Subspace exclusion zones for damage localization

Dionisio Bernal, Martin Dalgaard Ulriksen

Research output: Contribution to journalJournal articleResearchpeer-review

8 Citations (Scopus)

Abstract

If a subdomain of a structural system is introduced to a perturbation, the resulting shifts in any field quantity outside the boundary of some closed region encompassing the perturbation can be generated from stress fields acting on the aforementioned boundary. In the present paper, this is exploited in the context of structural damage localization to cast the Subspace Exclusion Zone (SEZ) scheme, which locates damage by inspecting the feasibility of generating the observed shifts from actions acting at the boundary of the postulated zones in a model of the structure in question. As such, the SEZ scheme is a forward interrogation that allows for a user-defined localization resolution and, under certain input conditions, operates without the use of system identification. The approach is most conveniently implemented in the Laplace domain and holds at s-values for which the load vector in the reference and the damaged states are proportional. The constraint that ensures exact results in an idealized model context is that the number of measurements outside any considered exclusion zone (EZ) exceeds the number of DOF on its boundary. It is shown, however, that useful results can be obtained with notably smaller sensor counts. The paper illustrates application of the SEZ scheme in simulations and in an experimental setting using a beam subjected to harmonic input.

Original languageEnglish
JournalMechanical Systems and Signal Processing
Volume114
Issue numberJanuary
Pages (from-to)120-127
Number of pages8
ISSN0888-3270
DOIs
Publication statusPublished - 2019

Keywords

  • Damage localization
  • Subspace exclusion zones
  • User-defined localization resolution
  • Structural health monitoring
  • Vibration analysis

Fingerprint

Dive into the research topics of 'Subspace exclusion zones for damage localization'. Together they form a unique fingerprint.

Cite this