural assessment of bridges
  • 7. 7/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio PartII Nonlinear feed-forward basis functions ( )         +         += ∑∑ == )2( 0 1 )1( 0 )1( 1 )2( , k D j jiji M j kjk bbxwgwfy wx ∑= += D i jijij bxwa 1 )1( 0 )1( ( )kk afy = ∑= += M j kjkjk bzwa 1 )2( 0 )2( ( )jj agz = NEURAL NETWORK MODEL ( ) ( )        = ∑= M j jjwfy 1 , xwx φ output units hidden units activations weights bias Neural network model
  • 8. 8/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Traditional learning t ij t ij t ij www ∆+= − η1 ij ij W E W ∂ ∂ −=∆ η Learning rate Weights updating Minimization of a sum of squares error function Model fitting is obtained by modifications of the coefficients w t = correct value y = network value ( )         +         += ∑∑ == )2( 0 1 )1( 0 )1( 1 )2( , k D j jiji M j kjk bbxwgwfy wx Gradient descent algorithm [traingd] Conjugate gradient algorithm [traincg] Quasi – Newton algorithm [trainbfg] Levenberg – Marquardt algorithm [trainlm] ( ){ } ∑∑∑ == = +−= W i i N n oN t t n t n wxytE 1 2 1 1 2 2 ; 2 1 α w
  • 9. 9/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Probabilistic interpretation ( ){ }     −−∝ 2 ; 2 exp),,,( ww nn xytMxtp β β 1) Probabilistic interpretation of the network output 2) Probability model for the prediction error );( wxyt −=ε Gaussian µ = 0 σD 2 = 1/β 3) Predictive PDF The output approximates the conditional average of the target data hyperparameter 4) Prior PDF ( )       −= 2 2 exp 1 ),( w Z Mwp W α α α Gaussian µ = 0 σw 2 = 1/α hyperparameter
  • 10. 10/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Network learning as inference 10 =),,( MwDp β ( ) ( ){ }         −− ∑∑= N n N t n t t n D o xyt Z 1 2 ; 2 exp 1 w β β Likelihood ( ) ( ) ( )MDp MwpMwDp Dwp ,, ,,, )M,,,( βα αβ βα =Bayes theorem evidence priorxlikelihood posterior = ( ) ( ){ } ∑∑∑ == +−= W i i N n N t n t t n wxytwE o 1 2 1 2 2 ; 2 αβ w ( ) ( ){ }∑∑= −=− N n N t n t t n o xytMwDp 1 2 ; 2 ,,log w β β ( ) ∑= =− W i iwMwp 1 2 2 ,log α α max (posterior) = min (negative log posterior) =− )M,,,(log βαDwp ( ) ( )=−− MwpMwDp ,log,,log αβ ( )       −= 2 2 exp 1 ),( w Z Mwp W α α α Prior ( )Mwp ( )MDwp ,
  • 11. ( ) ( ) ( ){ }         −−= ∑∑= N n N t n t t n D o xyt Z MwDp 1 2 ; 2 exp 1 ,, w β β β ( )       −= 2 2 exp 1 ),( w Z Mwp W α α α ( ){ }∑ ∑ ∑= = +− =− N n N t W i i n t t n o wxyt Dwp 1 1 2 2 ; 2 ),,,(log αβ βα w M DATA PRE- PROCESSING OUTPUT NETWORK ARCHITECTURE n°INPUT n°UNIT IN THE HIDDEN LAYERS POSTERIOR: BAYES’ THEOREM ( ) ( ) ( )MDp MwpMwDp Dwp ,, ,,, ),,,( βα αβ βα =M w = wMAP? yes INFERENCE OF NEW DATA DATA POST PROCESSING PROBABILISTIC MODEL • NOISE MODEL • PREDICTIVE PDF • LIKELIHOOD • PRIOR ),,,( Mxtp βw ( )MwDp ,, β ),( Mwp α OPTIMIZATION (MINIMUM OF )),,,(log MβαDwp− no INPUT ED EW ( )Mwp ( )MDwp , 1) Model fitting
  • 12. 12/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Bayesian techniques for neural networks • Level 1 Model fitting: inferring the model parameters given the model and the data • Level 2 Optimization of the hyperparameters α and β • Level 3 Model class selection: optimal model complexity • Level 4 Automatic relevance determination (ARD): evaluation of the relative importance of different inputs Network learning as inference (model fitting) is only one level in which Bayesian inference can be applied in the neural network field Hierarchical multi-level approach PartI
  • 13. POSTERIOR FOR α, β TRAINING: OPTIMIZATION w = wMAP? ?( ) ( )DMEVDMEV ii 1−> INFERENCE OF NEW DATA CHOOSE MODEL Mi-1 ? POSTERIOR FOR Mi α, β = αMP, βMP DATA PRE- PROCESSING OUTPUT NETWORK MODEL Mi N HIDDEN = i N INPUT = k POSTERIOR FOR w yes DATA POST PROCESSING PROBABILISTIC MODEL no INPUT CHOOSE INITIAL α, β INITIALIZE WEIGHTS w RE-ESTIMATION OF α, β yes no Wγ ≈ yes no i= i+1 is α1,…,αk ‘very large’? k= k-1 yes no ( ) ( ) ( )MDp MwpMwDp Dwp ,, ,,, ),,,( βα αβ βα =M 1st level Model fitting
  • 14. POSTERIOR FOR α, β TRAINING: OPTIMIZATION w = wMAP? ?( ) ( )DMEVDMEV ii 1−> INFERENCE OF NEW DATA CHOOSE MODEL Mi-1 ? POSTERIOR FOR Mi α, β = αMP, βMP DATA PRE- PROCESSING OUTPUT NETWORK MODEL Mi N HIDDEN = i N INPUT = k POSTERIOR FOR w yes DATA POST PROCESSING PROBABILISTIC MODEL no INPUT CHOOSE INITIAL α, β INITIALIZE WEIGHTS w RE-ESTIMATION OF α, β yes no Wγ ≈ yes no i= i+1 is α1,…,αk ‘very large’? k= k-1 yes no ( ) ( ) ( )MDp MwpMwDp Dwp ,, ,,, ),,,( βα αβ βα =M 1st level Model fitting 2nd level Evaluating the hyperparameters α, β ( ) ( ) ( )MDp MpMDp Dp βαβα βα ,,, ),,( =M
  • 15. 15/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Issues in neural network design: selection of the optimal model RULES OF THUMBS -…between the input layer size and the output layer size (Blum, 1992) - (Software Neuroshell, 2000) - (Berry and Lynoff, 1997) - n = dimension needed to capture 70-80% of the variance (Boger and Guterman, 1997) OPTIMAL NUMBER OF UNITS (“OCKHAM’S RAZOR”) )( 3 2 oI NNn += INn ⋅<2 examplesNn ⋅< 30 1 They aren’t rigorous methods INPUT LAYER OUTPUT LAYER HIDDEN LAYERS PartI
  • 16. POSTERIOR FOR α, β TRAINING: OPTIMIZATION w = wMAP? ?( ) ( )DMEVDMEV ii 1−> INFERENCE OF NEW DATA CHOOSE MODEL Mi-1 ? POSTERIOR FOR Mi α, β = αMP, βMP DATA PRE- PROCESSING OUTPUT NETWORK MODEL Mi N HIDDEN = i N INPUT = k POSTERIOR FOR w yes DATA POST PROCESSING PROBABILISTIC MODEL no INPUT CHOOSE INITIAL α, β INITIALIZE WEIGHTS w RE-ESTIMATION OF α, β yes n o Wγ ≈ yes no i= i+1 is α1,…,αk ‘very large’? k= k-1 yes no ( ) ( ) ( )MDp MwpMwDp Dwp ,, ,,, ),,,( βα αβ βα =M 1st level Model fitting 2nd level Evaluating the hyperparameters α, β 3rd level Model class selection ( ) ( )MpMDpDMp ∝)( prior = constantevidence ( ) ( ) ( )MDp MpMDp Dp βαβα βα ,,, ),,( =M
  • 17. POSTERIOR FOR α, β TRAINING: OPTIMIZATION w = wMAP? ?( ) ( )DMEVDMEV ii 1−> INFERENCE OF NEW DATA CHOOSE MODEL Mi-1 ? POSTERIOR FOR Mi α, β = αMP, βMP DATA PRE- PROCESSING OUTPUT NETWORK MODEL Mi N HIDDEN = i N INPUT = k POSTERIOR FOR w yes DATA POST PROCESSING PROBABILISTIC MODEL no INPUT CHOOSE INITIAL α, β INITIALIZE WEIGHTS w RE-ESTIMATION OF α, β yes n o Wγ ≈ yes no i= i+1 is α1,…,αk ‘very large’? k= k-1 yes no ( ) ( ) ( )MDp MwpMwDp Dwp ,, ,,, ),,,( βα αβ βα =M 1st level Model fitting 2nd level Evaluating the hyperparameters α, β 3rd level Model class selection ( ) ( )MpMDpDMp ∝)( prior = constantevidence is α1,…,αk ‘very large’? 4th level Automatic Relevance Determination ( ) ( ) ( )MDp MpMDp Dp βαβα βα ,,, ),,( =M
  • 18. 18/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Introduction Part I Conclusions Part II Neural networks and Bayesian enhancements Outline Case study: Bayesian neural networks for the assessment of the bridge of the ANCRiSST benchmark problem Soft computing approaches for the structural assessment of bridges
  • 19. 19/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio The ANCRiSST benchmark problem • Consortium of 20 research institutions • Established in 2002 with the purpose of: • assessing current progresses on smart materials and structures technology • Developing synergies that facilitate joint research projects that cannot easily carried out by individual centers In October 2011 they opened for researchers in the SHM community a benchmark problem based on a real bridge: the TianjinYonghe bridge http://smc.hit.edu.cn/ PartII
  • 20. 20/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Description of the Tianjin Yonghe bridge Tianjin Hangu 25.15 99.85 260 99.85 25.15 • Cable-stayed bridge • Opened to traffic since December 1987 • After 19 years of operation damages were detected and the bridge was retrofitted • A sophisticated SHM system has been designed and implemented by the Research Center of Structural Health Monitoring and Control of the Harbin Institute of Technology PartII
  • 21. 21/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Structural Health Monitoring System Tianjin Hangu 2515 5600 5885 5900 5600 5600 5900 5885 5600 2515 1 (3) 2 (4) 3 (5) 7 (9) 9 (10) 11 (12) 13 (14) Uniaxial/biaxial accelerometers Hygrothermograph Anemometer 1, 3, 5, 7, 9 11, 13 2, 4, 6, 8, 10, 12, 14 During 2008: • Continuous monitoring system • 14 uniaxial accelerometers on the bridge deck (downward and upward) • On the top of the tower: 1 biaxial accelerometer; 1 anemometer; 1 temperature sensor downward and upward PartII
  • 22. 22/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio damaged area Damage situation 1 Cracks at the closure segment at both side spans August 2008: 2 damages are detected PartII
  • 23. 23/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Damage situation 2 Damaged piers PartII
  • 24. 24/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Available data set Health condition Damaged condition • Time histories of the accelerations recorded at the 14 deck sensors on January 1st and January 17th 2008 (registrations of 1 h carried out for 24 h ) • Environmental information (wind, temperature) • Biaxial accelerations at the top of the tower • Time histories of the accelerations recorded at the same 14 deck sensors on July 30th 2008 (registrations of 1 h carried out for 24 h) • Accelerations collected by field testing August 7th to 10th 2008 (not used) PartII
  • 25. 25/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio PartII Procedure for neural network training time history of the acceleration recorded at sensor # Structural system Ambient excitation 1+−dtf 2−tf tf1−tf 1+tfTraining of the neural network model in undamaged condition 2+tf Test of the trained neural network model on a new time history
  • 26. 26/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio PartII Neural network based damage detection strategy 14 groups of networks have been created (one for each measurement point e one for each hour of measurements) 14 (points) x24 (hours) = 336 neural network models Tianjin Hangu 1 (3) 2 (4) 3 (5) 7 (9) 9 (10) 11 (12) 13 (14) accelerometers
  • 27. 27/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio PartII Detection of anomalies If ∆e ≈ 0 the structure is considered as undamaged If ∆e is large an anomaly is detected
  • 28. 28/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio PartII Damaged area Error in the approximation of the accelerations in the undamaged sections Training Undamaged Damage detection Tianjin Hangu
  • 29. 29/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio PartII Bayesian model class selection The most plausible class can be obtained applying Bayes’ Theorem: ( ) ( )( , ) |j jj p M D p D M p M∝M M prior = cost evidence provided by D The various model can be compared by evaluating their evidence       − +      +−− γγ α N E MP W 2 ln 2 12 ln 2 1 ln 2 1 A ++++− jjMP MP D HH N E ln2!lnln 2 ββ( )=iMDpln Data fit term Penalizing term “Ockham factor”
  • 30. 30/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio PartII Bayesian model class selection The chosen model has 3 hidden units Model 1 2 3 4 5 N parameters 7 13 19 25 31 gamma 2,00 3,03 4,02 5,00 6,00 MP j MP D MP j β N Eβ ln 2 +− 20770 22682 25078 22153 23500 ( ) MP j MP j HH ln2!ln + 2,08 3,99 5,95 8,01 10,16 data fit term 20772 22686 25084 22161 23510 MP j MP W MP j α W Eα ln 2 ln 2 1 ++− A -13,08 -79,32 -158 -213 -266       − +      γNγ 2 ln 2 12 ln 2 1 -3,31 -3,51 -3,66 -3,8 -3,86 penalizing term -16 -83 -162 -217 -270 log evidence 20756 22603 24922 21944 23240
  • 31. 31/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio PartII BAYESIANMODELSELECTION
  • 32. 32/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio PartII Error in the approximation of the undamaged conditions downriver upriver ∆e at the various locations Data for training: January 1st 2008 (H1 to H24) Data for testing: January 17th 2008 (H1 to H24) Undamaged conditions
  • 33. 33/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio PartII Error in the approximation of the damaged conditions ∆e at the various locations Data for training: January 1st 2008 (H1 to H24) Data for testing: July 30th 2008 (H1 to H24 Damaged conditions!
  • 34. 34/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio PartII Difference of the errors The difference of error in the approximation suggests the presence of structural anomalies around sensor #10
  • 35. 35/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Validation of the results: Structural assessment by applying the Enhanced Frequency Domain Decomposition • Data collection and signal preprocessing • Construction of the the Power Spectral Density matrix (PSD) • Whelch averaged modified periodgram method • 50 % overlapping and periodic Hamming windowing • Singular Value Decomposition (SVD) of the PSD • Identification of modal frequencies and mode shapes • Evaluation of the damping PartII
  • 36. 36/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio 0 0,2 0,4 0,6 0 0,5 1 1,5 2 2,5 3 H6 H11 H15 H17 H19 H21 SingularValues(health) f [Hz] 0 0,1 0,2 0,3 0 0,5 1 1,5 2 AverageSingularValues(health) f [Hz] EFDD: Singular Values DecompositionPartII 0 0,5 1 1,5 2 0 0,5 1 1,5 2 AverageSingularValues(damaged) f [Hz] 0 0,5 1 1,5 2 0 0,5 1 1,5 2 2,5 3 H6 H9 H12 H15 H18 H20 H22 H23 H24 Undamaged conditions Damaged conditions Average Singular values Average Singular values
  • 37. 37/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Comparison of the mode shapesPartII The decrease of the frequencies suggests the presence of damage f=0.4075 Hz FEM (“AS BUILT” CONDITION) FEM Mode 1 - f=0.452 Hz FEM Mode 2 - f=0.632 Hz FEM Mode 3 - f=0.937 Hz Mode 1 - Mode 2 - f=0.594 Hz Mode 3 - f=0.896 Hz Mode 1 - f=0.262 Hz Mode 2 - f=0.388 Hz Mode 3 - f=0.664 Hz UNDAMAGED CONDITION DAMAGED CONDITION
  • 38. 38/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Introduction Part I Conclusions Part II The ANCRIiST benchmark problem Description of the bridge and available monitoring data Outline Neural network based damage detection strategy Results
  • 39. 39/39PartIPartIIConclusionsIntroduction NEURAL NETWORKS BASED TECHNIQUES FOR DAMAGE IDENTIFICATION OF BRIDGES: A REVIEW OF RECENT ADVANCES S. Arangio Conclusions Soft computing approaches, like the neural networks model, have proven to be effective for dealing with large quantities of data and, recently, have been widely used for the structural assessment of Civil structures and infrastructures. Neural networks can be significantly improved by applying Bayesian inference at different levels in a hierarchical way: Bayesian Neural Networks (BNN) The BNNs have been applied for processing the monitoring data coming from the bridge of the ANCRiSST SHM benchmark problem and have shown to be able to detect the presence of an anomaly. The current work is focused on the development of methods for the localization of the detected damage Conclusions
  • 40. POSTERIOR FOR α, β TRAINING: OPTIMIZATION w = wMAP? ?( ) ( )DMEVDMEV ii 1−> INFERENCE OF NEW DATA CHOOSE MODEL Mi-1 ? POSTERIOR FOR Mi α, β = αMP, βMP DATA PRE- PROCESSING OUTPUT NETWORK MODEL Mi N HIDDEN = i N INPUT = k POSTERIOR FOR w yes DATA POST PROCESSING PROBABILISTIC MODEL no INPUT CHOOSE INITIAL α, β INITIALIZE WEIGHTS w RE-ESTIMATION OF α, β yes n o Wγ ≈ yes no i= i+1 is α1,…,αk ‘very large’? k= k-1 yes no email: stefania.arangio@uniroma1.it stefania.arangio@stronger2012.com Prof. Bontempi and his research team www.francobontempi.org of Sapienza University of Rome are gratefully acknowledged. This research was partially supported by StroNGER s.r.l. from the fund “FILAS - POR FESR LAZIO 2007/2013 - Support for the research spin off”.