• Title/Summary/Keyword: subset selection and model updating

Search Result 3, Processing Time 0.014 seconds

A two-stage damage detection approach based on subset selection and genetic algorithms

  • Yun, Gun Jin;Ogorzalek, Kenneth A.;Dyke, Shirley J.;Song, Wei
    • Smart Structures and Systems
    • /
    • v.5 no.1
    • /
    • pp.1-21
    • /
    • 2009
  • A two-stage damage detection method is proposed and demonstrated for structural health monitoring. In the first stage, the subset selection method is applied for the identification of the multiple damage locations. In the second stage, the damage severities of the identified damaged elements are determined applying SSGA to solve the optimization problem. In this method, the sensitivities of residual force vectors with respect to damage parameters are employed for the subset selection process. This approach is particularly efficient in detecting multiple damage locations. The SEREP is applied as needed to expand the identified mode shapes while using a limited number of sensors. Uncertainties in the stiffness of the elements are also considered as a source of modeling errors to investigate their effects on the performance of the proposed method in detecting damage in real-life structures. Through a series of illustrative examples, the proposed two-stage damage detection method is demonstrated to be a reliable tool for identifying and quantifying multiple damage locations within diverse structural systems.

Regularization Method by Subset Selection for Structural Damage Detection (구조손상 탐색을 위한 부 집합 선택에 의한 정규화 방법)

  • Yun, Gun-Jin;Han, Bong-Koo
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.1
    • /
    • pp.73-82
    • /
    • 2008
  • In this paper, a new regularization method by parameter subset selection method is proposed based on the residual force vector for damage localization. Although subset selection using the fundamental modal characteristics as a residual function has been successful in detecting a single damage location, this method seems to have limited capabilities in the detection of multiple damage locations and typically requires cumbersome weighting values. The method is presented herein and considers cases in which damage detection must be achieved using incomplete measurements of the structural responses. Model expansion is incorporated to deal with this challenge. The unique advantage of employing the new regularization method is that it can reliably identify multiple damage locations. Through an illustrative example, the proposed damage detection method is demonstrated to be a reliable tool for identifying multiple damage locations for a planar truss structure.

Real-time Classification of Internet Application Traffic using a Hierarchical Multi-class SVM

  • Yu, Jae-Hak;Lee, Han-Sung;Im, Young-Hee;Kim, Myung-Sup;Park, Dai-Hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.859-876
    • /
    • 2010
  • In this paper, we propose a hierarchical application traffic classification system as an alternative means to overcome the limitations of the port number and payload based methodologies, which are traditionally considered traffic classification methods. The proposed system is a new classification model that hierarchically combines a binary classifier SVM and Support Vector Data Descriptions (SVDDs). The proposed system selects an optimal attribute subset from the bi-directional traffic flows generated by our traffic analysis system (KU-MON) that enables real-time collection and analysis of campus traffic. The system is composed of three layers: The first layer is a binary classifier SVM that performs rapid classification between P2P and non-P2P traffic. The second layer classifies P2P traffic into file-sharing, messenger and TV, based on three SVDDs. The third layer performs specialized classification of all individual application traffic types. Since the proposed system enables both coarse- and fine-grained classification, it can guarantee efficient resource management, such as a stable network environment, seamless bandwidth guarantee and appropriate QoS. Moreover, even when a new application emerges, it can be easily adapted for incremental updating and scaling. Only additional training for the new part of the application traffic is needed instead of retraining the entire system. The performance of the proposed system is validated via experiments which confirm that its recall and precision measures are satisfactory.