885
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Bayesian damage identification of simply supported beams from elastostatic data

, &
Pages 2895-2922 | Received 14 Feb 2021, Accepted 21 Jun 2021, Published online: 29 Jul 2021

Abstract

This paper considers a statistical method for damage identification of simply-supported elastic beams from static data. The problem is cast as an inverse problem and analyzed in Bayesian inversion framework. The main goal is to obtain a probabilistic model for the spatial distribution of the damage across a beam given limited and noisy data on the static beam response. A principal distinction of the proposed method is its ability to identify not only an estimate of the damage occurred to the beam but also the uncertainty (error) associated with such an estimate. Moreover, the proposed method uses simple static data instead of dynamic or spectral data, unlike the majority of research work published in the literature. This is a challenge as static data is a rather limited source of information about the underlying physical system compared to dynamic data. Finally, the proposed method does not involves any computationally expensive high-dimensional integration algorithms unlike the existing methods. According to the numerical analysis conducted in this paper, the result obtained by using the proposed damage identification method lies within one standard deviation interval.

2010 Mathematics Subject Classifications:

1. Introduction

Modeling and analysis of elastic deformation [Citation1] has led to many challenging problems in computational elasticity since the advent of modern computing. In general, there are two different classes of computational elasticity problems: forward and inverse problems [Citation2,Citation3]. In forward problems, the mechanical parameters characterizing the continuum body along with all the external variables including the external force and boundary conditions are given but the deformation is unknown. In inverse problems [Citation4], the unknown includes some mechanical parameters or external variables while the deformation and the other parameters and variables are partially known or measured. When the unknown is the external force applied to the body, the relevant inverse problem is a force reconstruction problem [Citation5–13]. When the unknown relates to the boundary conditions of the problem, the problem is a boundary value identification problem, also known as the inverse boundary problem [Citation14]. When the unknown includes some parameters related to the mechanical or geometrical characteristics of the body, the problem is a coefficient identification problem [Citation15–21].

Usually, a force reconstruction problem can be studied as a de-convolution problem [Citation22,Citation23]; which is a common problem in the theory of inverse problems. However, a coefficient identification problem is rather more complicated. An important subgroup of coefficient identification problems is usually referred to as the damage identification problems [Citation24–30]. In this paper, we consider a damage identification problem for simply-supported elastic beams when the damage affects the mechanical properties of (a subdomain of) the body.

An approach to classify damage identification problems in computational elasticity is based on the characteristics of the deformation occurred to the continuum body of interest. Both dynamic and static damage identification problems are based on the fact that dynamic or static characteristics of the deformation are directly related to the mechanical properties of the underlying physical system; therefore, a change in these characteristics may indicate a possible damage [Citation31–33]. When the deformation is vibrational, the given data usually includes either a vector-valued time series relating to the vibrational deformation of the body or modal characteristics of the vibration such as natural frequencies and mode shapes. In this case, the damage identification problem is a dynamic problem [Citation5,Citation34–40]. In several practical cases, a static load is easier to arrange than a (controlled) dynamic load. In this case the deformation is static and the given data usually includes only a single vector-valued variable relating to the elastostatic deformation of the body at a number of locations. In this case, the damage identification problem is a static problem. This problem has been investigated by various researchers [Citation28,Citation29,Citation41–44]; however, the existing literature on this problem is relatively poor compared to the literature on dynamic damage identification. Obviously, static damage identification problems are more challenging as static data is a rather limited source of information about the underlying physical system when compared to vibrational data [Citation45,Citation46]. In this paper, we consider static data to analyze damage identification problem of structural beams.

Damage identification problems can be also classified based on the inversion framework used for their analyzes. When the unknown is taken to be a deterministic variable, the regularization framework is usually used [Citation47,Citation48]. In this framework, the error is taken to be unknown and not specifically with any probabilistic structure; however, it is often assumed that the error norm is known. The inverse problems that are cast in this framework are called deterministic inverse problems. These problems are often solved as optimization problems. When the unknown, modeling error and measurement error are explicitly taken and modeled as jointly distributed random variables, statistical or Bayesian framework should be used. The inverse problems that are cast in this framework are called Bayesian inverse problems [Citation4,Citation49,Citation50]. These problems can be solved for not only an estimate of the unknown but also statistically meaningful uncertainty of the estimates [Citation50]. In this paper, we consider Bayesian inversion framework.

The scope of this paper is damage identification problem for structural elements that can be modeled as beams by using either Euler-Bernoulli or Timoshenko beam theories. Some simplified versions of this problem have been investigated in the literature by using deterministic inversion framework [Citation15–21]. However, this paper considers Bayesian inversion framework to estimate not only the occurred damage but also its uncertainty for the structures of interest. The rest of this paper is organized as follows. Section 2 gives a brief literature review on the research field. Section 3 develops a finite-dimensional model relating a finite-dimensional representation of the static beam response to a finite-dimensional representation of the occurred damage field. In this section, both Timoshenko and Euler-Bernoulli beam models are considered. Section 4 discusses a framework for the generation of random damage fields and proposes a probabilistic model for such fields. Section 5 analyzes the problem in Bayesian inversion framework and calculates a posterior density for the damage field given limited and noisy data. This section is followed by the derivation of a point estimate and modeling its uncertainty. Section 6 elaborates a set of numerical results verifying the validity and efficiency of the proposed method. Finally, Section 7 gives concluding remarks and discusses future work.

2. Literature review on damage identification of elastic beams

One of the first studies casting beam identification as a computational inverse problem was published in [Citation51]. In this study, the beam identification problem was formulated as finding the spatial distribution of some coefficients used for modeling the beam, denoted by β(x)R hereafter, given some limited data on the dynamic beam response, denoted by dRm hereafter. The Euler-Bernoulli beam theory was used to find a computational model, mapping a finite-dimensional representation of β(x) to d. This mapping is usually referred to as the forward model in the theory of inverse problems. Tikhonov Regularization method [Citation47] was then applied to solve the inverse problem associated with the forward model. The same problem was later studied in [Citation24] but considering the Timoshenko beam theory. Both the studies published in [Citation51] and [Citation24] used the deterministic inversion framework to find estimates of β(x) without determining the uncertainty associated with such estimates. In general this issue can be addressed by using statistical or Bayesian inversion frameworks.

There has been relatively little literature published on the application of the Bayesian framework for the beam coefficient or damage identification problems. The relevant research to date has tended to focus on the crack identification problem (a very special case of the damage identification problem), which is to estimate a probabilistic model for only the location, length and depth of the crack(s) when the existence of the crack(s) is known and the rest of the beam is assumed to be undamaged [Citation27,Citation52–55]. For example, the Bayesian framework was used to study the crack identification problem of Euler-Bernoulli beams in [Citation27]. This framework was also used to study the crack identification problem of Timoshenko beams in [Citation52] and [Citation56]. One common characteristic of these studies is their need to measure the natural frequencies of the dynamic beam response. Also, these studies suffer from high computational complexity due to the non-linear relation between the crack parameters and the natural frequencies. A further study based on the statistical damage identification of a spacial case of Euler-Bernoulli beam was published in [Citation57]. In this paper, a single crack was modeled by using a V-shaped notch and the data collected from the dynamic beam response was used to identify the parameters of the V-shaped notch. The uncertainty of the estimated solution was also calculated. A computationally expensive algorithm based on Markov Chain Monte Carlo algorithm was used to deal with the high-dimensional integration and the non-linear relation between the data and crack parameters. More recently, the Bayesian damage identification of thick beams (2D) was reported in [Citation25] based on dynamic data. In this study, the partial recovery of the damage field was performed from the use of the Timoshenko beam model (1D) adopting the Bayesian approximation error (BAE) approach to build a statistical model for the model discrepancy.

In all the Bayesian identification studies mentioned above, the identification algorithm uses the dynamic beam response. However, in some practical applications, the external force or load applied to the beam is static and the dynamic beam response is not available. Beam coefficient identification from elastostatic response was studied in [Citation15]. In this paper, the Euler-Bernoulli beam theory was used to formulate the problem as an extension to the coefficient identification problem of the Poisson equation. The existence and uniqueness of the solution with different boundary conditions was proved. As a practical example, a specific solution for simply-supported boundary conditions was derived. The spatial distribution of the beam coefficient β(x) was modeled by a piece-wise constant function with discrete levels β1,,βn at the consecutive intervals Ω1,Ωn dividing the beam into n equal elements. Then, a computational forward model, mapping [β1,,βn]T into a vector formed by the measured data was developed. Tikhonov Regularization technique [Citation47] was used to solve the inverse problem associated with the forward model. The accuracy of the proposed solution was shown through an example in which β(x) is a smooth function, and the data SNR is very high (only 1% noise). The same problem was studied in [Citation18] but the Method of Variational Imbedding (MVI) was used as the regularization method. Similar to [Citation15], β(x) was modeled by a piece-wise constant function and the accuracy of the proposed solution was shown through a simple example when β(x) was a smooth function over the beam, and the data supposed to be noise-free. The studies presented in [Citation19] extended the one presented in [Citation18] by considering piece-wise linear and piece-wise cubic models for β(x).

Beam damage identification from limited data on the static beam response was studied in [Citation29]. In this study, a homogeneous undamaged beam with a constant parameter β0R was considered. The coefficient of the damaged beam was modeled as the product of β0 and 1D(x), where 0D(x)<1 was a function indicating the spatial distribution of the damage across the beam. The beam was divided into n equal intervals and it was supposed that D(x) is constant over each interval. The Euler-Bernoulli beam theory and Direct Stiffness Method [Citation58] were used to obtain a computational forward model, mapping the constant levels of D(x) at each interval into a vector formed by the measured data. Tikhonov Regularization [Citation47] was then used to solve the associated inverse problem. A cantilever beam was considered, but the method could be adopted for simply-supported beams as well. Most recently, the same problem was studied for different boundary conditions including simply-supported boundary conditions in [Citation28]. In this study, the damage across an Euler-Bernoulli beam was estimated through the minimization of an error (measure) called the constitutive relation error. This study considered the effect of the measurement noise statistics on the estimated solution; but it used a deterministic inversion approach.

2.1. Classification of existing methods

The above-mentioned studies can be categorized by using three different classification approaches. (1) the type of beam response used as the input data, which could be either dynamic or static. (2) the beam theory used for developing the forward model, which could be either the Euler-Bernoulli or Timoshenko beam theory, and (3) the inversion method used for solving the inverse problem, which could be either deterministic or probabilistic.

Based on these classification criteria, we can classify these studies as shown in Table . According to this table, all the relevant studies to date, that use the data collected from the static beam response, are based on deterministic inversion framework. They usually find an approximate solution for the unknown, without assessing the uncertainty of the solution. To the best of our knowledge, for distributed damage, there is no substantial research on the Bayesian coefficient identification or damage identification of beams from the static response data (elastostatic data) based on either Euler-Bernoulli or Timoshenko beam theories, as shown in Table . The main motivation of this paper is to address this research gap for simply-supported beams considering both Euler-Bernoulli and Timoshenko beam models.

Table 1. Classification of existing works on damage identification of simply-supported beams.

3. Derivation of computational forward model

Figure  shows the transverse section of a damaged simply-supported beam whose neutral axis lies on the x-axis. Figure (a) shows the beam position when there is no external force. Figure (b) shows the deformation of the beam when a transverse force is applied; the beam neutral axis after deformation is also shown. Figure (c) shows the beam neutral axis, denoted by Ω, before and after deformation in a single coordinate system. As shown in Figure , the beam boundaries are pinned (simply-supported boundary conditions). In this situation, the deflection and bending moments are always zero at the boundary points. In this paper, we consider a static profile for the external force and refer to the beam deflection or deformation as the static beam response. Referring to Figure (c), the beam static response can be modeled by using Timishenko beam theory as follows: (1) {β0d2dx2{λ(x)d2dx2w(x)k0λ(x)ddx{Q(x)λ(x)}}=f(x)ddxQ(x)=f(x)xΩ(1) where Ω=[0,1] is the beam neutral axis, w(x):ΩR is the static beam response, f(x):ΩR is the external transverse force, Q(x):ΩR is the shear force, β0R is the bending stiffness of the undamaged beam and k0R is shear compliance of the undamaged beam. In this model, 0<λ(x)1 represents the damage field; this function is related to the links among material points and can be interpreted as a measure of local cohesion or integrity state of the continuum body [Citation59]. For this function, the maximum value of 1 indicates that the continuum body is undamaged and the infimum value of 0 indicates a local rupture in the continuum body. The thermodynamic framework used to obtain the modified constitutive relation is not within the scope of this paper. Further information can be found in [Citation59–61]. As mentioned earlier, the beam deflection and bending moment, are zero at the boundary points of a simply-supported beam; hence, the solution of (Equation1) should satisfy the following boundary conditions: (2) {w(0)=w(1)=0M(0)=M(1)=0(2) where M(x) representing the beam bending moment is given by (3) M(x)=β0λ(x)d2dx2w(x)+β0k0λ(x)ddx{Q(x)λ(x)}(3) To obtain a computational forward model, we could apply the Galerkin Approximation Method (GAM) directly to (Equation1)–(Equation3); however, this approach would result in a non-linear forward model. Furthermore, this approach would require a set of basis functions in C3(Ω), e.g. cubic Hermite functions. To avoid these consequences, we exploit a different modeling approach in this paper. We first develop an alternative formulation for (Equation1) based on splitting it into two second-order sub-models. Then we apply the GAM to each sub-model separately. This process leads to a linear model. Furthermore, since the sub-models are formulated by second-order differential equations, we can use a simple set of basis functions in C1(Ω), e.g. hat functions. A similar idea of splitting the Euler-Bernoulli beam model into two second-order sub-models was introduced in [Citation15] and [Citation16]. In fact, we generalize this idea in this paper so that we can use it for both Timoshenko and Euler-Bernoulli beam models. Let us define (4) u(x)1γ(x)d2dx2w(x)k0γ(x)ddx{γ(x)Q(x)}(4) where (5) γ(x)=1λ(x)(5) Since (Equation5) is a one-to-one relation when λ(x)0, we can find the damage field λ(x) from γ(x) and vice versa. Since 0<λ(x)1; (Equation5) leads to (6) γ(x)1(6) The change of variables given in (Equation5) results in a linear mapping between the unknown and data variables of the proposed analysis. By substituting (Equation4) into (Equation1), we obtain (7) β0d2dx2u(x)=f(x)xΩ(7) The comparison of (Equation3) and (Equation4) shows that M(x)=β0u(x); thus, the boundary conditions given in (Equation2) leads to u(0)=0 and u(1)=0. Therefore, u(x) is modeled by the following boundary value problem: (8) M1:{β0d2dx2u(x)=f(x)xΩu(0)=u(1)=0(8) Now, we rearrange (Equation4) to write (9) d2dx2w(x)=γ(x)u(x)+k0ddx{γ(x)Q(x)}(9) The shear force and bending moments satisfy Q(x)=ddxM(x); therefore, from (Equation3) and (Equation4) we obtain (10) Q(x)=β0ddxu(x)(10) By substituting (Equation10) into (Equation9), we obtain (11) d2dx2w(x)=p(x)(11) where (12) p(x)=γ(x)u(x)β0k0ddx{γ(x)ddxu(x)}(12) From (Equation2), we have w(0)=0 and w(1)=0. Therefore, we can write the following boundary value problem for w(x): (13) M2:{d2dx2w(x)=p(x)xΩw(0)=w(1)=0(13) Thus, the fourth-order model given by (Equation1)–(Equation3) can be represented by two coupled second-order sub-models M1 and M2 given by (Equation8) and (Equation13). The forward problem of M1 is to find u(x) given β0 and f(x). From (Equation7), it is evident that u(x) is not related to health or damage conditions of the beam. The forward problem of M2 is to find the beam response, w(x), given p(x). We can use (Equation12) to obtain p(x) from β0, k0, γ(x) and the obtained solution for u(x). Obviously, w(x) is related to the beam health or damage conditions.

Figure 1. Static response of a simply-supported beam, (a): beam and its neutral axis (b): static deformation due to external force, (c): neutral axis before and after deformation

Figure 1. Static response of a simply-supported beam, (a): beam and its neutral axis (b): static deformation due to external force, (c): neutral axis before and after deformation

3.1. Weak solution for beam static response

Let us first consider the forward problem of M1, which is to find u(x) given β0 and f(x). Here we consider β0>0 and f(x)L2(Ω) based on the physical conditions of the problem. In this case, a function u(x)C02(Ω) satisfying (Equation8) is a classical solution of the forward problem of M1. After multiplying both sides of the differential equation of M1 by a test function v(x)C02(Ω), integrating over Ω, and using integration by parts, we can obtain (14) β0[v(x)ddxu(x)]01β0Ω(ddxv(x))(ddxu(x))dx=Ωv(x)f(x)dx(14) Since v(x) vanishes at the boundary points of Ω, (Equation14) is simplified to (15) β0Ω(ddxv(x))(ddxu(x))dx=Ωv(x)f(x)dx(15) A function u(x)H01(Ω) satisfying (Equation15) and the boundary conditions of M1, i.e. u(1)=u(0)=0, for all v(x)H01(Ω), is called a weak solution for the forward problem of M1. Also, the integral equation given in (Equation15) is called the weak form of the problem. Now, let us define a linear form (16) l(v)=Ωv(x)f(x)dx(16) and a bi-linear form (17) B(v,u)=β0Ω(ddxv(x))(ddxu(x))dx(17) such that we can rewrite the weak form of the problem, given by (Equation15), as (18) B(v,u)=l(v)vH01(Ω)(18) We can use the Lax and Milgram theorem [Citation62] to show the existence of a unique weak solution for u(x) in (Equation18). This solution can be estimated by using Galerkin Approximation Method (GAM). The main idea of the GAM is to find an estimate of the weak solution, denoted by uh(x), in the finite-dimensional subspace Vh(Ω)H01(Ω) instead of finding the exact weak solution in the infinite-dimensional space H01(Ω). Suppose that φ1(x),,φn(x) form a basis for Vh(Ω) such that (19) Vh(Ω)=span{φ1(x),,φn(x)}(19) In this case, the orthogonal projection of any function u(x)H01(Ω) onto Vh(Ω) is in the form of (20) uh(x)=i=1nciφi(x)=φ(x)Tc(20) where φ(x)Rn and cRn are formed as follows: (21) φ(x)=[φ1(x)φn(x)]T(21) (22) c=[c1cn]T(22) Now, we can replace u(x) with uh(x) in (Equation18) and use all elements of the basis of Vh(Ω) as v(x) one by one. This process results in n equations in the form of (23) i=1nB(φj,φi)ci=l(φj)j=1,,n(23) which leads to a linear system of equations given by (24) Bc=a(24) where BRn×n and aRn are given by (25) B=β0Ω(ddxφ(x))(ddxφ(x))Tdx(25) and (26) a=Ωφ(x)f(x)dx(26) The last step in the implementation of this approximation method is to modify (Equation24) to include the given boundary conditions. We will discuss this step for a specific set of basis functions in the next sections. For now, we assume that the modified form of (Equation24) can be obtained through a linear transformation; thus the final equation is still in the form of (Equation24); therefore, (27) c=B1a(27) Now, uh(x) can be obtained by substituting (Equation27) into (Equation20): (28) uh(x)=φ(x)Tc=φ(x)TB1a(28) We can use the analogy between M1 and M2 to find an expression for wh(x) similar to the one given in (Equation28). For this purpose, we should set β0=1, consider the use of p(x) instead of f(x), and repeat the same process used for the derivation of (Equation28). In this case, we obtain (29) wh(x)=φ(x)TB1b(29) where B is given by (Equation25) and b is given by (30) b=Ωφ(x)p(x)dx(30) Now, we need to compute b from the given variables and model its relation to the unknown that is γ(x) at this stage. To this end, we first need to compute p(x). By using the product rule, (Equation12) is expanded to (31) p(x)=γ(x)u(x)β0k0(γ(x)d2dx2u(x)+ddxγ(x)ddxu(x))(31) From M1, we can replace d2dx2u(x) with 1β0f(x); thus, (32) p(x)=γ(x)u(x)k0γ(x)f(x)β0k0ddxγ(x)ddxu(x)(32) By substituting (Equation20) into (Equation32), we obtain (33) p(x)=γ(x)φ(x)Tck0γ(x)f(x)β0k0ddxγ(x)ddxφ(x)Tc(33) Now, let us consider the projection of the unknown variable γ(x) onto Vh(Ω) as (34) γh(x)=φ(x)Tθ(34) where (35) θ=[θ1θn]T(35) After substituting (Equation34) into (Equation33) and rearranging the obtained equation, we have (36) p(x)=(cTφ(x)φ(x)Tk0f(x)φ(x)Tβ0k0cT(ddxφ(x))(ddxφ(x))T)θ(36) Now, we substitute (Equation36) into (Equation30) to obtain (37) b=Hθ(37) where HRn×n is computed by (dropping the explicit dependency of x) (38) H=Ω(cTφ(φφT)k0fφφTβ0k0cTddxφ(φddxφT))dx(38) Finally, substituting (Equation37) into the model given for wh(x) in (Equation29) implies (39) wh(x)=(φ(x)TB1H)θ(39) which indicates a linear relationship between wh(x) and the finite representation of γ(x)=1λ(x). This result which is based on the change of variable proposed in (Equation5)leads to a linear mapping between the unkown and data variables of the proposed analysis.

3.2. Proposed forward model

To proceed, we consider a data vector dRm of the measured values of the static beam response {d1,,dm} of arbitrary points {ξ1,,ξm}Ω. By using (Equation39), a prediction model of d can be expressed by (40) d=(ΦB1H)θ+e(40) where vector eRm models the measurement noise, and ΦRm×n is defined by (41) Φ=[φj(ξi)]m×n(41) From (Equation40), the data vector can be modeled by using the generic form of (42) d=Aθ+e(42) where matrix ARm×n is defined by (43) A=ΦB1H(43) The main advantage of the computational forward model given in (Equation42) is its linearity with respect to θ that is related to the damage parameters as shown in (Equation34). Here, d and A are known, e is not known but its probability density is assumed to be Gaussian, and θ is the primary unknown. The computation of Φ, B and H are carried out in Appendix 1. Note that there are some model reduction techniques that can be used here (for example see [Citation63]); however, the scope of this paper is not about using any model reduction technique for dealing with the problem of limited data. We ca also reach to a similar model for other boundary conditions; however, this requires different modeling techniques and analysis [Citation46].

4. Random damage fields

In this section, we formulate the random scalar fields representing structural damage in the physical system described by (Equation1). This field was denoted by γ(x) in the previous section and modeled by using vector θ in piece-wise linear finite dimensional space. We attempt to adopt and elaborate a simple method; however, there are other alternatives in the literature, for example, those proposed in [Citation64] and [Citation65].

Let γ(x):ΩR be a scalar field defined on Ω=[0,1]. To comply with the physical requirements of a damaged field, we propose the following constraints for γ(x):

  1. It is a low-frequency scalar field: the spectral content of γ(x) includes only spatial harmonics with normalized frequencies smaller than r, where 0<r<1.

  2. The range of γ(x) is given by R=[1,) as suggested by (Equation6).

Here, we are interested in probabilistic modeling of vector θ so that we can generate γ(x)γh(x) from the model given by (Equation34). To this end, we define n equally spaced points in Ω, denoted by ζ1,,ζn, such that (44) ζk=k1n1k{1,,n}(44) In this case, a discrete representation of an arbitrary random field, denoted by γ^(x), can be modeled by vector y^=[y^k]n×1, where y^k=γ^(ζk). Let us consider a finite-dimensional form for γ^(x) based on the same basis used in (Equation34): (45) γ^h(x)=i=1nα^iφi(x)=φ(x)Tα^(45) where α^i are some scalar coefficients forming a vector α^=[α^i]n×1. Suppose that (46) α^N(0n,In)(46) By considering γ^(x)γ^h(x) and substituting (Equation45) into y^k=γ^(ζk), we obtain (47) y^=[φi(ζj)]n×nTα^(47) where φi(ζj) denotes the element of [φi(ζj)]n×nT in the ith row and jth column. From (EquationA1), we obtain φi(ζj)=1 for i = j and φi(ζj)=0 for ij which result in [φi(ζj)]n×n=In; therefore (EquationA1) can be simplified to (48) y^=α^(48) Now consider a random field denoted by γ(x) given by (49) γ(x)φ(x)Tα(49) such that αRn can be obtained by low-pass filtering of α^Rn. Based on the same process used in the definition of y^ and derivation of (Equation48), we can define yk=γ(ζk) and derive (50) y=α(50) Therefore, the discrete samples of γ(x) (i.e. the elements of y) and the elements of α have the same frequency components. In this case, it is expected γ(x) to contain only low-frequency harmonics of γ^(x). Appendix 2 shows a linear relation between α^ and α formulated by (51) α=Gα^(51) The low-frequency scalar fields constructed above does not necessarily comply with the second constraint introduced at the beginning of this section. Considering γ(x)γh(x), the second constraint requires (52) i=1nαiφi(x)1(52) This condition should hold for any xΩ including the nodal points ζ1,,ζn; therefore the inequality given in (Equation52) requires (53) i=1nαiφi(ζk)1k{1,,n}(53) Note that this is a sufficient condition for γ(x)1 when the piece-wise linear basis function given by (EquationA1) are used. Considering the fact that φi(ζk)=1 when i = k and φi(ζk)=0 when ik; the inequality given in (Equation53) leads to (54) αk1k{1,,n}(54) Therefore, scalar field γ(x) complies with the second constraint if all elements of α belong to R=[1,). To ensure this, we propose to replace αk with θk=ρ(αk) in (Equation45): (55) γ(x)φ(x)Tθ=φ(x)Tρ(α)(55) In this paper, we use the following choice of ρ(x): (56) ρ(x)=max(x,1)(56) It is evident that the range of ρ(x) is R=[1,). Considering (Equation34), (EquationA8) and (Equation55), one can show that (57) {θ=ρ(α)α=Gα^(57) This result indicates that every damage field complying with the constraints given in the beginning of this section can be modeled by an n-variate Gaussian variable (α^). From (Equation46) and α=Gα^, it can be shown that α is an n-variate Gaussian variable too: (58) αN(0n,GGT)(58) However, θ is not a multi-variate Gaussian variable. By using the results of this section, we can generate random damage fields complying with the two constraints specified at the beginning of this section. This process begins by drawing an n-variate Gaussian vector as α^, finding α and θ from (Equation57), and constructing the field by using (Equation34). Some examples of such scalar fields are shown in Figures  and . The plots of these figures are generated by setting n = 64 and two different values of r. As seen the length and shape of the damage can be controlled by adjusting r.

5. Bayesian inversion of forward model

In this section, we apply the Bayesian inversion method described in [Citation4] to solve the damage identification problem at hand. From the results of the previous sections, we can formulate the beam damage identification problem by using the following equations: (59) {d=Aθ+e(1)θ=ρ(α)(2)λ(x)=1φ(x)Tθ(3)αN(0,Γα)(4)eN(μe,Γe)(5)(59) The first equation, suggested by (Equation42), represents the computational forward model of the problem. In this equation, ARm×n is a constant matrix, data vector dRm which is the input variable obtained by direct measurement, θRn is the unknown variable and eRm represents the measurement noise. The second equation, suggested by (Equation57), models the mapping between θRn, and an n-variate Gaussian variable, αRn. The third equation, suggested by (Equation5) and (Equation34), relates the damage function (the primary unknown of the problem) to θRn. The fourth equation, suggested by (Equation58), models α as an n-variate Gaussian variable whose mean vector and covariance matrix are 0 and Γα. This equation leads to (60) πα(α)exp{12Lαα2}(60) where Lα can be obtained by Cholesky decompositions of Γα1 as Γα1=LαTLα. The fifth equation models the measurement noise vector as an m-variate Gaussian variable whose mean vector and covariance matrix are μeRm and ΓeRm×m. This equation leads to (61) πe(e)exp{12Le(eμe)2}(61) where Le can be obtained by Cholesky decompositions of Γe1 as Γe1=LeTLe. By using the analysis given in [Citation46,Citation49], we formulate the likelihood density function πd|α(d|α) (62) πd|α(d|α)exp(12Le(dAρ(α)μe))2(62) According to the Bayes' theorem, the posterior density πα|d(α|d) is related to the likelihood density function by (63) πα|d(α|d)πα(α)πd|α(d|α)(63) By substituting (Equation62) into (Equation63) and using (Equation60) we obtain (64) πα|d(α|d)exp(12(Lαα2+Le(dAρ(α)μe)2))(64) This equation can be re-arranged to obtain (65) πα|d(α|d)exp(12A(α)b2)(65) where vectors A(α) and b are given by (66) A(α)=[LααLeAρ(α)](66) and (67) b=[LαμαLe(dμe)](67)

Figure 2. Random samples of γ generated by using the proposed method with n = 64 and r = 0.05.

Figure 2. Random samples of γ generated by using the proposed method with n = 64 and r = 0.05.

Figure 3. Random samples of γ generated by using the proposed method with n = 64 and r = 0.1.

Figure 3. Random samples of γ generated by using the proposed method with n = 64 and r = 0.1.

5.1. Calculation of maximum A posteriori point estimate

The density function given in (Equation65) models the posterior density for α. In this stage, we consider computing the Maximum a Posteriori point (MAP) estimate from this density function. By definition, the MAP estimate of α is obtained from the optimization problem of (68) αMAP=argmaxαπα|d(α|d)(68) Combining this equation and (Equation65) leads to (69) αMAP=argminαA(α)b2(69) which is a non-linear optimization problem. Appendix 3 gives an iterative method based on line search method for computing αMAP from (70) α(l+1)=α(l)+ks(70) where k is the line search step-size. The above process can be repeated until the norm of s reaches a default value or some pre-defined conditions were met and (71) α(l)αMAP(71) Recalling that θ=ρ(α) from (59.2), αMAP corresponds to a point estimate for θ given by (72) θ^=ρ(αMAP)(72) Although αMAP is a maximum a posteriori estimation for α, the value obtained for θ^ by using the above equation is not necessary a maximum a posteriori estimation for θ. Finally, from (Equation59-3), the damage functions corresponding to θ^ and αMAP can be computed by (73) λ^(x)=1φ(x)Tθ^(73) In the above analysis, we use the line-search algorithm to get numerical results because it is simple; however, other computationally efficient or low-cost algorithms may be used. The scope of the paper is not about such algorithms and their computational complexity or performance. As for a comparison against other methods, it is not relevant to compare the proposed method which provides posterior error estimates (in addition to the point estimates) to any method that does not provide such error estimates.

5.2. Quantification of uncertainty

To compute an estimate for the standard deviation of the posterior density function given in (Equation65), we approximate (Equation65) by a Gaussian density function. The exponent of (Equation65) includes 12F(α). In this case, we can use the Taylor series of F(α) to approximate (Equation65) by a Gaussian density. By using (EquationA11), this series can be written in the form of: (74) F(α)(Aob)T(Aob)+2(Aob)TJoT(ααo)+(ααo)T(JoTJo)(ααo)(74) where Ao and Jo denote A(αo) and J(αo) respectively. This equation can be written in the standard quadratic form of (75) F(α)(Aob+JoT(ααo))T(Aob+JoT(ααo))(75) Recalling that 12F(α) is the exponent of the posterior density function πα|d(α|d); one can infer from (Equation75) that the covariance matrix of the approximate Gaussian density is (76) Γα|d(JoTJo)1(76) In this case, the diagonal elements of this covariance matrix, denoted by σ12,,σn2, represent the variances of the elements of α; consequently, their square roots are equal to the standard deviations of the elements of α. Therefore, we can compute the one-standard-deviation interval around the estimated value for α. The upper and lower bounds of this interval by αMAP±σ; where σ=[σk]n×1 is the vector of standard deviations. Finally, the interval quantifying the uncertainty of the point estimate for the damage field can be computed from (Equation59-3) by (77) {λU(x)=1φ(x)Tρ(αMAP+σ)λL(x)=1φ(x)Tρ(αMAPσ)(77)

6. Numerical results

In this section, we assess the performance of the proposed damage identification method for both Euler-Bernoulli and Timoshenko beams. In the numerical experiments conducted in this section, we consider a beam with β0=5 and an external force f(x) given by (78) f(x)={10.3<x<0.70else(78) The beam is damaged such that λ(x) has a linear drop in the interval of [0.2,0.3] and a linear rise in the interval of [0.3,0.4]. In other words, the beam suffers a local damage around x = 0.3. We compute the static response of the undamaged beam by setting λ(x)=1 in the proposed forward model. Also, we compute the static response of the damaged beam by using the assumed λ(x) in the proposed forward model. We use the latter response to generate the data vector in the following experiments.

6.1. Experiment 1

In the first experiment, we consider an Euler-Bernoulli model for the beam. We suppose that the dimensions of the data vector (m = 20) is smaller than that of the unknown vector (n = 40), and the data Signal-to-Noise-Ratio (SNR) is low. To this end, we perform the following tasks:

  1. We collect the values of the response at m = 20 equally spaced points and add Gaussian white noise to them such that the data SNR is only 20dB. The data points are shown in Figure (a). Also, full static responses of the beam in healthy and damaged conditions are shown in this figure.

  2. We form a data vector by using the collected data points and feed it to the proposed identification method to compute the estimate of λ(x) shown by λ^(x). The result is demonstrated in Figure (b). The effectiveness of the proposed identification method can be verified visually in Figure (b). Additionally, we compute the identification error as Eδ=αMAPα=0.037. By using (Equation77), we compute the range of λ(x) within one standard deviation of the MAP estimate and show it by using gray shading in Figure (b). In other words, the gray area indicates the uncertainty of the estimated solution. The results demonstrated above is indicating an insight to the spatial distribution of λ(x) given the existing constraints in the data size and SNR. As seen in Figure , the actual values of λ(x) are almost within the one-standard-deviation interval of the computed point estimate; however, there are some errors due to neglecting approximation error. Potentially, the errors can be reduced by using Bayesian Approximation Error approach [Citation4], leading to a future investigation for the current work.

  3. We can also compute the marginal prior and posterior densities of elements of αR40. For example, we consider the 12th and 14th elements of α and plot their marginal densities in Figure . In this figure, the prior and posterior densities are shown. Also the corresponding actual values are shown. As seen, the prior densities of both α12 and α14 are very flat (indicating high uncertainty); however, their posterior densities are much sharper and their peak values are very close to the actual values. This behaviour verifies that the proposed method decreases the uncertainty of the initial guess (prior data).

  4. By using the probabilistic model we found for α, we can compute a probabilistic model for λ(x) from λ(x)=1φ(x)Tρ(α) and evaluate its values at some points on the beam. We can then numerically calculate the co-variance matrix for all the computed values for λ(x). For example, Figure  visualize the co-variance matrix of λ(x) values computed for 2000 equally spaced locations on the beam which indicates no cross-talk between the damaged and undamaged regions.

  5. We can also compute a histogram for every value of λ(x). Figure (a) shows the histograms for λ(x) at x = 0.25 which is a damaged location. Figure (b) shows the histograms for λ(x) at x = 0.8 which is an undamaged location. As seen the histogram shows that the probability density of λ(x) is concentrated at 1.

Figure 4. Damage identification of a simply-supported Euler-Bernoulli beam by using proposed method (a): beam responses and data points, (b): identification result.

Figure 4. Damage identification of a simply-supported Euler-Bernoulli beam by using proposed method (a): beam responses and data points, (b): identification result.

Figure 5. Prior and posterior marginal densities of two α12 and α14 in experiment 1.

Figure 5. Prior and posterior marginal densities of two α12 and α14 in experiment 1.

Figure 6. Visualization of the co-variance matrix of the estimated values of λ(x) at 2000 equally-spaced locations – Experiment 1.

Figure 6. Visualization of the co-variance matrix of the estimated values of λ(x) at 2000 equally-spaced locations – Experiment 1.

Figure 7. Histograms of the estimated values of λ(x) at a damaged location (x = 0.25) and an undamaged location (x=0.9) – Experiment 1.

Figure 7. Histograms of the estimated values of λ(x) at a damaged location (x = 0.25) and an undamaged location (x=0.9) – Experiment 1.

6.2. Experiment 2

In the second experiment, we consider a Timoshenko model for the beam with k0=0.01; we use the same β0, λ(x) and f(x) used in the previous experiment. We compute the static responses of the healthy and damaged beams and generate the data vector as discussed in the previous example. Again, we aim at testing the proposed method when the dimensions of the data vector (m = 20) is smaller than that of the unknown vectors (n = 40), and the data SNR is low. We perform the two first tasks introduced for the first experiment. As the result of the first task, the data points are shown in Figure (a). As the result of the second task, λSOL(x) is shown in Figure (b). The identification error is about Eδ=0.034 for this experiment. Again, the results of the above experiment indicate that the actual values of λ(x) are almost within the one-standard-deviation interval of the computed point estimate. The existing errors are made due to neglecting approximation errors as mentioned in the first experiment.

Figure 8. Damage identification of a simply-supported Timoshenko beam by using proposed method (a): beam responses and data points, (b): identification result.

Figure 8. Damage identification of a simply-supported Timoshenko beam by using proposed method (a): beam responses and data points, (b): identification result.

We also repeat the fourth and fifth tasks to visualize the co-variance matrix of the evaluated values of the damage function λ(x), as shown in Figures  and sample histograms for a damaged point at x = 0.25, shown in Figure (a), and an undamaged point at x = 0.9, shown in Figure (b).

Figure 9. Visualization of the co-variance matrix of the estimated values of λ(x) at 2000 equally-spaced points – Experiment 2.

Figure 9. Visualization of the co-variance matrix of the estimated values of λ(x) at 2000 equally-spaced points – Experiment 2.

Figure 10. Histograms of the estimated values of λ(x) at a damaged location (x = 0.25) and an undamaged location (x=0.9) – Experiment 2.

Figure 10. Histograms of the estimated values of λ(x) at a damaged location (x = 0.25) and an undamaged location (x=0.9) – Experiment 2.

6.3. Experiment 3

In the third experiment, we repeat the first experiment with a damage function modeling two damage areas across the beam. We compute the static responses of the healthy and damaged beams and generate the data vector as discussed in the previous example. We aim at testing the proposed method when the dimensions of the data vector (m = 40) is smaller than that of the unknown vectors (n = 80), and the data SNR is low. We perform the two first tasks introduced for the first experiment. As the result of the first task, the data points are shown in Figure (a). As the result of the second task, the estimated value of λ(x) is shown in Figure (b). The identification error is about Eδ=0.07 for this experiment. Again, the results of the above experiment indicate that the actual values of λ(x) are almost within the one-standard-deviation interval of the computed point estimate. The existing errors are made due to neglecting approximation errors as mentioned in the previous experiments. We also carry ut the forth step and compute the co-variance matrix of λ(x), which indicates positive cross-talk between the damaged areas. Finally we carry out the fifth step for this experiment and compute two sample histograms, one for a damaged location and one for an undamaged location. The results are shown in Figures  and . Similar to the previous experiment, for a damaged location, the values of λ(x) are distributed around the actual value. However, for an undamaged location, the values are concentrated at 1. This observation is consistent in all the experiments demonstrated above.

Figure 11. Damage identification of a simply-supported Euler-Bernoulli beam by using proposed method with two damaged area across the beam (a): beam responses and data points, (b): identification result.

Figure 11. Damage identification of a simply-supported Euler-Bernoulli beam by using proposed method with two damaged area across the beam (a): beam responses and data points, (b): identification result.

Figure 12. Visualization of the co-variance matrix of the estimated values of λ(x) at 2000 equally-spaced locations – Experiment 3.

Figure 12. Visualization of the co-variance matrix of the estimated values of λ(x) at 2000 equally-spaced locations – Experiment 3.

Figure 13. Histograms of the estimated values of λ(x) at a damaged location (x = 0.25) and an undamaged location (x=0.6) – Experiment 2.

Figure 13. Histograms of the estimated values of λ(x) at a damaged location (x = 0.25) and an undamaged location (x=0.6) – Experiment 2.

7. Conclusion

The damage identification of a simply-supported beam when the distributed external force applied to the beam is static and the observed data includes noisy and limited data on static beam response has been a challenge. In the theory of elasticity, the static response of a damaged simply-supported beam is modeled by using an ordinary differential equation of order four with in-homogeneous coefficient functions. This equation can be split into two simple differential equations of order two with homogeneous coefficient functions. A forward computational model for the damage identification of the beam can be derived by applying the Galerkin Finite Element Method to these second-order equations. From a prior model for the damage field and some data on the static response of the beam, a posterior model for the damage field can be obtained. This model can be used to find a maximum a posteriori point estimate for the damage field and quantify the uncertainty associated with such an estimate. The results obtained from the experiments demonstrated in this paper indicates that the proposed damage identification method can estimate the damage field for both Euler-Bernoulli and Timoshenko beams even if the available data on the static beam response is limited and noisy. When the data is limited (or missing), the Bayesian framework can still identify the damage occurred across the beam. Moreover, it can estimate the error associated with the result. In this case, the accuracy of the proposed method might decrease; however, this method can estimate the errors (posterior standard deviations) of the result: naturally, in locations where there are few or no measurements, the posterior error stimates are large. In the conducted numerical experiments, the estimated damage field lies approximately within the interval corresponding to the one-standard-deviation interval. No cross-talk between the damaged and undamaged locations are observed; however, when there are two damaged location, a positive cross-talk between the damaged areas can be observed. This promising result can be seen for both Euler-Bernoulli and Timoshenko beams. The existing errors are due to neglecting approximation errors. Since the proposed methodology is only applied to numerical simulation, its practical application can be investigated by field measurement.

Disclosure statement

No potential conflict of interest was reported by the author(s).

References

  • Sokolnikoff I. Mathematical theory of elasticity. New York, NY: McGraw-Hill; 1956.
  • Eskin G, Ralston J. On the inverse boundary value problem for linear isotropic elasticity. Inverse Probl. 2002 May;18:907–921.
  • Bonnet M, Constantinescu A. Inverse problems in elasticity. Inverse Probl. 2005 Feb;21:R1–R50.
  • Kaipio J, Somersalo E. Statistical and computational inverse problems. 1st ed. New York: Springer-Verlag; 2005.
  • Busby H, Trujillo D. Optimal regularization of an inverse dynamics problem. Comput Struct. 1997;63(2):243–248.
  • Hollandsworth P, Busby H. Impact force identification using the general inverse technique. Int J Impact Eng. 1989;8(4):315–322.
  • Adams R, Doyle JF. Multiple force identification for complex structures. Exp Mech. 2002 Mar;42:25–36.
  • Karlsson SES. Identification of external structural loads frommeasured harmonic responses. J Sound Vib. 1996;196(1):59–74.
  • Jacquelin E, Bennani A, Hamelin P. Force reconstruction: analysis and regularization of a deconvolution problem. J Sound Vib. 2003;265(1):81–107.
  • Aucejo M. Structural source identification using a generalized Tikhonov regularization. J Sound Vib. 2014;333(22):5693–5707.
  • Aucejo M, Smet OD. Bayesian source identification using local priors. Mech Syst Signal Process. 2016;66–67:120–136.
  • Aucejo M, Smet OD. On a full Bayesian inference for force reconstruction problems. Mech Syst Signal Process. 2018;104:36–59.
  • Sanchez J, Benaroya H. Review of force reconstruction techniques. J Sound Vib. 2014;333(14):2999–3018.
  • Nakamura G, Uhlmann G. Inverse problems at the boundary for an elastic medium. SIAM J Math Anal. 1995;26(2):263–279.
  • Lesnic D, Elliott L, Ingham D. Analysis of coefficient identification problems associated to the inverse Euler-Bernoulli beam theory. IMA J Appl Math. 1999;62(2):101–116.
  • Lesnic D. Determination of the flexural rigidity of a beam from limited boundary measurements. J Appl Math Comput. 2006;20(1-2):17–34.
  • Marinov TT, Marinova RS, Christov CI. Coefficient identification in elliptic partial differential equation. In: Lirkov I, Margenov S, Waśniewski J, editors. Large-scale scientific computing. Berlin Heidelberg: Springer; 2006. p. 372–379.
  • Marinov TT, Vatsala AS. Inverse problem for coefficient identification in the Euler-Bernoulli equation. Comput Math Appl. 2008;56(2):400–410.
  • Marinov TT, Marinova R. Inverse problem for coefficient identification in Euler-Bernoulli equation by linear spline approximation. In: Lirkov I, Margenov S, Waśniewski J, editors. Large-scale scientific computing. Berlin Heidelberg: Springer; 2010. p. 588–595.
  • Marinov TT, Marinova RS. An inverse problem for estimation of bending stiffness in Kirchhoff-Love plates. Comput Math Appl. 2013;65(3):512–519. Efficient Numerical Methods for Scientific Applications.
  • Dobson BJ, Rider E. A review of the indirect calculation of excitation forces from measured structural response data. Proc Inst Mech Eng C: Mech Eng Sci. 1990;204(2):69–75.
  • Valentinuzzi ME, Montaldo Volachec EM. Discrete deconvolution. Med Biol Eng. 1975 Jan;13:123–125.
  • Riad SM. The deconvolution problem: an overview. Proc IEEE. 1986 Jan;74:82–85.
  • Karve PM, Na S-W, Kang JW, Kallivokas LF. The inverse medium problem for Timoshenko beams and frames: damage detection and profile reconstruction in the time-domain. Comput Mech. 2011 Feb;47:117–136.
  • Castello DA, Kaipio JP. Modeling errors due to Timoshenko approximation in damage identification. Int J Numer Methods Eng. 2019;120(9):1148–1162.
  • Morassi A, Rollo M. Identification of two cracks in a simply supported beam from minimal frequency measurements. J Vib Control. 2001;7(5):729–739.
  • Ng C-T. On the selection of advanced signal processing techniques for guided wave damage identification using a statistical approach. Eng Struct. 2014;67:50–60.
  • Guo J, Wang L, Takewaki I. Static damage identification in beams by minimum constitutive relation error. Inverse Probl Sci Eng. 2019;27(10):1347–1371.
  • Ghrib F, Li L, Wilbur P. Damage identification of Euler-Bernoulli beams using static responces. J Eng Mech. 2012;138(5):405–415.
  • Friswell MI. Damage identification using inverse methods. Phil Trans R Soc A: Math Phys Eng Sci. 2007;365(1851):393–410.
  • Salawu O. Detection of structural damage through changes in frequency: a review. Eng Struct. 1997;19(9):718–723.
  • Rucevskis S, Sumbatyan MA, Akishin P, Chate A. Tikhonov's regularization approach in mode shape curvature analysis applied to damage detection. Mech Res Commun. 2015;65:9–16.
  • Fan W, Qiao P. Vibration-based damage identification methods: a review and comparative study. Struct Health Monitor. 2011;10(1):83–111.
  • Gladwell GML, Bishop RED. The inverse problem for the vibrating beam. Proc R Soc Lond. A. Math Phys Sci. 1984;393(1805):277–295.
  • Gladwell G. Inverse problems in vibration. 2nd ed. New York, NY: Springer; 2005.
  • Tan G, Shan J, Wu C, Wang W. Direct and inverse problems on free vibration of cracked multiple I-section beam with different boundary conditions. Adv Mech Eng. 2017;9(11):1687814017737261.
  • Zheng D, Kessissoglou N. Free vibration analysis of a cracked beam by finite element method. J Sound Vib. 2004;273(3):457–475.
  • Busby HR, Trujillo DM. Solution of an inverse dynamics problem using an eigenvalue reduction technique. Comput Struct. 1987;25(1):109–117.
  • Narkis Y. Identification of crack location in vibrating simply supported beams. J Sound Vib. 1994;172(4):549–558.
  • Betti R. Time-domain identification of structural systems from input-output measurements. Vienna: Springer; 2008.67–93.
  • Sellier M. An iterative method for the inverse elasto-static problem. J Fluids Struct. 2011;27(8):1461–1470.
  • Viola E, Bocchini P. Non-destructive parametric system identification and damage detection in truss structures by static tests. Struct Infrastruct Eng. 2013;9(5):384–402.
  • Banan MR, Banan MR, Hjelmstad KD. Parameter estimation of structures from static response. I. Computational aspects. J Struct Eng. 1994;120(11):3243–3258.
  • Banan MR, Banan MR, Hjelmstad KD. Parameter estimation of structures from static response. II: Numerical simulation studies. J Struct Eng. 1994;120(11):3259–3283.
  • Wang X, Hu N, Fukunaga H, Yao Z. Structural damage identification using static test data and changes in frequencies. Eng Struct. 2001;23(6):610–621.
  • Ardekani I. Bayesian damage identification from elastostatic data [PhD thesis]. The University of Auckland; 2020.
  • Tikhonov AN, Arsenin VY. Solutions of ill-posed problems. New York: Winston Wiley; 1977.
  • Hansen PC. The truncated SVD as a method for regularization. BIT Numer Math. 1987 Dec;27:534–553.
  • Kaipio J, Somersalo E. Statistical inverse problems: discretization, model reduction and inverse crimes. J Comput Appl Math. 2007;198(2):493–504. Special Issue: Applied Computational Inverse Problems.
  • Kaipio J, Kolehmainen V. Approximate marginalization over modelling errors and uncertainties in inverse problems. In: Bayesian theory and applications. Oxford University Press; 2015.
  • Smith CR, Bowers LK, Vogel RC. Numerical recovery of material parameters in Euler-Bernoulli beam models. J Math Syst Estim Control. 1991 Mar;7:359–373.
  • Ng C-T. Bayesian model updating approach for experimental identification of damage in beams using guided waves. Struct Health Monitor. 2014;13(4):359–373.
  • Khiem NT, Huyen NN. A method for crack identification in functionally graded Timoshenko beam. Nondestruct Test Eval. 2017;32(3):319–341.
  • Chouiyakh H, Azrar L, Alnefaie K, Akourri O. Vibration and multi-crack identification of Timoshenko beams under moving mass using the differential quadrature method. Int J Mech Sci. 2017;120:1–11.
  • Khatir S, Dekemele K, Loccufier M, Khatir T, Wahab MA. Crack identification method in beam-like structures using changes in experimentally measured frequencies and particle swarm optimization. CR Mecanique. 2018;346(2):110–120.
  • He S, Ng C-T. Guided wave-based identification of multiple cracks in beams using a Bayesian approach. Mech Syst Signal Process. 2017;84:324–345.
  • Teixeira JS, Stutz LT, Knupp DC, Silva-Neto AJ. Structural damage identification via time domain response and Markov Chain Monte Carlo method. Inverse Probl Sci Eng. 2017;25(6):909–935.
  • Felippa C. A historical outline of matrix structural analysis: a play in three acts. Comput Struct. 2001;79(14):1313–1324.
  • Castello D, Stutz L, Rochinha F. A structural defect identification approach based on a continuum damage model. Comput Struct. 2002;80(5):417–436.
  • Da Costa Mattos H, Sampaio R. Analysis of the fracture of brittle elastic materials using a continuum damage model. Struct Eng Mech. 1995 Sep;3:411–428.
  • Pires-Domingues S, Costa-Mattos H, Rochinha F. Modelling of nonlinear damage on elastic brittle materials. Mech Res Commun. 1998;25(2):147–153.
  • Ciarlet PG. Finite element method for elliptic problems. Philadelphia, PA: Society for Industrial and Applied Mathematics; 2002.
  • Ghannadi P, Kourehli S. Investigation of the accuracy of different finite element model reduction techniques. Struct Monit Maint. 2018 Sep;5:417–428.
  • Stuart AM. Inverse problems: a Bayesian perspective. Acta Numer. 2010;19:451–559.
  • Roininen L, Huttunen JMJ, Lasanen S. Whittle-Matérn priors for Bayesian statistical inversion with applications in electrical impedance tomography. Inverse Probl Imaging. 2014;8(2):561–586.
  • Katznelson Y. An introduction to harmonic analysis; 1976.
  • Haykin S. Adaptive filter theory. 4th ed. Upper Saddle River, NJ: Prentice Hall; 2002.
  • Tan L, Jiang J. Finite impulse response filter design. In: Tan L, Jiang J, editors. Digital signal processing. 2nd ed. Boston: Academic Press; 2013. p. 217–299.
  • Nocedal J, Wright S. Numerical optimization. New York: Springer; 2000. (Springer series in operations research and financial engineering).

Appendices

Appendix 1.

Computation of Φ, B and H

The first step is to choose a basis for Vh(Ω). Here, we form Vh(Ω) by using the piece-wise linear basis functions (hat functions). We can formulate a typical basis function φi(x) by (A1) φi(x)={1hxi+2max(0,ih2h)x<ihh1hx+i(i1)h<xmin(ih,1)0else(A1) where i{1,,n} and h is given by (A2) h=1n1(A2) The second step is to form φ(x) and Φ by substituting (EquationA1) into (Equation21) and (Equation41). The third step starts with computing B and a. By using (Equation25) and using analytical integration methods, we can find B as (A3) B=1h[11001210122101210011](A3) Unlike matrix B, vector a is often computed numerically. This step is followed by forming the linear system of (Equation24). The first and last equations of this system should be removed as the basis functions φ1(x) and φn(x) do not satisfy the Dirichlet boundary condition. We can replace these two equations with the equations derived from the given boundary conditions. By substituting x = 0 into (Equation20) and considering u(0)=0, we obtain (A4) u(0)=i=1nciφi(0)=0c1=0(A4) We now replace the first equation of Bc=a with c1=0. Similarly, by substituting x = 1 into (Equation20) and considering u(1)=0, we obtain an equation in the form of (A5) u(1)=i=1nciφi(1)=0cn=0(A5) which can be used instead of the nth equation of the linear system. Finally, we find the coefficient vector c from the modified matrix equation in this step. The fourth step is to compute H by substituting the obtained value for c into (Equation38) and using numerical integration methods. Finally, having Φ, B and H we can compute A=ΦB1H and construct the computational forward model.

Appendix 2.

Modeling α

The aim of this section is to compute α from α^. To this end, we use a low-pass filter to construct the desired low-frequency field from the Gaussian field γ^(x). This filtering process is formulated by (A6) y=gy^(A6) where vector gRn models the impulse response of a low-pass filter. Combining (Equation48), (Equation50) and (EquationA6) results in (A7) α=gα^(A7) This result is valid only when piece-wise linear functions given by (EquationA1) are used for modeling scalar fields. By using the properties of the cyclic convolution[Citation66], we can re-write (EquationA7) as (A8) α=Gα^(A8) where GRn×n is defined by (A9) Gi,j={gij+11<jign+ij+1i<jn(A9) As seen, the jth column of G can be obtained by circular shift of vector g by j−1 position. Noting that α^ is a known vector from the beginning of the analysis, we just need to find an appropriate realization for the low-pass filter so that we can compute α and γ(x) by using (EquationA8) and (Equation45). Several methods for designing discrete filters, also known as digital filters, have been proposed in the theory of digital signal processing. The design of such filters is not within the scope of this paper. The readers may refer to [Citation67] and [Citation68] for more detail about digital filters. In the following, we only consider Hamming low-pass filters. The detailed derivation of this filter can be found in [Citation68]. For a Hamming low-pass filter, we have: (A10) gi=1g(0.540.46cos2π(i1)n1)sinc(πr(2in1))(A10) where i{1,,n} and 0<r<1 is the normalized cut-off frequency.

Appendix 3.

Estimation of search direction

Here, we use the Gauss-Newton method to solve the problem at hand. To this end, we form the functional (A11) F(α)=A(α)b2(A11) and construct its Taylor series as (A12) F(αo+s)=F(αo)+{F(αo)}Ts+12sT{F(αo)}s+O(s3)(A12) where αoRn is an initial guess for α and sRn is the search direction. To find s we can use the line search method [Citation69] and minimize F(αo+s) by setting F(αo+s) to zero and neglecting O(s3), resulting in (A13) s={F(αo)}1F(αo)(A13) From the definition of the Jacobian matrix [Citation69], F(αo) can be calculated by (A14) F(αo)=J(αo)(A(αo)b)(A14) where J(α) denotes the Jacobian of A(α). From Gauss-Newton approximation [Citation69], (A15) F(αo)=J(αo)TJ(αo)(A15) After substituting (EquationA14) and (EquationA15) into (EquationA13), we have: (A16) s={J(αo)TJ(αo)}1J(αo)(A(αo)b)(A16) More detail on the line search method described above can be found in the third chapter of [Citation69]. The next step is to find the Jacobian of A. Recalling that for the chosen function ρ the ith element of ρ(α) depends on only the ith element of α, we can compute the Jacobian of A from (EquationA13) as: (A17) J(α)=[LeAΛLα](m+n)×n(A17) where (A18) Λ=diag(dρdt(α1),,dρdt(αn))(A18) Now, by substituting J(α) into (EquationA16) we can find s.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.