Next Article in Journal
A Novel Hybrid Method for Short-Term Wind Speed Prediction Based on Wind Probability Distribution Function and Machine Learning Models
Previous Article in Journal
A Combined Method for Preparation of Landslide Susceptibility Map in Izmir (Türkiye)
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Hybrid Whale-Chimp Optimization Algorithm for Structural Damage Detection

1
School of Civil Engineering and Communication, North China University of Water Resources and Electric Power, Zhengzhou 450045, China
2
Collaborative Innovation Center for Efficient Utilization of Water Resources, North China University of Water Resources and Electric Power, Zhengzhou 450046, China
3
School of Civil and Environmental Engineering, Queensland University of Technology (QUT), Brisbane, QLD 4000, Australia
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2022, 12(18), 9036; https://doi.org/10.3390/app12189036
Submission received: 17 August 2022 / Revised: 5 September 2022 / Accepted: 6 September 2022 / Published: 8 September 2022

Abstract

:
Damage detection of structures based on swarm intelligence optimization algorithms is an effective method for structural damage detection and key parts of the field of structural health monitoring. Based on the chimp optimization algorithm (ChOA) and the whale optimization algorithm, this paper proposes a novel hybrid whale-chimp optimization algorithm (W-ChOA) for structural damage detection. To improve the identification accuracy of the ChOA, the Sobol sequence is adopted in the population initialization stage to make the population evenly fill the entire solution space. In addition, to improve the local search ability of the traditional ChOA, the bubble-net hunting mechanism and the random search mechanism of the whale optimization algorithm are introduced into the position update process of the ChOA. In this paper, the validity and applicability of the proposed method are illustrated by a two-story rigid frame model and a simply supported beam model. Simulations show that the presented method has much better performance than the ChOA, especially in dealing with multiple damage detection cases. The W-ChOA has good performance in both overcoming misjudgment and improving computational efficiency, which should be a preferred choice in adoption for structural damage detection.

1. Introduction

Structures usually have a long service life. During their service period, the structural performance will continue to decline due to factors such as temperature changes, chemical erosion, and component aging [1]. Therefore, a timely and accurate assessment of the overall performance of the structure is essential to ensure the safety and long-term service of the building structures [2]. Structural health monitoring technology is used to evaluate the safety and durability of the structure during service to determine the service performance and remaining life of the structure [3,4]. Structural damage detection based on structural properties is a core research topic in structural health monitoring. It has always been a hot topic in academic discussions and research [5,6].
Many scholars have proposed various damage detection methods, which are mainly divided into the following two types: methods based on static characteristics and methods based on dynamic characteristics. Static characteristics of the structure can reflect the stiffness change of the structure more intuitively, which has been studied by many scholars. Pitchai et al. [7] calculated the structural boundary conditions and material properties through the change of structural characteristics under static load, to achieve the goal of identifying the operating state of the structure. Le et al. [8] established an objective function for structural damage detection based on the change of static deflection and carried out structural damage detection by solving the optimal value of the objective function. Emadi et al. [9] performed an inversion analysis of structures including shear effects based on vertical deflection data to identify structural damage. Yang and Sun [10] proposed a method to determine structural damage based on static response equations. Abdo [11] developed a method based on displacement curvature changes to identify structural damage. Boumechra [12] proposed a strategy to identify structural damage based on the deflection change of bridges to update the finite element model. Fang and Huang [13] introduced a model-free structural damage detection method using static measurement data and modal interval analysis to detect damage. Liu et al. [14] presented a method for structural damage detection of statically loaded structures based on the change of internal force and displacement of the finite element model. Caddemi et al. [15] successfully identified the local damage of Euler-Bernoulli beams based on static loads and boundary conditions under the interference of environmental noise. However, these studies based on static characteristics still have some shortcomings, such as the cost being high and the response data being easily disturbed by external factors. Therefore, some researchers begin to pay attention to structural damage detection methods based on dynamic characteristics.
Damage detection methods based on structural dynamic characteristics can be divided into damage detection methods based on dynamic fingerprints [16] and damage detection methods based on model updating [17]. The dynamic fingerprint methods, also known as the modal parameter method, use the modal parameters of the structure as damage factors of the structure, such as natural frequency [18,19], mode shape [20,21,22], flexibility matrix [23,24], modal curvature [25,26] and modal strain energy [27,28]. Usually, when a structural element is damaged, the stiffness of the corresponding element will change, and the modal information will also change. However, obtaining complete modal information for structures requires a large number of sensors, which is difficult to achieve in practical engineering. In addition, the dynamic fingerprint measurement process is easily affected by noise, which limits the development of such methods to a certain extent.
By continuous optimization and adjustment of the physical parameters of the benchmark finite element model, the model updating method is widely used based on the static or dynamic test data of the structure [29,30]. Depending on this, a nonlinear objective function is established according to the parameter changes before and after the updating of the finite element model, which is transformed into a mathematical function optimization problem. Then, the position and degree of structural damage can be detected by optimizing the mathematical function [31]. Structural damage detection based on model updating requires establishing a precise benchmark finite element model, which usually contains many degrees of freedom and multiple correction parameters, resulting in a high-dimensional multi-extremum optimization function [32]. Traditional mathematical function optimization methods are challenging to solve such complex mathematical models. To optimize such mathematical models quickly and accurately, some scholars have introduced the heuristic intelligent algorithm into structural damage detection based on model updating [33,34]. Wang et al. [35] developed a new method of densely connected convolutional networks, which improved the accuracy of structural damage identification. Li et al. [36,37] introduced a variational Bayesian inference approach and phase space embedding with the stochastic Koopman operator to identify structural damage. Sadeghi et al. [38] combined modal strain energy changes and general neural networks to identify structural damage. He et al. [39,40] proposed an indirect structural damage detection strategy and a two-stage structural damage identification method.
Chen et al. [41] adjusted the inertia weight factor of particle swarm optimization by sigmoid function, which improved the identification accuracy of structural damage identification. Gomes et al. [42] introduced the sunflower algorithm into structural damage detection to enhance the robustness of structural damage detection. Pan et al. [43] combined the firefly algorithm with the Nelder-Mead algorithm to detect structural damage. Tiachacht et al. [44] used the modal strain energy ratio as a damage factor to identify the location and degree of structural damage in stages through the slime mould algorithm. Guedria [45] proposed a structural damage identification strategy based on an accelerated differential evolution algorithm. Cao et al. [46] implemented structural damage identification in stages by auto-associative neural networks and Levenberg-Marquardt neural networks. Guo et al. [47] combined partial modal mode shapes and natural frequencies to identify structural damage through artificial intelligence neural networks. Jafarkhani and Masri [48] proposed a structural damage detection strategy based on an adaptive covariance matrix. Ahmadi-Nedushan and Fathnejat [49] combined the flexibility matrix with the modal strain energy to offer an improved teaching-learning optimization algorithm. Fu and Jiang [50] combined the probabilistic neural network and data fusion technology with correlation fractal dimension to identify structural damage. However, for some high-dimensional swarm intelligence algorithms, the convergence speed and identification accuracy can still be improved. Then, the chimp algorithm is introduced as an attempt to solve the optimization problem of structural damage detection.
Inspired by the hunting behavior of the chimp population, the Chimp Optimization Algorithm (ChOA) was first proposed by Khishe and Mosavi in 2020 [51]. ChOA is a heuristic intelligent algorithm with a fast global search ability, which can be used to solve optimization problems. Compared with other similar algorithms, ChOA has fewer parameters and is easier to improve. However, ChOA still suffers from the problem of unbalanced exploration, which leads to premature traps and insufficient identification accuracy. In this regard, some scholars have proposed a few improvement strategies for this method. For instance, Jia et al. [52] improved the optimization ability of the chimp algorithm by using three strategies of highly damaged polynomial edge, Spearman’s rank correlation coefficient, and beetle antennae operator, respectively. Kumari et al. [53] proposed a boosted ChOA by studying different variants of the ChOA. Dhiman [54] proposed a hybrid ChOA based on the Sine-cosine function and the spotted hyena optimizer attack strategy. The paper proposes an improved hybrid whale-chimp optimization algorithm (W-ChOA). Firstly, the Sobol sequence [55] is introduced to initialize the population to enhance the initial convergence speed of the algorithm. Secondly, the multi-strategy hunting mechanism of the whale optimization algorithm [56] is integrated with the hierarchical hunting mechanism of the ChOA to avoid falling into the local optimum. Simulations show that the W-ChOA has good performance in structural damage detection. The article is divided into five sections. The presented W-ChOA is deduced in Section 2. Then, Section 3 details the mathematical model of structural damage detection by the W-ChOA. Numerical simulations of the W-ChOA for structural damage detection and the comparison results with the ChOA are demonstrated in Section 4. Finally, some conclusions are discussed in Section 5.

2. Hybrid Whale-Chimp Optimization Algorithm

2.1. Chimp Optimization Algorithm

The ChOA is a heuristic intelligent algorithm with global fast searchability, which was jointly proposed by Khishe and Mosavi in 2020 [51]. The idea of the ChOA comes from the hunting behavior of the chimp population. Chimps divide labor according to individual abilities into four types: chaser, barrier, driver, and attacker. The four types of chimp groups divide labor and cooperate, perform their duties, and complete hunting activities together. Hunting activities are mainly divided into the exploration stage and exploitation stage. In the exploration stage, barrier, driver, and chaser are mainly used to surround the prey. In the exploitation stage, the attackers mainly complete the final hunting process. The mathematical model can be expressed as
d = c · X prey t m · X chimp t
X chimp t + 1 = X prey t a · d
where represents the absolute value and · represents the multiplication of vectors or matrices. d is the distance vector between the prey and the chimp predator. X prey and X chimp represent the current position vector of the prey and the chimp predator, respectively. t is the current iteration number of the population. m is a chaotic vector in the chaotic cloud map to simulate the influence of chimp sexual motivation in the later stage of exploitation. a and c represent the correlation coefficient vectors, which can be expressed as
a = 2 f · r 1 f ; c = 2 r 2
where   a is a random vector that controls the distance between the chimp and the prey, and its elements are random values between f , f . f is the ability of global search and local search, and its element values decrease nonlinearly from 2.5 to 0 with the increase of the number of iterations. r 1 and r 2 are random vectors in the range of [0, 1], which make the population have diverse characteristics. c is a control coefficient vector of chimps intercepting and chasing prey, and its elements are random values between [0, 2].
In the ChOA, different independent groups can be set to perform a global search and local search simultaneously to accomplish the common goal. The groups of chimps in various leadership levels are established by setting f with successively changes. The dynamic change formulas of f are as follows:
f 1 = 1.95 2 × t 1 4 T max 1 3 f 2 = 1.95 2 × t 1 3 T max 1 4 f 3 = 3 × t 3 T max 3 + 1.5 f 4 = 2 × t 3 T max 3 + 1.5
where T max represents the maximum number of iterations of the population. f 1 , f 2 , f 3 , and f 4 represent the searchability of the attacker, barrier, chaser, and driver, respectively. Vector f is the ability of global search and local search, which is composed of f 1 , f 2 , f 3 , and f 4 .
To establish a more accurate mathematical model for simulating chimp hunting, the chaser, barrier, driver, and attacker of population initialization are assumed to be located in the positions of the four putative prey species. The other chimps in the population will update their location based on the positions of the four putative prey species. The location update rules are as follows:
X c 1 = X attacker a 1 · c 1 · X attacker m 1 · X chimp t X c 2 = X barrier a 2 · c 2 · X barrier m 2 · X chimp t X c 3 = X chaser a 3 · c 3 · X chaser m 3 · X chimp t X c 4 = X driver a 4 · c 4 · X driver m 4 · X chimp t X chimp t + 1 = X c 1 + X c 2 + X c 3 + X c 4 / 4
where X attacker , X barrier , X chaser , and X driver represent the position vectors of the attacker, barrier, chaser, and driver, respectively. The subscripts 1, 2, 3, and 4 represent parameters corresponding to the attacker, barrier, chaser, and driver, respectively. For instance, X c 1 represents the new position vector with the chimp updated according to the positions of the attacker;   a 1 represents the ability vector of the attacker to control the distance between itself and the prey; c 1 represents the correlation coefficients vector preventing the attacker from the prey; m 1 represents the influence of the sexual motivation vector of the attacker during its hunting behavior.
However, food gratification and subsequent social motivation may cause chimps to neglect their hunting duties. Then the chaotic behavior of the chimp population in the final stage is helpful in solving the problem of precociousness and slow convergence when the algorithm faces multi-extremum non-differentiable problems. The location update formula can be improved as follows:
X chimp t + 1 = X prey t a · d i f   μ < 0.5 X chaotic i f   μ 0.5
where μ is a random value in the interval of [0, 1]. X chaotic is the mapped value in the chaotic cloud graph.

2.2. Initialize Population with Sobol Sequence

When using a swarm intelligence algorithm to solve the multi-extremum and non-differentiable problems, the initialization of the population has a great influence on the convergence speed and optimization accuracy. The ChOA uses the random function to initialize the population. The population initialized by random function has good randomness, while lacking ergodicity of the population and easy to cause individual aggregation of the population. Given this, the Sobol sequence [55] is introduced to initialize the chimp population in this study. Compared with the pseudo-random sequence generated by the random function, the Sobol sequence generates a deterministic quasi-random sequence through the Quasi-Monte Carlo method [29]. Assume that the value range of the independent variables in the solution space is X min , X max . The mathematical model with chimp population initialization can be shown as:
X position e = X min + S e · X max X min
where X position e is the position of the chimp in the e -th dimension. S e is e -th the random value generated by the Sobol sequence in the interval of [0, 1].
Assume that the range of the solution space is [0, 1], the search dimension is two and the population number is set to 80. Figure 1 illustrates the spatial distribution of the pseudo-random sequences and the Sobol sequence, respectively. The horizontal and vertical coordinate axes represent the value of the independent variable in each dimension, respectively. As shown in Figure 1, the spatial distribution of the Sobol sequence is more uniform than the pseudo-random sequence. Moreover, the individual population agglomeration phenomenon of the Sobol sequence is significantly lower. Simulation result shows that the spatial distribution of the Sobol sequence has stronger ergodicity than the pseudo-random sequence. Then, the Sobol sequence will be introduced to initialize the chimp population in this study.

2.3. Whale Optimization Algorithm

The whale optimization algorithm is a swarm intelligence optimization algorithm by simulating the foraging behavior of humpback whales [56]. Due to the small diameter of the esophagus, whales only catch krill and small swarming fish for food. Therefore, a unique way of hunting named bubble-net hunting is formed. The whale optimization algorithm realizes the optimization of the objective function by constructing the mathematical model of bubble-net hunting. The whole hunting process can be divided into three stages: shrink and surround the prey, spiral bubble-net attack, and random search mechanism.
The whale population continues to shrink and surround the prey, which reflects the local searchability of the algorithm. The mathematical model of shrinking and surrounding can be shown as follows:
D = C · X t X t
X t + 1 = X t A · D
where X indicates the current position vector of the prey. X is the position vector of the humpback whale. t is the current iteration number of the population. D is the distance vector between the prey and the whale predator. A and C represent the correlation coefficient vectors, which can be expressed as:
A = 2 u · r 3 u ; C = 2 r 4
where u is the convergence coefficient vector, which decreases linearly from 2 to 0 during the iterative process. r 3 and r 4 are random vectors in the interval of [0, 1].
The whale population builds a bubble-net while spiraling upwards. To simulate the mechanism of the spiral bubble-net, it is necessary to simulate the distance between the individual population and the food. Then Equation (9) can be rewritten by the bubble-net hunting mechanism as:
X t + 1 = e q l cos 2 π l D + X t
where D represents the distance between the whale with an optimal position and other whales. q represents the constant of the logarithmic spiral equation. l is a random value in the interval of [−1, 1].
It is worth noting that the optimization strategy of the whale optimization algorithm is based on the calculation of the coefficient vector A . If A exceeds the range of [−1, 1], it indicates that the individual whale is outside the surrounding area of the population bubble-net. At this time, the whale needs to search randomly according to its position and update its position. The optimization strategy reflects the global search performance of the whale optimization algorithm. It is assumed that each whale population has a 50% probability to choose one of the position update mechanisms. Then Equations (8) and (9) can be rewritten by the random search mechanism as:
D = C · X random X t
X t + 1 = X random A · D
where X random is the random position of whales.

2.4. Hybrid Whale-Chimp Optimization Algorithm

The ChOA has a clear theory and few parameters, which has advantages for solving complex optimization problems. However, the algorithm has a fast convergence speed and a simple position update method, which is prone to premature phenomena in the optimization process. In this regard, the location update strategy of the whale optimization algorithm is introduced. To improve the ability of the ChOA to jump out of the local extreme value, it is necessary to update the position of the chimp in the population according to the bubble-net hunting mechanism or the random search mechanism in each iteration process. The specific steps of the W-ChOA are as follows
Step 1: Set relevant parameters, population size N , and the maximum number of iterations T max , convergence factor f , correlation coefficient vectors A , C , chaos factor m , etc. Set the limit of the individual position of the population in the interval of [0, 0.9] and generate the initial population X k , k = 1 ,   2 , ,   N .
Step 2: Calculate the fitness value of the individual and determine the first four optimal solutions X attacker , X barrier , X chaser , and X driver .
Step 3: Update the population position according to the size of random value p and correlation coefficient vector A . If   p < 0.5 and A 1 , the random search mechanism is used for updating the population position according to Equation (13). If   p < 0.5 and A < 1 , the chimp individuals update their population positions with the traditional ChOA according to Equation (5). If p 0.5 , the bubble-net hunting mechanism is used for updating the population position according to Equation (11).
Step 4: Determine whether the algorithm reaches the convergence conditions or the maximum number of iterations. If so, the end of the algorithm and the optimal position X attacker is output; otherwise, step 2 and step 3 are executed to start a new round of iteration.
The W-ChOA combines the advantages of these two algorithms. Compared with the ChOA, the search accuracy and convergence speed of the W-ChOA have been significantly improved. The flowchart of the W-ChOA is shown in Figure 2.

2.5. Verification by Benchmark Functions

To demonstrate the effectiveness of the W-ChOA, three classical benchmark functions are used for verification. The search ranges, global optima, and function graphs of these benchmark functions are shown in Table 1. All three benchmark functions are high-dimensional multimodal functions. Both the ChOA and the W-ChOA are verified by these benchmark functions with the same input parameters. The population size N = 50 and the maximum number of iterations T max = 400 . The chaotic vector m is selected as Gauss chaotic cloud map. Repeat each calculation ten times and the calculation results are shown in Table 2 and Figure 3.
Table 2 lists the optimal fitness values and average fitness values of three benchmark functions by the ChOA and the W-ChOA, respectively. As shown in Table 2, when adopted to solve a high-dimensional multimodal function, the ChOA is prone to fall into local traps and easy to obtain unsatisfactory results. By introducing the bubble-net hunting mechanism and the Sobol sequence in the ChOA, the W-ChOA can obtain much better optimal values of these functions whether the average values or the minimum values. As shown in Figure 3, the W-ChOA has a significantly faster convergence speed than the ChOA. Test function verification results show that the W-ChOA can be used to enhance the optimization ability and calculation efficiency of the ChOA.

3. Mathematical Model of Structural Damage Detection

3.1. Definition of Structural Damage

Damage detection of structures based on model updating is a common theoretical method in the field of structural damage detection. Generally speaking, without considering the damping of the structure, the vibration differential equation of the structure can be expressed as:
K ω 2 M Φ = 0
where K and M represent the global stiffness matrix and the global mass matrix of the structure, respectively. ω and Φ represent the frequency and the mode shape matrix of the structure, respectively.
The location and degree of structural damage can be detected by identifying changes in structural modal parameters, ω and Φ . The modal parameters of the structure are only related to the stiffness matrix and mass matrix of the structure as shown in Equation (14). Therefore, the damage of the structure can be simulated by changing the stiffness or mass of the structure. In this study, the structural damages are simulated by reducing the stiffness of the structure.
Based on the finite element theory, the model of the detected structure can be divided into Q elements. The stiffness matrix of the structure with damages can be expressed as:
K d = j = 1 Q 1 α j K e j
where K d represents the global stiffness matrix of the structure under damaged condition and K e j represents the intact condition of the j -th element, respectively. The damage factor α j belongs to (0, 0.90) in this paper, which represents the stiffness reduction coefficient of the j -th element.

3.2. Definition of Objective Function

Inspired by the model updating method, the measured responses of the structure and the finite element model information of the structure are used to establish the objective function. The frequency and mode shape can be calculated from the finite element model of the structure and also can be measured from the structure in the laboratory, respectively. Then, the modal information under the two conditions is compared by the modal guarantee criterion and the objective function. Finally, structural damage detection can be transformed into a function optimization problem with constraints. The objective function of this study can be expressed as:
min f α = i = 1 s 1 M A C Φ i m , Φ i c + E R ω i m , ω i c
where Φ i m and ω i m represent the measured i -th mode shape vector and frequency of the structure, respectively. Φ i c and ω i c represent the calculated i -th mode shape vector and frequency of the finite element model of the structure, respectively. s represents the selected structural modal order. α represents the damage factor of each element. M A C Φ i m , Φ i c and E R ω i m , ω i c represent change rate of the modal confidence and frequency of the structure, respectively. The functions can be defined as:
M A C Φ i m , Φ i c = Φ i m T Φ i c 2 Φ i m T Φ i m Φ i c T Φ i c
E R ω i m , ω i c = ω i m ω i c ω i m × 100 %
where superscript T represents the transpose of a matrix.
By defining the structural damage and the objective function, structural damage detection can be converted to solve the independent variable α corresponding to the optimal value of the objective function. Then, the ChOA and the proposed W-ChOA can be used to identify the location and degree of structural damage.

4. Numerical Simulations

4.1. Structural Damage Detection of Two-Story Rigid Frame

A two-story rigid frame structure is divided into 18 elements, as shown in Figure 4. The numbers in the circles represent the element number and the other numbers represent the node number. To prevent the interference of other factors, the nodes of the two-story rigid frame are all set as steel nodes. The overall degree of freedom of the structure is 16 and the first type of constraint is used to prevent rigid body displacement. Physical parameters of the two-story rigid frame structure are listed in Table 3 as follows:
To simplify the comparison process, both the ChOA and the W-ChOA use the same parameters. The parameters are set as: population size N = 50 and maximum iterations T max = 200 . Modal order is set to five and search dimension is set to 18. The optimal value is selected by running five times for each case. Excluding the set of real damage elements, damage detection values greater than 10−3 are considered misjudgments.
In structures, the failure of the frame structure often occurs in the mid-span where it is subjected to a big bending moment. Therefore, the damage simulation is set in the middle element of the beam. The damage degree is realized by reducing the stiffness of the element. As listed in Table 4, the stiffness of the elements is reduced by 10% to simulate different damage situations of the frame structure. In addition, to accurately simulate the effects of measurement errors on natural frequency and mode shape, random noise is added to the measured modal parameter, as shown:
S noise = S original 1 + R p N variable
where S noise is the modal parameter with noise variable. S original is the original modal parameter of the rigid frame. R p , N variable represents the noise level and the type of noise subject to the standard normal distribution, respectively.
Figure 5 shows the single damage results by the ChOA and the W-ChOA under different noise levels. As shown in Figure 5a, if the damage percent is 10% and the noise level is 5%, the W-ChOA can accurately identify damage location and damage degree at element 17 without misjudgment. In contrast, the identification results of the ChOA have a misjudgment at element 2. As shown in Figure 5b, if the damage percent is 10% and the noise level is 10%, both the ChOA and the W-ChOA have a misjudgment at element 2 and the misjudgment value of the ChOA is greater than the W-ChOA.
Figure 6 shows the double damage detection results by the ChOA and the W-ChOA under different noise levels. As shown in Figure 6a, if the damage percent is 10% and the noise level is 5%, the W-ChOA can accurately identify damage location and damage degree at element 8 and element 17 without misjudgment. In contrast, the identification results of the ChOA have a misjudgment at element 3. As shown in Figure 6b, if the damage percent is 10% and the noise level is 10%, the ChOA results have three misjudgments in element 2, element 10, and element 11. The identification results of the W-ChOA are much better with only one misjudgment at element 11.
Figure 7 shows the triple damage detection results by the ChOA and the W-ChOA under different noise levels. As shown in Figure 7a, if the damage percent is 10% and the noise level is 5%, the W-ChOA can accurately identify damage location and damage degree at element 5, element 8, and element 17 with only one misjudgment at element 11. In contrast, the identification results of the ChOA have four misjudgments in element 2, element 3, element 7, and element 13. As shown in Figure 7b, if the damage percentage is 10% and the noise level is 10%, the ChOA results have nine misjudgments. The identification results of the W-ChOA are much better with only one misjudgment at element 11.
With the increase in noise level, the identification accuracy of the ChOA reduces significantly. Compared with the ChOA, the W-ChOA shows remarkable robustness. In addition, with the increase of damage elements, the misjudgments of the ChOA increase significantly. As shown in Figure 7b, the number of misjudgment damage elements of the ChOA even reaches nine. Compared with the ChOA, the W-ChOA shows perfect case stability. With three different damage cases, the maximum number of misjudgment damage elements of the W-ChOA is only one.
The mathematical model of multi-damage detection has multiple global optimal values, which causes the optimization algorithm to be easily disturbed during the iterative optimization process. By introducing the Sobol population initialization strategy, the bubble-net hunting mechanism, and the random search mechanism of the whale optimization algorithm, the W-ChOA shows significantly better performance than the ChOA algorithm in multi-damage detection cases. Simulation results of the two-story rigid frame show that both the ChOA and the W-ChOA have good performance in the single-damage detection case with a low noise level. When the noise level is high or multi-damage exists in the structure, the W-ChOA shows its superiority over the ChOA algorithm regarding damage detection accuracy and robustness.

4.2. Structural Damage Detection of Both Asymmetric Damage and Symmetric Damage

To verify the universality of the proposed method in both asymmetric damage and symmetric damage, a simply supported beam is shown in Figure 8. Physical parameters of the beam are as follows: The beam length L = 2.5   m , the section width b = 0.15   m , the section height h = 0.02   m , the elastic modulus E = 7 × 10 10 Pa , and the material density ρ = 2750   kg / m 3 . The simply supported beam is divided into 10 elements, each element has two nodes and four degrees of freedom. Assume that the axial deformation is ignored and only the vertical degrees of freedom of each element are extracted from the modal shape during damage detection.
In this simulation example, the search dimension of the W-ChOA is set to 10 and other parameter settings are the same as in the previous simulation example. As shown in Table 5, the stiffness of the elements is reduced by 10% to simulate different damage cases of the simply supported beam. Random noise is also added to the measured modal parameters as shown in Equation (19).
Figure 9 shows the single structural damage detection results of the simply supported beam by the ChOA and the W-ChOA under different noise levels. In this case, both the ChOA and the W-ChOA have perfect damage identification results without any misjudgment.
Figure 10 shows the double damage detection results of the simply supported beam by the ChOA and the W-ChOA under different noise levels. As shown in Figure 10, if the damage percent is 10% and the noise level is 5% or 10%, the W-ChOA can accurately identify damage location and damage degree at element 3 and element 7 without any misjudgment. In contrast, the identification results of the ChOA have more than two misjudgments in this case.
Figure 11 shows the triple damage detection results of the simply supported beam by the ChOA and the W-ChOA under different noise levels. As shown in Figure 11a, if the damage percent is 10% and the noise level is 5%, the W-ChOA can accurately identify damage location and damage degree at element 3, element 7, and element 9 with only one misjudgment at element 4. In contrast, the identification results of the ChOA have four misjudgments in element 1, element 2, element 4, and element 5. As shown in Figure 11b, if the damage percentage is 10% and the noise level is 10%, the ChOA results have five misjudgments. The identification results of the W-ChOA are much better with only two misjudgments in element 1 and element 6.
Figure 9, Figure 10 and Figure 11 show the damage detection results of the simply supported beam in asymmetric damage cases. To satisfy the integrity of numerical simulation, Figure 12 illustrates the damage detection results of the simply supported beam in the symmetric damage case.
As shown in Figure 12, if the damage percent is 10% and the noise level is 5% or 10% in the symmetric damage case, the W-ChOA can accurately identify damage location and damage degree at element 2 and element 9 without any misjudgment. In contrast, the identification results of the ChOA have more than two misjudgments in this case.
Based on the simulation results of the simply supported beam, some conclusions similar to the previous example can be drawn. That is, the W-ChOA shows better case stability and higher robustness compared with the ChOA. Especially when the noise level is high or multi-damage exists in the structure, the W-ChOA shows its superiority over the ChOA algorithm both in terms of asymmetric damage cases and symmetric damage cases.

5. Conclusions

In this study, a hybrid whale-chimp optimization algorithm (W-ChOA) is proposed for structural damage detection. Numerical simulations of a two-story rigid frame and a simply supported beam model are adopted to verify the effectiveness of the novel algorithm, and the following conclusions can be drawn:
(1)
With these three high-dimensional multimodal test functions, similar conclusions can be drawn. The calculation accuracy and convergence efficiency of the W-ChOA are significantly better than those of the basic ChOA. Test function verification results show that the hunting mechanism of the whale optimization algorithm and the Sobol sequence introduced in the ChOA are practical and successful.
(2)
Validated by a two-story rigid frame model and a simply supported beam model, the W-ChOA can effectively identify the damage location and damage degree in both single-damage and multi-damage condition. In cases with extensive noise interference or multi-damage existing in the structure, the high misjudgment rate of the ChOA has been effectively reduced and improved by adopting the W-ChOA.
(3)
Compared with the ChOA, the proposed W-ChOA has much better performance such as fast convergence speed, high identification accuracy, good case stability, and strong robustness when applied to structural damage detection both in asymmetric damage cases and symmetric damage cases. Due to the excellent performance in different simulations, the W-ChOA is strongly recommended for structural damage detection.
(4)
For actual structures, the influence of external environmental factors such as temperature and humidity on the modal parameters of the structure is sometimes even greater than the effect of noise. Therefore, the proposed method still needs to consider environmental influences to be better applied to the actual structure. In addition, the parameters of the W-ChOA need to be further refined for appropriate application in the field of structural damage detection.

Author Contributions

Conceptualization, X.L.; Data curation, K.Z.; Funding acquisition, Z.C.; Investigation, T.H.T.C.; Project administration, S.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work is jointly supported by the National Natural Science Foundation of China (Grant Number U2004184), Training Plan for Young Key Teachers in Colleges and Universities in Henan Province (Grant Number 2021GGJS078), Key Sci-Tech Research Project of Henan, China (202102310272), and Special Joint Research Project of Zhengzhou City and NCWU, China (2021014).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Abdeljaber, O.; Avci, O.; Kiranyaz, S.; Inman, D.J. Real-time vibration-based structural damage detection using one-dimensional convolutional neural networks. J. Sound Vib. 2017, 388, 154–170. [Google Scholar] [CrossRef]
  2. Kim, S.; Frangopol, D.M. Multi-objective probabilistic optimum monitoring planning considering fatigue damage detection, maintenance, reliability, service life and cost. Struct. Multidiscip. Optim. 2018, 57, 39–54. [Google Scholar] [CrossRef]
  3. Gulgec, N.S.; Takáč, M.; Pakzad, S.N. Structural sensing with deep learning: Strain estimation from acceleration data for fatigue assessment. Comput-Aided. Civ. Inf. 2020, 35, 1349–1364. [Google Scholar] [CrossRef]
  4. Bao, Y.Q.; Chen, Z.C.; Wei, S.Y.; Xu, Y.; Tang, Z.Y.; Li, H. The state of the art of data science and engineering in structural health monitoring. Eng. Prc. 2019, 5, 234–242. [Google Scholar] [CrossRef]
  5. Gharehbaghi, V.R.; Farsangi, E.N.; Noori, M.; Yang, T.Y.; Li, S.F.; Nguyen, A.; Málaga-Chuquitaype, C.; Gardoni, P.; Mirjalili, S. A critical review on structural health monitoring: Definitions, methods, and perspectives. Arch. Comput. Method Eng. 2021, 29, 2209–2235. [Google Scholar] [CrossRef]
  6. Li, J.T.; Zhu, X.Q.; Guo, J. Enhanced drive-by bridge modal identification via dual Kalman filter and singular spectrum analysis. Struct. Control Health 2022, 29, e2927. [Google Scholar] [CrossRef]
  7. Pitchai, P.; Saravanan, U.; Goswami, R. Mechanics-based algorithms to determine the current state of a bridge using quasi-static loading and strain measurement. Struct. Health Monit. 2019, 18, 1874–1888. [Google Scholar] [CrossRef]
  8. Le, N.T.; Thambiratnam, D.P.; Nguyen, A.; Chan, T.H.T. A new method for locating and quantifying damage in beams from static deflection changes. Eng. Struct. 2019, 180, 779–792. [Google Scholar] [CrossRef]
  9. Emadi, S.; Lozano-Galant, J.A.; Xia, Y.; Ramos, G.; Turmo, J. Structural system identification including shear deformation of composite bridges from vertical deflections. Steel Compos. Struct. 2019, 32, 731–741. [Google Scholar]
  10. Yang, Q.W.; Sun, B.X. Structural damage localization and quantification using static test data. Struct. Health Monit. 2011, 10, 381–389. [Google Scholar] [CrossRef]
  11. Abdo, M.A.B. Parametric study of using only static response in structural damage detection. Eng. Struct. 2012, 34, 124–131. [Google Scholar] [CrossRef]
  12. Boumechra, N. Damage detection in beam and truss structures by the inverse analysis of the static response due to moving loads. Struct. Control Health 2017, 24, e1972. [Google Scholar] [CrossRef]
  13. Fang, S.E.; Huang, J.Y. Statics-based model-free damage detection under uncertainties using modal interval analysis. Materials 2020, 13, 1567. [Google Scholar] [CrossRef]
  14. Liu, K.; Law, S.S.; Zhu, X.Q. A layered beam element for modeling de-bonding of steel bars in concrete and its detection using static measurements. Struct. Control Health 2018, 25, e2142. [Google Scholar] [CrossRef]
  15. Caddemi, S.; Caliò, I.; Cannizzaro, F.; Morassi, A. A procedure for the identification of multiple cracks on beams and frames by static measurements. Struct. Control Health 2018, 25, e2194. [Google Scholar] [CrossRef]
  16. Hou, R.R.; Xia, Y. Review on the new development of vibration-based damage identification for civil engineering structures: 2010–2019. J. Sound Vib. 2021, 491, 115741. [Google Scholar] [CrossRef]
  17. Alkayem, N.F.; Cao, M.S.; Zhang, Y.F.; Bayat, M.; Su, Z.Q. Structural damage detection using finite element model updating with evolutionary algorithms: A survey. Neural Comput. Appl. 2018, 30, 389–411. [Google Scholar] [CrossRef]
  18. Sha, G.G.; Radzieński, M.; Cao, M.S.; Ostachowicz, W. A novel method for single and multiple damage detection in beams using relative natural frequency changes. Mech. Syst. Signal Pract. 2019, 132, 335–352. [Google Scholar] [CrossRef]
  19. Pan, J.W.; Zhang, Z.F.; Wu, J.R.; Ramakrishnan, K.R.; Singh, H.K. A novel method of vibration modes selection for improving accuracy of frequency-based damage detection. Compos. Part B Eng. 2019, 159, 437–446. [Google Scholar] [CrossRef]
  20. Chen, J.G.; Büyüköztürk, O. A symmetry measure for damage detection with mode shapes. J. Sound Vib. 2017, 408, 123–137. [Google Scholar] [CrossRef]
  21. He, W.Y.; Ren, W.X.; Zuo, X.H. Mass-normalized mode shape identification method for bridge structures using parking vehicle-induced frequency change. Struct. Control Health 2018, 25, e2174. [Google Scholar] [CrossRef]
  22. Vafaei, M.; Alih, S.C. Adequacy of first mode shape differences for damage identification of cantilever structures using neural networks. Neural Comput. Appl. 2018, 30, 2509–2518. [Google Scholar] [CrossRef]
  23. Li, J.; Wu, B.S.; Zeng, Q.C.; Lim, C.W. A generalized flexibility matrix based approach for structural damage detection. J. Sound Vib. 2010, 329, 4583–4587. [Google Scholar] [CrossRef]
  24. Yang, S.Q.; Huang, Y. Damage identification method of prestressed concrete beam bridge based on convolutional neural network. Neural Comput. Appl. 2021, 33, 535–545. [Google Scholar] [CrossRef]
  25. Ciambella, J.; Pau, A.; Vestroni, F. Modal curvature-based damage localization in weakly damaged continuous beams. Mech. Syst. Signal Pract. 2019, 121, 171–182. [Google Scholar] [CrossRef]
  26. Garrido, H.; Domizio, M.; Curadelli, O.; Ambrosini, D. Numerical, statistical and experimental investigation on damage quantification in beams from modal curvature. J. Sound Vib. 2020, 485, 115591. [Google Scholar] [CrossRef]
  27. Ghasemi, M.R.; Nobahari, M.; Shabakhty, N. Enhanced optimization-based structural damage detection method using modal strain energy and modal frequencies. Eng. Comput. 2018, 34, 637–647. [Google Scholar] [CrossRef]
  28. Wang, Y.; Thambiratnam, D.P.; Chan, T.H.T.; Nguyen, A. Method development of damage detection in asymmetric buildings. J. Sound Vib. 2018, 413, 41–56. [Google Scholar] [CrossRef]
  29. Lam, H.F.; Yang, J.H.; Au, S.K. Markov chain Monte Carlo-based Bayesian method for structural model updating and damage detection. Struct. Control Health 2018, 25, e2140. [Google Scholar] [CrossRef]
  30. Yuan, Z.; Liang, P.; Silva, T.; Yu, K.P.; Mottershead, J.E. Parameter selection for model updating with global sensitivity analysis. Mech. Syst. Signal Pract. 2019, 115, 483–496. [Google Scholar] [CrossRef]
  31. Dinh-Cong, D.; Nguyen-Thoi, T. An effective damage identification procedure using model updating technique and multi-objective optimization algorithm for structures made of functionally graded materials. Eng. Comput. 2021, 1–19. [Google Scholar] [CrossRef]
  32. Hattab, O.; Chaari, M.; Franchek, M.A.; Wassar, T. An adaptive modeling approach to structural health monitoring of multistory buildings. J. Sound Vib. 2019, 440, 239–255. [Google Scholar] [CrossRef]
  33. Tran-Ngoc, H.; He, L.Q.; Reynders, E.; Khatir, S.; Xuan, T.L.; De Roeck, G.; Tien, T.B.; Wahab, M.A. An efficient approach to model updating for a multispan railway bridge using orthogonal diagonalization combined with improved particle swarm optimization. J. Sound Vib. 2020, 476, 115315. [Google Scholar] [CrossRef]
  34. Chen, D.C.; Li, Y.Y. A development on multimodal optimization technique and its application in structural damage detection. Appl. Soft Comput. 2020, 91, 106264. [Google Scholar] [CrossRef]
  35. Wang, R.; Li, J.; Chencho; An, S.; Hao, H.; Liu, W.; Li, L. Densely connected convolutional networks for vibration based structural damage identification. Eng. Struct. 2021, 245, 112871. [Google Scholar] [CrossRef]
  36. Ni, P.H.; Li, J.; Hao, H.; Han, Q.; Du, X.L. Probabilistic model updating via variational Bayesian inference and adaptive Gaussian process modeling. Comput. Methods Appl. Mech. Eng. 2021, 383, 113915. [Google Scholar] [CrossRef]
  37. Peng, Z.; Li, J.; Hao, H. Data driven structural damage assessment using phase space embedding and Koopman operator under stochastic excitations. Eng. Struct. 2022, 255, 113906. [Google Scholar] [CrossRef]
  38. Sadeghi, F.; Yu, Y.; Zhu, X.Q.; Li, J.C. Damage identification of steel-concrete composite beams based on modal strain energy changes through general regression neural network. Eng. Struct. 2021, 244, 112824. [Google Scholar] [CrossRef]
  39. He, W.Y.; Ren, W.X.; Cao, L.; Wang, Q. FEM free damage detection of beam structures using the deflections estimated by modal flexibility matrix. Int. J. Struct. Stab. Dy. 2021, 21, 2150128. [Google Scholar] [CrossRef]
  40. He, W.Y.; Zhu, S.Y.; Ren, W.S. Two-phase damage detection of beam structures under moving load using multi-scale wavelet signal processing and wavelet finite element model. Appl. Math. Model. 2019, 66, 728–744. [Google Scholar] [CrossRef]
  41. Chen, Z.; Wang, Y.R.; Chan, T.H.T.; Li, X.K.; Zhao, S.B. A particle swarm optimization algorithm with sigmoid increasing inertia weight for structural damage identification. Appl. Sci. 2022, 12, 3429. [Google Scholar] [CrossRef]
  42. Gomes, G.F.; da Cunha, S.S.; Ancelotti, A.C. A sunflower optimization (SFO) algorithm applied to damage identification on laminated composite plates. Eng. Comput. 2019, 35, 619–626. [Google Scholar] [CrossRef]
  43. Pan, C.D.; Yu, L.; Chen, Z.P.; Luo, W.F.; Liu, H.L. A hybrid self-adaptive Firefly-Nelder-Mead algorithm for structural damage detection. Smart Struct. Syst. 2016, 17, 957–980. [Google Scholar] [CrossRef]
  44. Tiachacht, S.; Khatir, S.; Thanh, C.L.; Rao, R.V.; Mirjalili, S.; Wahab, M.A. Inverse problem for dynamic structural health monitoring based on slime mould algorithm. Eng. Comput. 2021, 38, 2205–2228. [Google Scholar] [CrossRef]
  45. Ben Guedria, N. An accelerated differential evolution algorithm with new operators for multi-damage detection in plate-like structures. Appel. Math. Model. 2020, 80, 366–383. [Google Scholar] [CrossRef]
  46. Cao, M.S.; Ding, Y.J.; Ren, W.X.; Wang, Q.; Ragulskis, M.; Ding, Z.C. Hierarchical wavelet-aided neural intelligent identification of structural damage in noisy conditions. Appl. Sci. 2017, 7, 391. [Google Scholar] [CrossRef]
  47. Guo, J.M.; Wu, J.L.; Guo, J.H.; Jiang, Z.Y. A damage identification approach for offshore jacket platforms using partial modal results and artificial neural networks. Appl. Sci. 2018, 8, 2173. [Google Scholar] [CrossRef]
  48. Jafarkhani, R.; Masri, S.F. Finite element model updating using evolutionary strategy for damage detection. Comput. Aided. Civ. 2011, 26, 207–224. [Google Scholar] [CrossRef]
  49. Ahmadi-Nedushan, B.; Fathnejat, H. A modified teaching-learning optimization algorithm for structural damage detection using a novel damage index based on modal flexibility and strain energy under environmental variations. Eng. Comput. 2022, 38, 1–32. [Google Scholar] [CrossRef]
  50. Fu, C.; Jiang, S.F. A hybrid data-fusion system by integrating CFD and PNN for structural damage identification. Appl. Sci. 2021, 11, 8272. [Google Scholar] [CrossRef]
  51. Khishe, M.; Mosavi, M.R. Chimp optimization algorithm. Expert Syst. Appl. 2020, 149, 113338. [Google Scholar] [CrossRef]
  52. Jia, H.M.; Sun, K.J.; Zhang, W.Y.; Leng, X. An enhanced chimp optimization algorithm for continuous optimization domains. Complex Intell. Syst. 2022, 8, 65–82. [Google Scholar] [CrossRef]
  53. Kumari, C.L.; Kamboj, V.K.; Bath, S.K.; Tripathi, S.L.; Khatri, M.; Sehgal, S. A boosted chimp optimizer for numerical and engineering design optimization challenges. Eng. Comput. 2022, 1–52. [Google Scholar] [CrossRef]
  54. Dhiman, G. SSC: A hybrid nature-inspired meta-heuristic optimization algorithm for engineering applications. Knowl-Based Syst. 2021, 222, 106926. [Google Scholar] [CrossRef]
  55. Tharwat, A.; Schenck, W. Population initialization techniques for evolutionary algorithms for single-objective constrained optimization problems: Deterministic vs. stochastic techniques. Swarm Evol. Comput. 2021, 67, 100952. [Google Scholar] [CrossRef]
  56. Mirjalili, S.; Lewis, A. The whale optimization algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
Figure 1. Spatial distribution of two methods. (a) Spatial distribution of pseudo-random sequences. (b) Spatial distribution of Sobol sequences.
Figure 1. Spatial distribution of two methods. (a) Spatial distribution of pseudo-random sequences. (b) Spatial distribution of Sobol sequences.
Applsci 12 09036 g001
Figure 2. Flow chart of the chimp-whale optimization algorithm.
Figure 2. Flow chart of the chimp-whale optimization algorithm.
Applsci 12 09036 g002
Figure 3. Convergence curves of three benchmark functions. (a) Rastrigin function. (b) Quartic function. (c) Griewank function.
Figure 3. Convergence curves of three benchmark functions. (a) Rastrigin function. (b) Quartic function. (c) Griewank function.
Applsci 12 09036 g003
Figure 4. Finite element model of rigid frame.
Figure 4. Finite element model of rigid frame.
Applsci 12 09036 g004
Figure 5. Single damage detection results of two-story rigid frame by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Figure 5. Single damage detection results of two-story rigid frame by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Applsci 12 09036 g005
Figure 6. Double damage detection results of two-story rigid frame by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Figure 6. Double damage detection results of two-story rigid frame by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Applsci 12 09036 g006aApplsci 12 09036 g006b
Figure 7. Triple damages detection results of two-story rigid frame by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Figure 7. Triple damages detection results of two-story rigid frame by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Applsci 12 09036 g007
Figure 8. Finite element model of the simply supported beam.
Figure 8. Finite element model of the simply supported beam.
Applsci 12 09036 g008
Figure 9. Single damage detection results of the simply supported beam by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Figure 9. Single damage detection results of the simply supported beam by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Applsci 12 09036 g009
Figure 10. Double damages detection results of the simply supported beam by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Figure 10. Double damages detection results of the simply supported beam by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Applsci 12 09036 g010aApplsci 12 09036 g010b
Figure 11. Triple damages detection results of the simply supported beam by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Figure 11. Triple damages detection results of the simply supported beam by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Applsci 12 09036 g011
Figure 12. Symmetric damages detection results of the simply supported beam by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Figure 12. Symmetric damages detection results of the simply supported beam by two chimp-based optimization algorithms. (a) 5% noise level. (b) 10% noise level.
Applsci 12 09036 g012
Table 1. Three classic benchmark functions.
Table 1. Three classic benchmark functions.
FunctionFunction ExpressionRange f m i n Landscape
Rastrigin f 1 x = g = 1 30 x g 2 10 cos 2 π x g + 10 5.12 , 5.12 0 Applsci 12 09036 i001
Quartic f 2 x = g = 1 30 g x g 4 + random 0 , 1 ) 1.28 , 1.28 0 Applsci 12 09036 i002
Griewank f 3 x = 1 400 g = 1 30 x g 2 g = 1 30 x g g + 1 600 , 600 0 Applsci 12 09036 i003
Table 2. Test results of benchmark functions.
Table 2. Test results of benchmark functions.
FunctionCalculated PerformanceChOAW-ChOA
RastriginOptimal value 5.68 × 10 14 0
Average value 3.72 × 10 9 2.96 × 10 13
QuarticOptimal value 3.34 × 10 4 1.57 × 10 4
Average value 1.66 × 10 3 6.27 × 10 4
GriewankOptimal value 5.68 × 10 14 0
Average value 2.59 × 10 12 5.80 × 10 14
Table 3. Physical parameters of rigid frame structure.
Table 3. Physical parameters of rigid frame structure.
Physical ParameterColumnBeam
Elasticity modulus (N/m2)2.0 × 10112.0 × 1011
Moment of sectional inertia (m4)1.26 × 10−52.36 × 10−5
Sectional area (m2)2.98 × 10−33.20 × 10−3
Density (kg/m3)85907593
Table 4. Different damage cases of two-story rigid frame.
Table 4. Different damage cases of two-story rigid frame.
CaseDamagesDamage ElementsDegree of Damage
1Single damage1710%
2Double damages8, 1710%, 10%
3Triple damages5, 8, 1710%, 10%, 10%
Table 5. Different damage cases of the simply supported beam.
Table 5. Different damage cases of the simply supported beam.
CaseTypeElementDegree of Damage
1asymmetric310%
23, 710%, 10%
33, 7, 910%, 10%, 10%
4symmetric2, 910%, 10%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Chen, Z.; Zhang, K.; Chan, T.H.T.; Li, X.; Zhao, S. A Novel Hybrid Whale-Chimp Optimization Algorithm for Structural Damage Detection. Appl. Sci. 2022, 12, 9036. https://doi.org/10.3390/app12189036

AMA Style

Chen Z, Zhang K, Chan THT, Li X, Zhao S. A Novel Hybrid Whale-Chimp Optimization Algorithm for Structural Damage Detection. Applied Sciences. 2022; 12(18):9036. https://doi.org/10.3390/app12189036

Chicago/Turabian Style

Chen, Zhen, Kun Zhang, Tommy H. T. Chan, Xiaoke Li, and Shunbo Zhao. 2022. "A Novel Hybrid Whale-Chimp Optimization Algorithm for Structural Damage Detection" Applied Sciences 12, no. 18: 9036. https://doi.org/10.3390/app12189036

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop