Next Article in Journal
Biological Intelligence Inspired Trajectory Design for Energy Harvesting UAV Networks
Next Article in Special Issue
Transfer-Learning-Based Temperature Uncertainty Reduction Algorithm for Large Scale Oil Tank Ground Settlement Monitoring
Previous Article in Journal
Hybrid Feature Fusion-Based High-Sensitivity Fire Detection and Early Warning for Intelligent Building Systems
Previous Article in Special Issue
Vision-Based Detection of Bolt Loosening Using YOLOv5
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multiple Damaged Cables Identification in Cable-Stayed Bridges Using Basis Vector Matrix Method

1
State Key Laboratory of Mechanical Behavior and System Safety of Traffic Engineering Structures, Shijiazhuang Tiedao University, Shijiazhuang 050043, China
2
Department of Engineering Mechanics, Shijiazhuang Tiedao University, Shijiazhuang 050043, China
3
School of Civil and Environmental Engineering, University of Technology Sydney, Ultimo, NSW 2007, Australia
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(2), 860; https://doi.org/10.3390/s23020860
Submission received: 1 November 2022 / Revised: 27 December 2022 / Accepted: 5 January 2023 / Published: 11 January 2023
(This article belongs to the Special Issue Smart Sensing Technology and Infrastructure Health Monitoring)

Abstract

:
A new damaged cable identification method using the basis vector matrix (BVM) is proposed to identify multiple damaged cables in cable-stayed bridges. The relationships between the cable tension stiffness and the girder bending strain of the cable-stayed bridge are established using a force method. The difference between the maximum bending strains of the bridges with intact and damaged cables is used to obtain the damage index vectors (DIXVs). Then, BVM is obtained by the normalized DIXV. Finally, the damage indicator vector (DIV) is obtained by DIXV and BVM to identify the damaged cables. The damage indicator is substituted into the damage severity function to identify the corresponding damage severity. A field cable-stayed bridge is used to verify the proposed method. The three-dimensional finite element model is established using ANSYS, and the model is validated using the field measurements. The validated model is used to simulate the strain response of the bridge with different damage scenarios subject to a moving vehicle load, including one, two, three, and four damaged cables with damage severity of 10%, 20%, and 30%, respectively. The noise effect is also discussed. The results show that the BVM method has good anti-noise capability and robustness.

1. Introduction

Cable-stayed bridges are widely used around the world due to their rigid stiffness, good aerodynamics, high seismic resistance, and desired aesthetics [1]. Like other types of bridge structures, cable-stayed bridges deteriorate over time due to damage accumulation caused by their aging and operational loading. If the damage cannot be identified early, the deterioration or damage accumulation of the bridges will lead to the collapse of entire structures and result in devastating human fatalities and substantial economic losses. Structural health monitoring is critical to prevent catastrophic structure collapse and provide quantitative information for effective and economic structural maintenance. In the bridge health monitoring system, one of the most important techniques is to identify structural damage. The structural damage detection methods could be regarded as the core of SHM strategies [2].
In the last several decades, many studies have been conducted on structural damage identification for cable-stayed bridges. In general, there are mainly two types of damage in the cable-stayed bridge to be identified. One is damage of the girders. The other is damage of stayed cables. For the girder damage of the cable-stayed bridge, vibration modal parameters are widely used to identify structural damage, and many methods have been developed, such as the enhanced coordinate modal assurance criterion (ECOMAC), damage index method (DI), mode shape curvature method (MSC), and modal flexibility index method (MFI) [3]. A probabilistic neural network with modal frequency data was used to predict damage locations in the Ting Kau Bridge by Zhou et al. [4]. When the noise level is less than 10%, the damage type and region can be identified with high confidence (greater than 85%) using the first 20 modes. The method cannot identify the multi-damage situations. Based on the three-dimensional multi-scale FE models of the Runyang Bridge, the performance of some damage location methods is evaluated by Ding et al. [5], including a modal curvature index, a modal strain energy index, and a modal flexibility index. The relative modal flexibility change (RFC) between intact and damage states was formulated as an index to locate damage in the Ting Kau Bridge by Ni et al. [6]. Without the environmental effects, the RFC index performs well for locating damage in single-damage cases. For multi-damage cases, the RFC index may provide false damage identification at members with low sensitivity. A technique to reduce the limitations of modal identification in damage detection using reduced field data for nondestructive structural health monitoring of a cable-stayed concrete bridge was designed by Ismail et al. [7]. The method was able to detect the general area of the damage, but was not able to locate the damage, and the refined meshing and analysis have to be carried out around the identified areas. The mode shapes of a cable-stayed bridge could be used to indicate the location of the damage but not the extent or intensity of the damage. The acceleration time history response of the Tianjing Yonghe Bridge was used to identify girder or support damage by Liang et al. [8], Huang et al. [9], Bisheh et al. [10,11], and Entezami et al. [12]. To eliminate the ambient temperature influences on the bridge frequency, a damage identification method based on Kalman filter and cointegration (KFC) was developed by Huang et al. [9]. Feature extraction and selection methods were proposed to identify the damage by Bisheh et al. [10,11] and Entezami et al. [12]. Based on acceleration responses and strain responses, a damage identification method was proposed by Alamdari et al. [13]. This method applies incremental tensor analysis for data fusion and feature extraction, and then a one-class support vector machine is used to detect anomalies. Finite element (FE) model updating is a well-recognized approach for SHM purposes, as an accurate model serves as a baseline reference for damage detection and long-term monitoring efforts. The latest advances in finite element modeling and model updating of cable-stayed bridges were presented by Sharry et al. [14]. In addition, influence lines or static methods are also used for damage identification of cable-stayed bridges. The displacement influence line (DIL) of the bridge under live load tests was used to identify the damage of a cable-stayed bridge by Alamdari et al. [15]. This method can identify the damage location, and cannot identify the damage severity.
Furthermore, cables are the crucial components in cable-stayed bridges, which bear the supporting role similar to piers. They are prone to deterioration and damage because of fatigue and corrosion [16,17]. Consequently, the design service life of a cable-stayed bridge is 100 years, while the cable life is generally only 15–20 years in China. If some cables are damaged, the redistribution of cable forces will lead to or accelerate the damage of more cables, which poses a serious threat to the safety, integrity, and static and dynamic characteristics of bridge structures. Therefore, damaged cable identification is important for cable-stayed bridges. Most of the cable monitoring approaches obtain the cable forces through various ways to evaluate the damage state of the cables [18]. A damage assessment and warning method for stay cables based on the acoustic emission (AE) technique and the fractal theory was developed by Li et al. [19]. A hybrid structural health monitoring approach for condition assessment of cable-stayed bridges was presented by Arjomande et al. [20]. The structural integrity of cables is evaluated through incorporating visual inspection, ultrasound test, and local and global vibration analysis data. A combinational identification method of three efficient techniques, including statistical analysis, clustering, and neural network models, was proposed to detect damaged cables in a cable-stayed bridge by Son et al. [21]. A vibration-based model-free damage diagnosis method for stay cables using the changes in natural frequencies was proposed by An et al. [22]. This method divides the stay cable into a short part and a long part by a steel bar. The local frequency change in the short part due to the damage in the whole stay cable is amplified dramatically. Then, small damage of a stay cable can be diagnosed. Based on the vibration signal, a Shannon entropy-based methodology for detecting and locating a lost cable in a cable-stayed bridge exposed to ambient vibrations was presented by Jose et al. [23]. A methodology based on statistical features, principal component analysis (PCA), and Mahalanobis distance (MD) for detecting and locating cable loss using vibration signals was proposed by Jesus et al. [24]. These two methods were validated in the Rio Papaloapan Bridge (Veracruz, Mexico) with a 100% effectiveness to detect the lost cable location. Based on the concept of influence surface, the slope of the linear relationship of the matched cable tension ratio of two cables located on the same side is used as the damage sensitive feature. A long-term condition assessment method for stay cables in cable-stayed bridges using the monitored cable tension forces under operational conditions was developed by Peng et al. [25]. An improved residual force algorithm independent of the static load vector for cable damage identification in cable-stayed bridges was proposed by Fang et al. [26]. By combining two different static loading modes, a damage indicator vector was defined for damage localization and quantification. The relative strain variation in the anchor was used to detect wire breakage in unbonded tendons by Abdullah et al. [27]. The feasibility of an impedance-based stress monitoring method for local-strand breakage detection in multi-strand anchorage systems was investigated by Dang et al. [28]. A method to detect the location and the magnitude of the damaged cables of cable-stayed bridges based on the dynamic distributed sensing of bridge deck strains was introduced by Scarella et al. [29].
All the above studies identified the damage on girders or cables in cable-stayed bridges. However, there are still some limitations. For instance, most of the methods can only identify high-severity damage, and have a low anti-noise capability. Furthermore, few of them could identify multiple damage. To overcome the above limitations, the authors are committed to solving these problems, and a support vector machine (SVM)-based method was developed to identify single and double damaged cables from bridge deck strain differences in a previous study [18]. The data from all damage scenarios are needed to train the SVM model for damage detection. However, it is difficult or even impossible to obtain the data for all damage scenarios, especially multiple damage scenarios. Therefore, this paper adopts the single damaged cable identification index vector in the previous paper [18] to construct a basis vector matrix (BVM), and a new method based on the BVM is proposed for identification of multiple damaged cables. This method can directly identify single or multiple damaged cables, including early small damage. The relationship between the cable cross-section area and the bending strain of the bridge deck is established firstly using a force method. Then, the damage index vector (DIXV) is obtained from the difference between the maximum bending strains of the bridge deck with intact and damaged cables. The DIXV is normalized in [0, 1] to obtain the BVM. Finally, the damage indicator vector (DIV) is obtained by the relationship between the DIXV and BVM to identify the damaged cables. The proposed method is verified using a field cable-stayed bridge for identification of single or multiple damaged cables.

2. Basis Vector Matrix Method

2.1. Relationship between the Cable Tension and the Bending Strain

The damage of a cable is mainly caused by the fracture or failure of the steel wire due to corrosion, fatigue, or overload, and it results in a decrease in the effective cross-section area of the cable. Therefore, the damage of the cable is usually simulated by reducing the cross-sectional area of the cable in the finite element model. At the same time, when the cable is damaged, the bearing capacity of the cable will be decreased and the cable forces of the whole bridge will be redistributed. Then, the internal force and strain of the bridge are changed correspondingly. To illustrate the relationship between the cable damage and the bending strain of the girder underneath, a single tower cable-stayed bridge is used, as shown in Figure 1. The side view of the cable-stayed bridge is shown in Figure 2a. The left end of the bridge is a pin support to restrict the vertical and longitudinal linear displacements, and the right end and the tower are roller supports to restrict the vertical linear displacement, as shown in Figure 2b. The vehicle is considered as two moving concentrated forces F1 and F2. In Figure 2a, the beam bridge is a statically indeterminate continuous beam. The force method can be used to calculate the internal force of the cable-stayed bridge under the vehicle at x, and the relationship between the cable tensile stiffness EA and the bending strain of the beam can be derived. The derivation procedure is as below.
The basic system is obtained by removing redundant constraints, as shown in Figure 2c. The equation is established by the force method,
Δ 1 x Δ 2 x Δ 3 x Δ 4 x Δ 5 x = δ 11 δ 12 δ 13 δ 14 δ 15 δ 21 δ 22 δ 23 δ 24 δ 25 δ 31 δ 32 δ 33 δ 34 δ 35 δ 41 δ 42 δ 43 δ 44 δ 45 δ 51 δ 52 δ 53 δ 54 δ 55 F 1 x F 2 x F 3 x F 4 x F 5 x + Δ 1 P x Δ 2 P x Δ 3 P x Δ 4 P x Δ 5 P x = F 1 x L 1 E 1 A 1 F 2 x L 2 E 2 A 2 F 3 x L 3 E 3 A 3 F 4 x L 4 E 4 A 4 0
where F i x is the unknown redundant reaction forces of the redundant constraints. Δ i x are the displacements corresponding to the unknown redundant reaction forces in the original structure (Figure 2a). Δ i P x are the displacements corresponding to the unknown redundant reaction forces in the basic structure under the vehicle loads, also called free term. E i , A i , L i are the ith cable’s elastic modulus, cross-sectional area, and length, respectively. δ i j is the flexibility coefficient, that is, the displacement along the ith unknown redundant force when the jth unknown redundant force is 1 and the other unknown redundant forces are all 0. Equation (1) can also be rewritten as
δ 11 + L 1 E 1 A 1 δ 21 δ 31 δ 41 δ 51 δ 12 δ 22 + L 2 E 2 A 2 δ 32 δ 42 δ 52 δ 13 δ 23 δ 33 + L 3 E 3 A 3 δ 43 δ 53 δ 14 δ 24 δ 34 δ 44 + L 4 E 4 A 4 δ 54 δ 15 δ 25 δ 35 δ 45 δ 55 F 1 x F 2 x F 3 x F 4 x F 5 x = Δ 1 P x Δ 2 P x Δ 3 P x Δ 4 P x Δ 5 P x
Equation (2) can be written as the matrix form,
δ F = Δ p
where δ = δ b + δ c , δ b , and δ c are the flexibility matrixes, which are respectively related to the parameters of the beam and the cable, independent of the external force. They are written as
δ b = δ 11 δ 12 δ 13 δ 14 δ 15 δ 21 δ 22 δ 23 δ 24 δ 25 δ 31 δ 32 δ 33 δ 34 δ 35 δ 41 δ 42 δ 43 δ 44 δ 45 δ 51 δ 52 δ 53 δ 54 δ 55
δ c = L 1 E 1 A 1 0 0 0 0 0 L 2 E 2 A 2 0 0 0 0 0 L 3 E 3 A 3 0 0 0 0 0 L 4 E 4 A 4 0 0 0 0 0 0
F is the column vector of the unknown redundant reaction forces. Δ p is the column vector of the free terms.
From Equation (3), F is obtained as
F = δ 1 Δ p
Then, the redundant reaction forces F can be regarded as the external loads acting on the basic structure shown in Figure 2c. When the basic structure is statically determinate, the bending moments M x can be obtained at any cross-sections by the static equilibrium equation. Further, the bending strain ε x at the lower beam of any cross-section x can be obtained as
ε x = M x y E I
where M x is the bending moment at the cross-section x , y is the distance between the neutral axis and the bottom surface of the cross-section x , and EI is the bending stiffness of the beam.
From Equations (2), (6) and (7), when the cable cross-section area is reduced, the cable forces will be redistributed. As a result, the bending moments and bending strains on the beam also change accordingly. It means that the change in the bending strain of the beam can reflect the damage of the cable. Similarly, the equations for the three-dimensional bridge structure under vehicle loads can be obtained but that is not in the scope of this paper.

2.2. Damage Index for the Damaged Cables of Cable-Stayed Bridges

It is well known that damage will reduce the tensile stiffness EA of the cable. In order to facilitate simulation, it is assumed that the elastic modulus E is constant when the cable is damaged. Then, the cable damage is described using the cable cross-section area reduction. The cable damage severity is defined as
d e = E A in E A da E A in × 100 % = A in A da A in × 100 %
where de is the cable damage severity, and Ain and Ada are the cross-section areas of the intact and damaged cables, respectively.
In practice, the bridge deck bending strains under operational conditions can be monitored through a long-term monitoring system. When a vehicle passes over the bridge, the bending strains are varied over time and that is related to the vehicle location on the bridge. In this study, the maximum bending strains of the time history strain responses at measurement locations are extracted as the features of the bending strain data. The measurement locations on the bridge deck are around the cable anchors [18]. Then, the damage index vector (DIXV) is defined as the absolute value of the difference between the maximum bending strains of the bridge at measurement points with or without damaged cables, that is,
D I X V j # , d e = x 1 j # , d e x i j # , d e x n j # , d e T = Δ ε 1 Δ ε i Δ ε n T
where D I X V j # , d e and x i j # , d e are DIXV and the ith damage index for cables of the bridge with the j# damaged cable. n is the total number of measuring points. Δ ε i   is
Δ ε i = max ε i in max ε i da
where max ε i in and max ε i da are the maximum bending strains of the ith measured point with or without the damaged cable, respectively.

2.3. Basis Vector Matrix

When the j# cable damage severity is de, D I X V j # , d e is normalized as
X i j # = x i j # , d e x max j # , d e
where x max j # , d e is the maximum value of D I X V j # , d e , and X i j # is the corresponding normalized value of the ith measurement point with the j# damaged cable.
Then, the basis vector B V j # with the j# damaged cable is obtained.
B V j # = X 1 j # X i j # X n j # T
The basis vector matrix (BVM) can be written as
B V M = B V 1 # B V 2 # B V j # B V m # = X 1 1 # X 1 2 # X i 1 # X i 2 # X 1 j # X 1 m # X i j # X i m # X n 1 # X n 2 # X n j # X n m # n × m
where BVM is the basis vector matrix, m is the number of damaged cables. BVM is an n × m matrix.

2.4. Damaged Cable Identification

From Equations (11)–(13), D I X V j # , d e can be expressed as
D I X V j # , d e = B V M · D I V = B V j # · x max j # , d e
where DIV is the damage indication vector (DIV),
D I V = 0 x m a x j # , d e 0 T
From Equation (14), DIV can be calculated as below:
D I V = B V M 1 · D I X V j # , d e
where B V M 1 is the inverse matrix of B V M . In fact, for the case with the j# damaged cable, all components of DIV should be 0, except the jth component is x max j # 0 . According to the location of the nonzero components in DIV, the number of damaged cables can be identified. For the scenario with several damaged cables, the location of the nonzero components in DIV correspond to the number of damaged cables. In practice, there may be some small nonzero items in the DIV due to noise interference, and a threshold can be set to eliminate the noise effect. For example, the threshold can be determined by the maximum value in the DIXV that corresponds to the minimum allowable damage severity, such as 3%, etc.
After the damaged cables are identified, the damaged severity of these cables can be identified in the next step. It is known that the maximum value   x max j # in D I X V j # increases with the increase in damage severity de [18]. When the cable damage severity de varies continuously, x max j # is a nonlinear function of de. The relationship between x max j # and de can be established using the nonlinear regression method, that is,
d e j = f j x max j #
where d e j is the damage severity of the j# cable, fj( ) is the nonlinear functional relationship between d e j and x max j # , that is, the damage severity identification function.
Finally, the damage severity of the j# cable can identified by substituting the nonzero component D I V j into Equation (17).
The flow chart of the BVM method for the damaged cable identification is shown in Figure 3.

3. Applications

3.1. Description of the Structural Health Monitoring System

A field cable-stayed bridge, as shown in Figure 1 and Figure 4, is used to verify the proposed method. The bridge is a single-lane highway bridge with a span of 46 m and a width of 6.3 m. There are 16 stay cables in a semi-fan arrangement and the single A-shaped steel tower is 33 m high. The bridge deck is a composite steel–concrete deck. The concrete deck has a thickness of 0.16 m, it is supported by four I-beam steel girders. The girders are internally attached by a set of equally spaced cross-girders, shown in Figure 1b [1]. A long- term monitoring system has been installed on the bridge with an array of strain gauge sensors installed under the bridge deck at the intersection of the girders and floor beams (shown in Figure 5). Figure 5b shows the magnified view of the strain gauge array between CG6 and CG7 marked in the yellow area in Figure 5a. Figure 6 shows the sensor locations of the shear strain gauge and the uniaxial strain gauges on the cable-stayed bridge. An HBM Quantum-X data acquisition system (HBM, Darmstadt, Germany) was adopted for signal conditioning and data logging. The Quantum system provides an integrated and reliable device to log high-quality data with 24-bit resolution with a bandwidth capability of 0–3 kHz. The response signals of the bridge were collected at 600 Hz while test vehicles were traveling over the bridge [30].

3.2. Finite Element Model of the Cable-Stayed Bridge

Figure 7 shows the finite element model (FEM) of the cable-stayed bridge which is the same as the FEM in the literature [18]. The steel-reinforced concrete part is simulated by SHELL63 with a thickness of 160 mm. The lower longitudinal and transverse girders are simulated by BEAM189 with Universal Beam (410UB54) cross-section properties. The cables are simulated by LINK10. The bridge mast is simulated by BEAM189 with variable cross-sections, and all degrees of freedom of the mast base are restrained. As shown in Figure 1 and Figure 2, the left end of the bridge is a pin support under every longitudinal girder and the right end of the bridge is a roller support. The vehicle load is simulated by four moving concentrated forces acting on the bridge.
To verify the FEM of the cable-stayed bridge, the frequencies and modes are calculated using FEM and compared with the field testing results. Table 1 lists the first five frequencies of the cable-stayed bridge by FEM and the comparison with the field testing results by Sun et al. [31]. Figure 8 shows the comparison of the first mode shapes by FEM and the field testing [32].
In Table 1, the mode’s modal assurance criterion (MAC) [33] is calculated by
M A C i = i c T i m 2 i c T i c i m T i m
where i c and i m are the ith calculated modal vector and measured modal vector, respectively. When MACi is closer to 1, i c agrees well with i m .
From Table 1, the frequencies by FEM are very close to the experimental results, and the maximum difference is 12.154%, which is the third frequency. Especially, the difference between the first frequencies by FEM and the test is 1.192%, and the corresponding MAC1 is 0.978, close to 1. It should be mentioned that only the first mode is measured and only the MAC of the first mode is calculated in Table 1.
In Figure 8, it can also be found that the 1st modal shapes by FEM and the test agree well. Therefore, the FEM of the cable-stayed bridge can represent the bridge.
Further, as DIXV is calculated using the bending strains, the bending strains by FEM are also compared with the measured data to further verify the model. The measurements of sensor SU15 (shown in Figure 5), which is located at point A in Figure 7, are used. The field test vehicle is a Holden Colorado Ute, as shown in Figure 9a. The gross weight of the test vehicle is 2.20 t, with front and rear axle loads of F1 = 1.20 t and F2 = 1.00 t, respectively. The distance between these two axles is 3.10 m, and the wheel spacing is 1.75 m [1]. The axle load is evenly distributed between two wheels. Therefore, the vehicle load is simplified as four moving concentrated forces acting on the bridge, shown in Figure 7. The test vehicle passed the bridge at a constant speed of v = 10 km/h along the center line of the bridge deck. Figure 9b shows the comparison of the bending strains of the longitudinal girder at point A by FEM and the measurements. From Figure 9b, the results show that they have a similar trend, and the bending strain peaks corresponding to the front and rear wheels, respectively, are very close. It shows that the proposed model is reliable and accurate to determine the bending strains. By Equations (9) and (10), DIXV can be calculated by the maximum bending strains. Therefore, the finite element model is reliable and accurate to obtain the basis vector matrix BVM.

3.3. Cable Damage Identification

As shown in Figure 2a, the cables are symmetrically arranged along the longitudinal center line of the bridge deck, and they are numbered as listed in the brackets. Since Cables 5#–8# and Cables 13#–16# are directly anchored on the anchorage footing, only the damage identification of Cables 1#–4# and Cables 9#–12# is studied here. The damage is simulated in Cables 1#–4# and Cables 9#–12# with damage severities of 10%, 20%, and 30%, respectively. DIXVs are calculated and their poly line diagrams are shown in Figure 10. The measured points are on the bottom surface of the longitudinal girders close the anchors of Cables 1#–4# and Cables 9#–12#.
Figure 10 shows that the D I X V j # , d e poly lines are significantly different from D I X V k # , d e for jk. When Cable j# is damaged, the maximum value of D I X V j # , d e increases with the damage severity. For two cables in symmetrical positions, such as Cables 1# and 9#, the value of DIXV at measured position 1 for Cable 1#, due to its damage, is equal to that at the symmetrical measurement point 5 due to the damage in Cable 9#.
The DIXVs are normalized to obtain the basic vectors B V j # , d e by Equation (11). Figure 11 shows the poly line diagrams of the normalized DIXVs for Cables 1#–4#, and they are B V j # , d e . The diagrams for Cables 9#–12# can be obtained by the symmetry.
As shown in Figure 11, the basis vectors are not changed with the damage severity. For simplification, B V j # , d e can be abbreviated as B V j # . For Cable j#, B V j # can be obtained from the corresponding D I I V j # , d e . Then, the basic vector matrix (BVM) for damaged cable identification can be written as
B V M = B V 1 #   B V 2 #   B V 3 #   B V 4 #   B V 9 #   B V 10 #   B V 11 #   B V 12 #
The DIXV for two damage cables is also studied here. D I X V c 1 # , 20 % ; 4 # , 10 % is the DIXV using FEM when Cables 1# and 4# have 20% and 10% damage, respectively. D I X V s 1 # , 20 % ; 4 # , 10 % is obtained by the sum of D I X V 1 # , 20 % and D I X V 4 # , 10 % , e.g., D I X V s 1 # , 20 % ; 4 # , 10 % = D I X V 1 # , 20 % + D I X V 4 # , 10 % . Their poly line diagrams are shown in Figure 12.
Figure 12 shows that the two poly lines are very close to each other. It means that D I I V c 1 # , 20 % ; 4 # , 10 % is almost equal to D I I V s 1 # , 20 % ; 4 # , 10 % , and the proposed BVM method in Section 2 can be used to identify multiple damaged cables simultaneously.

3.4. The Hypothetical Damage Scenarios

To verify the performance and robustness of the proposed method, the hypothetical damage scenarios are listed in Table 2, including single-damage scenarios and multiple-damage scenarios. DIXVs for all damage scenarios are calculated by FEM and white noise is added to simulate the measurements by Equation (20).
D I X V j , ε = D I X V × 1 + ε R i i = 1 , 2 , , m
where D I X V j , ε is the DIXV of the jth damaged scenario with the measurement noise level ε. Here, ε is 5%, 10%, 15%, and 20%, respectively. R i is the ith value of the normally distributed random data with a mean value of 0 and a standard deviation of 1. m is total number of measured points. Eight measurement points corresponding to Cables 1#–4# and Cables 9#–12# are adopted.
To verify the robustness of the proposed method, 100 samples for the D I X V of each damage scenario are generated by adding the noise. For instance, D I X V k 1 # , 5 % has 100 D I X V s with 5% measurement noise, k = 1,2, ,100. The test dataset with 2800 D I X V s is obtained.
Here, B V M is only constructed by B V j # , 20 % , and is used to identify the damaged cables with other damage severities, such as 10%, 30%, to test the performance of the proposed BVM method.

3.5. Damaged Cable Identification

In this section, the BVM method is used to identify the damaged cable labels in Table 2. The test dataset is substituted into Equation (16) to obtain D I V . The components in D I V are compared with the set threshold to identify the damaged cable labels and the threshold is 5 in this study, which is determined by the maximum value in D I X V 1 # , 3 % . Figure 13 shows the D I V histogram for seven damage scenarios calculated by the D I X V with different noise levels. Table 3 lists the identified damaged cables using the BVM method and the SVM method [18], respectively.
From Figure 13, the D I V values corresponding to the damaged cables are much larger than that of the intact cables. Although the measurement noise has a large influence on D I V , the components corresponding the damaged cables are still identified successfully. With the noise level increases and more cables damaged simultaneously, some components corresponding to intact cables may be larger than the threshold value 5.
From Table 3, the SVM method [18] can only correctly identify the damaged cables for Scenarios ①~⑤, which are single or double cable damage scenarios. The BVM method can correctly identify the damaged cables in Scenarios ①~④ regardless of noise level. For Scenarios ⑤ and ⑥, the damaged cables are still identified successfully when the noise level is under 15%. With the noise level increasing, some intact cables adjacent to the damaged cables are misidentified. For the four damaged cables in Scenario ⑦, the damaged cables are correctly identified and the cables adjacent to damaged ones are misidentified.
To deal with the misidentified cables, Figure 14 shows the sample proportion histogram of the identified cables from the test dataset with 2800 D I X V s. From Figure 14, it can be seen that the correct sample proportions of the damaged cables are all above 90%. For Scenarios ①~⑤, the sample proportions are approximately 100%. Although the sample proportion of Cable 3# is the lowest among the damaged cables in Scenario ⑦, it is 92%. For other damage scenarios, the sample proportion of any intact cables is less than 40%. For Scenario ⑦ with four damaged cables, the sample proportion of the intact Cable 2# is only 71%.
The proportion confidence interval is calculated by Equation (21) to validate this method’s reliability.
p z p 1 p n , p + z p 1 p n  
where p is the sample proportion, z is the critical value corresponding to the confidence level, n is the sample size. Here, the confidence level is 95%, the corresponding z is 1.96, and n is 100.
For the lowest sample proportion of 92% of the damaged Cable 3# in Scenario ⑦, the proportion confidence interval is (87%, 97%). For the highest sample proportion of 71% of the intact Cable 2# in Scenario ⑦, the proportion confidence interval is (62%, 80%). Therefore, in actual cable-stayed bridge damage identification, it is recommended to collect several sets of DIXV as far as possible to identify the damaged cables. When the sample identification proportion of a cable is greater than 90%, it can be confirmed as a damaged cable.
In summary, the BVM method proposed in this paper can quickly and accurately identify single damaged cable and multiple damaged cable scenarios at one time. It also has a good generalization and anti-noise capability.

3.6. Damage Severity Identification

The damage scenarios in Table 2 are used in this section. Table 4 shows the damage severity identification functions. These functions are obtained by cubic polynomial regression in Matlab based on the maximum values of DIXV when the cables have 10%, 20%, and 30% damage, respectively. Here, x is the nonzero component in DIV, which is greater than the threshold value.
The damage severity can be identified by substituting the component x into the corresponding cable damage severity identification function. Table 5 and Table 6, respectively, list the identified results and errors for seven damage scenarios corresponding to Figure 13 using the BVM method and the SVM method [18]. The error is calculated by the difference between the identified damage severity and the true damage severity as
e r r o r i = d e i D i
where dei and Di are the identified and true damage severities of the ith cable.
The performance of the BVM method and the SVM method [18] is measured by mean squared error (MSE) [34], and the square of the regression correlation coefficient (R2) and the uncertainty interval (U95) [35]. The mathematical relations of these parameters are given as
M S E = 1 N i = 1 N d e i D i 2
R 2 = i = 1 N d e i 2 i = 1 N d e i 2 i = 1 N d e i D i 2
U 95 = 1.96 N i = 1 N D i D ¯ 2 + i = 1 N D i d e i 2
where N is the number of data samples, and here it is 100. D ¯ is the mean value of the true damage severity, and here it is Di. When MSE is closer to 0, R2 is closer to 1, and U95 is closer to 0, the performance of this method is better. The MSE, R2, and U95 of the identified results for seven damage scenarios are listed in Table 7, Table 8 and Table 9, respectively. Table 7, Table 8 and Table 9 also list the MSE, R2, and U95 of the SVM method to compare these two methods’ performance. From Table 5 and Table 6, with the increase in noise level, the two methods’ results all fluctuate around the true value. The errors are less than 10% except for two cases corresponding to Cable 1# in Scenario ④ and Cable 9# in Scenario ⑦, respectively, as shown in Table 6. For Scenario ⑦, the errors are large. The identified errors of the misidentified cables in Table 5 are all under 10% except that of Cable 10# of Scenario ⑦ that is 13.05% when the noise level is 15%. It indicates that even if there are misidentified cables, the identified results will be small.
As listed in Table 7, Table 8 and Table 9, MSE and U95 of the BVM method are close to 0, and R2 is close to 1. They all increase with the noise level. The MSE, R2, and U95 for Cables 3# and 9# of Scenario ⑦ are much greater than that of other scenarios. For Cable 3# of Scenario ⑦ with 15% measurement noise, the R2 value is 1.8755 which is greater than 1. That is because the damage severity of Cable 3# in Scenario ⑦ is 10% and the measurement noise is 15%. Furthermore, the maximum values of the MSE and U95 are 0.0080 and 0.0175 for this case, which shows the good performance of the method. Although damage severity of 25% has not been used in obtaining the function dei(x), the identification errors for this scenario are small and the corresponding MSE and U95 are close to 0, and R2 is close to 1. Meanwhile, for the SVM method [18], MSE and U95 are larger than 0, the smallest MSE and U95 are 0.0655 and 0.0502, and the largest MSE and U95 are 10.2385 and 0.6272, respectively. R2 is a little better than those of the BVM method, and is close to 1. In summary, this damage severity identification method has good performance, robustness, and strong anti-noise capability, and is better than the SVM method.

4. Conclusions

The bending strain-based BVM method has been developed to identify damaged cables in a cable-stayed bridge. The relationship between bending strain and the cable stiffness is derived by a force method. The FEM for the cable-stayed bridge is established using ANSYS and validated using field measurements. Furthermore, DIXV, BVM, and a test dataset are obtained using the validated FEM. Some conclusions are made as follows:
  • For a single-cable case, the damage severity does not have an effect on the BV. Therefore, the BVM does not change with the cable damage severity, which is the key to the proposed BVM method.
  • The BVM method can directly identify single damaged cables and multiple damaged cables. With 100 samples, the sample probability of damaged cables is greater than 90%. The damage identification functions have a good performance to identify the cable damage severity. Therefore, the BVM method has good generalization and anti-noise capability.
  • The BVM method may be easily adapted to the field cable-stayed bridge health monitoring system. The identification probability could be improved with the increase in monitoring data.
Furthermore, further investigations on the sensitivity of this method to temperature variation, nonlinear vibration of the cable, vehicle–bridge coupling vibration, and different kinds of actual vehicle load are needed. More experimental data are also needed to further validate this method.

Author Contributions

Methodology, J.R.; experiments and validation, J.R., X.Z. and S.L.; investigation, J.R. and X.Z.; writing—original draft preparation, J.R.; writing—review and editing, J.R., X.Z. and S.L.; funding acquisition, J.R., X.Z. and S.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by research funding of the Natural Science Foundation of Hebei Province China (A2022210007), National Natural Science Foundation of China (NSFC) (U22A20246, 51878433), the Australian Research Council Discovery Project (DP 220102045), and 2022 Hebei Provincial Department of Education Project of China (ZD2022019).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is unavailable due to privacy restrictions.

Acknowledgments

The financial aid is gratefully acknowledged. Thanks are also extended to Western Sydney University for facilitating the experiments on the cable-stayed bridge.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Alamdari, M.M.; Kildashti, K.; Samali, B.; Goudarzi, H.V. Damage diagnosis in bridge structures using rotation influence line: Validation on a cable-stayed bridge. Eng. Struct. 2019, 185, 1–14. [Google Scholar] [CrossRef]
  2. Ghannadi, P.; Kourehli, S.S.; Mirjalili, S. The application of PSO in structural damage detection: An analysis of the previously released publications (2005–2020). Frat. Ed Integrità Strutt. 2022, 62, 460–489. [Google Scholar] [CrossRef]
  3. Talebinejad, I.; Fischer, C.; Ansari, F. Numerical evaluation of vibration-based methods for damage assessment of cable-stayed bridges. Comput. Civ. Infrastruct. Eng. 2011, 26, 239–251. [Google Scholar] [CrossRef]
  4. Zhou, X.T.; Ni, Y.Q.; Zhang, F.L. Damage localization of cable-supported bridges using modal frequency data and probabilistic neural network. Math. Probl. Eng. 2014, 2014, 837963. [Google Scholar] [CrossRef] [Green Version]
  5. Ding, Y.L.; Li, A.Q.; Du, D.S.; Liu, T. Multi-scale damage analysis for a steel box girder of a long-span cable-stayed bridge. Struct. Infrastruct. Eng. 2010, 6, 725–739. [Google Scholar] [CrossRef]
  6. Ni, Y.Q.; Zhou, H.F.; Chan, K.C.; Ko, J.M. Modal flexibility analysis of cable-stayed ting kau bridge for damage identification. Comput. Civ. Infrastruct. Eng. 2008, 23, 223–236. [Google Scholar] [CrossRef]
  7. Ismail, Z.; Ibrahim, Z.; Ong, A.Z.C.; Rahman, A.G.A. Approach to reduce the limitations of modal identification in damage detection using limited field data for nondestructive structural health monitoring of a cable-stayed concrete bridge. J. Bridge Eng. 2012, 17, 867–875. [Google Scholar] [CrossRef]
  8. Liang, Y.B.; Li, D.S.; Song, G.B.; Feng, Q. Frequency Co-integration-based damage detection for bridges under the influence of environmental temperature variation. Measurement 2018, 125, 163–175. [Google Scholar] [CrossRef]
  9. Huang, J.Z.; Li, D.S.; Li, H.N.; Song, G.B.; Liang, Y.B. Damage identification of a large cable-stayed bridge with novel cointegrated Kalman filter method under changing environments. Struct. Control Health Monit. 2018, 25, e2152. [Google Scholar] [CrossRef]
  10. Bisheh, H.B.; Amiri, G.G.; Nekooei, M.; Darvishan, E. Damage detection of a cable-stayed bridge using feature extraction and selection methods. Structure and Infrastructure Engineering. Struct. Infrastruct. Eng. 2019, 15, 1165–1177. [Google Scholar] [CrossRef]
  11. Bisheh, H.B.; Amiri, G.G.; Nekooei, M.; Darvishan, E. Damage detection of a cable-stayed bridge based on combining effective intrinsic mode functions of empirical mode decomposition using the feature selection technique. Inverse Probl. Sci. Eng. 2021, 29, 861–881. [Google Scholar] [CrossRef]
  12. Entezami, A.; Shariatmadar, H.; Mariani, S. Early damage assessment in large-scale structures by innovative statistical pattern recognition methods based on time series modeling and novelty detection. Adv. Eng. Softw. 2020, 150, 102923. [Google Scholar] [CrossRef]
  13. Alamdari, M.M.; Khoa, N.L.D.; Wang, Y.; Samali, B.; Zhu, X.Q. A multi-way data analysis approach for structural health monitoring of a cable-stayed bridge. Struct. Health Monit. 2019, 18, 35–48. [Google Scholar] [CrossRef]
  14. Sharry, T.; Guan, H.; Nguyen, A.; Oh, E.; Hoang, N. Latest advances in finite element modelling and model updating of cable-stayed bridges. Infrastructures 2022, 7, 8. [Google Scholar] [CrossRef]
  15. Alamdari, M.M.; Ge, L.L.; Kildashti, K.; Zhou, Y.C.; Harvey, B.; Du, Z.Y. Non-contact structural health monitoring of a cable-stayed bridge: Case study. Struct. Infrastruct. Eng. 2019, 15, 1119–1136. [Google Scholar] [CrossRef]
  16. Mehrabi, B. In-service evaluation of cable-stayed bridges, over-view of available methods and findings. J. Bridge Eng. 2006, 11, 716–724. [Google Scholar] [CrossRef]
  17. Sun, Z.K.; Li, G.M.; Geng, S.H. Study on stayed-cable health monitoring. In Intelligence Computation and Evolutionary Computation; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
  18. Ren, J.Y.; Zhang, B.; Zhu, X.Q.; Li, S.H. Damaged cable identification in cable-stayed bridge from bridge deck strain measurements using support vector machine. Adv. Struct. Eng. 2022, 25, 754–771. [Google Scholar] [CrossRef]
  19. Li, H.; Huang, Y.; Chen, W.L.; Ma, M.L.; Tao, D.W.; Ou, J.P. Estimation and warning of fatigue damage of FRP stay cables based on acoustic emission techniques and fractal theory. Comput. Civ. Infrastruct. Eng. 2011, 26, 500–512. [Google Scholar] [CrossRef]
  20. Arjomandi, K.; Araki, Y.; MacDonald, T. Application of a hybrid structural health monitoring approach for condition assessment of cable-stayed bridges. J. Civil Struct. Health Monit. 2019, 9, 217–231. [Google Scholar] [CrossRef]
  21. Son, H.; Yoon, C.; Kim, Y.; Jang, Y.; Tran, L.V.; Kim, S.-E.; Kim, D.J.; Park, J. Damaged cable detection with statistical analysis, clustering, and deep learning models. Smart Struct. Syst. 2022, 29, 17–28. [Google Scholar]
  22. An, Y.H.; Zhong, Y.; Tan, Y.B.; Ou, J.P. Experimental and numerical studies on a test method for damage diagnosis of stay cables. Adv. Struct. Eng. 2017, 20, 245–256. [Google Scholar] [CrossRef]
  23. Jose, M.M.L.; Martin, V.R.; Juan, P.A.S.; Francisco, J.C.V.; Juan, A.Q.R. A shannon entropy-based methodology to detect and locate cables loss in a cable-stayed bridge. Int. J. Appl. Mech. 2021, 13, 2150063. [Google Scholar]
  24. Yanez-Borjas, J.J.; Machorro-Lopez, J.M.; Camarena-Martinez, D.; Valtierra-Rodriguez, M.; Amezquita-Sanchez, J.P.; Carrion-Viramontes, F.J.; Quintana-Rodriguez, J.A. A new damage index based on statistical features, PCA, and Mahalanobis distance for detecting and locating cables loss in a cable-stayed bridge. Int. J. Struct. Stab. Dyn. 2021, 21, 2150127. [Google Scholar] [CrossRef]
  25. Peng, Z.; Li, J.; Hao, H. Long-term condition monitoring of cables for in-service cable-stayed bridges using matched vehicle-induced cable tension ratios. Smart Struct. Syst. 2022, 29, 167–179. [Google Scholar]
  26. Fang, R.; Wu, Y.; Wei, W.; Na, L.; Biao, Q.; Jiang, P.; Yang, Q. An improved static residual force algorithm and its application in cable damage identification for cable-stayed bridges. Appl. Sci. 2022, 12, 2945. [Google Scholar] [CrossRef]
  27. Abdullah, A.B.M.; Jennifer, A.R.; Hamilton, H.R. Wire breakage detection using relative strain variation in unbonded posttensioning anchors. J. Bridge Eng. 2015, 20, 04014056. [Google Scholar] [CrossRef]
  28. Dang, N.L.; Huynh, T.C.; Kim, J.T. Local strand-breakage detection in multi-strand anchorage system using an impedance-based stress monitoring method-feasibility study. Sensors 2019, 19, 1054. [Google Scholar] [CrossRef] [Green Version]
  29. Scarella, A.; Salamone, G.; Babanajad, S.K.; De Stefano, A.; Ansari, F. Dynamic Brillouin scattering-based condition assessment of cables in cable-stayed bridges. J. Bridge Eng. 2016, 22, 04016130. [Google Scholar] [CrossRef]
  30. Kalhori, H.; Alamdari, M.M.; Zhu, X.Q.; Samali, B. Nothing-on-road axle detection strategies in bridge-weigh-in-motion for a cable-stayed bridge: Case study. J. Bridge Eng. 2018, 23, 05018006. [Google Scholar] [CrossRef]
  31. Sun, M.; Alamdari, M.M.; Kalhori, H. Automated operational modal Analysis of a cable-stayed bridge. J. Bridge Eng. 2017, 22, 05017012. [Google Scholar] [CrossRef]
  32. Zhu, X.Q.; Samali, B.; Rashidi, M.; Alamdari, M.M. Long-term vibration monitoring of a cable-stayed bridge: Effects of environmental and operational conditions. In Proceedings of the 8th International Conference on Structural Health Monitoring of Intelligent Infrastructure, Brisbane, Australia, 5–8 December 2017. [Google Scholar]
  33. Ghannadi, P.; Kourehli, S.S. Multiverse optimizer for structural damage detection: Numerical study and experimental validation. Structl. Des. Tall Spec. 2020, 29, e1777. [Google Scholar] [CrossRef]
  34. Ghannadi, P.; Kourehli, S.S. An effective method for damage assessment based on limited measured locations in skeletal structures. Adv. Struct. Eng. 2021, 24, 183–195. [Google Scholar] [CrossRef]
  35. Saberi-Movahed, F.; Najafzadeh, M.; Mehrpooya, A. Receiving more accurate predictions for longitudinal dispersion coefficients in water pipelines: Training group method of data handling using extreme learning machine conceptions. Water Resour. Manag. 2020, 34, 529–561. [Google Scholar] [CrossRef]
Figure 1. A single tower cable-stayed bridge. (a) The cable-stayed bridge; (b) the girder layout [1].
Figure 1. A single tower cable-stayed bridge. (a) The cable-stayed bridge; (b) the girder layout [1].
Sensors 23 00860 g001
Figure 2. The cable force calculation diagram of the cable-stayed bridge. (a) A simple plane calculation diagram; (b) calculation diagram after the cables substituted by the cable forces; (c) the force method basic system.
Figure 2. The cable force calculation diagram of the cable-stayed bridge. (a) A simple plane calculation diagram; (b) calculation diagram after the cables substituted by the cable forces; (c) the force method basic system.
Sensors 23 00860 g002
Figure 3. The flow chart of the BVM damaged cable identification procedure.
Figure 3. The flow chart of the BVM damaged cable identification procedure.
Sensors 23 00860 g003
Figure 4. Schematic view of the cable-stayed bridge [1]. (a) Elevation view of the bridge; (b) bridge mast.
Figure 4. Schematic view of the cable-stayed bridge [1]. (a) Elevation view of the bridge; (b) bridge mast.
Sensors 23 00860 g004
Figure 5. Illustration of the strain gauge array of the cable-stayed bridge structural health monitoring system. (a) The deck plan; (b) the strain gauge array between CG6 and CG7.
Figure 5. Illustration of the strain gauge array of the cable-stayed bridge structural health monitoring system. (a) The deck plan; (b) the strain gauge array between CG6 and CG7.
Sensors 23 00860 g005
Figure 6. Sensor location on the cable-stayed bridge [30]. (a) Shear strain gauge on the web of the girder; (b) uniaxial gauge under the deck; (c) uniaxial gauge under the flange of the girder.
Figure 6. Sensor location on the cable-stayed bridge [30]. (a) Shear strain gauge on the web of the girder; (b) uniaxial gauge under the deck; (c) uniaxial gauge under the flange of the girder.
Sensors 23 00860 g006
Figure 7. The FEM of the cable-stayed bridge under vehicle loads [18].
Figure 7. The FEM of the cable-stayed bridge under vehicle loads [18].
Sensors 23 00860 g007
Figure 8. The first five mode shapes of the cable-stayed bridge [18]. (a) The 1st test mode shape [32]; (b) the 1st FEM mode shape at side; (c) the first five FEM mode shapes in 3D perspective.
Figure 8. The first five mode shapes of the cable-stayed bridge [18]. (a) The 1st test mode shape [32]; (b) the 1st FEM mode shape at side; (c) the first five FEM mode shapes in 3D perspective.
Sensors 23 00860 g008
Figure 9. The test vehicle and the bending strains. (a) Holden Colorado Ute [1]; (b) the measured bending strain (black line) [1] and the FEM bending strain (red line) [18].
Figure 9. The test vehicle and the bending strains. (a) Holden Colorado Ute [1]; (b) the measured bending strain (black line) [1] and the FEM bending strain (red line) [18].
Sensors 23 00860 g009
Figure 10. The poly lines of D I X V with 10%, 20%, and 30% in Cables 1#–4# and Cables 9#–12#. (a) Cable 1#; (b) Cable 2#; (c) Cable 3#; (d) Cable 4#; (e) Cable 9#; (f) Cable 10#; (g) Cable 11#; (h) Cable 12#.
Figure 10. The poly lines of D I X V with 10%, 20%, and 30% in Cables 1#–4# and Cables 9#–12#. (a) Cable 1#; (b) Cable 2#; (c) Cable 3#; (d) Cable 4#; (e) Cable 9#; (f) Cable 10#; (g) Cable 11#; (h) Cable 12#.
Sensors 23 00860 g010
Figure 11. The poly line diagrams of B V j # , d e for Cables 1#–4# with 10%, 20%, and 30% damage, respectively. (a) Cable 1#; (b) Cable 2#; (c) Cable 3#; (d) Cable 4#.
Figure 11. The poly line diagrams of B V j # , d e for Cables 1#–4# with 10%, 20%, and 30% damage, respectively. (a) Cable 1#; (b) Cable 2#; (c) Cable 3#; (d) Cable 4#.
Sensors 23 00860 g011
Figure 12. Comparison of D I I V c 1 # , 20 % ; 4 # , 10 % obtained by FEM and D I I V s 1 # , 20 % ; 4 # , 10 % obtained by superposition.
Figure 12. Comparison of D I I V c 1 # , 20 % ; 4 # , 10 % obtained by FEM and D I I V s 1 # , 20 % ; 4 # , 10 % obtained by superposition.
Sensors 23 00860 g012
Figure 13. Histogram of DIV obtained from a set of DIXV for each damage scenario without noise and adding 5%, 10%, 15%, and 20% noise, respectively. (a) Scenario ①; (b) Scenario ②; (c) Scenario ③; (d) Scenario ④; (e) Scenario ⑤; (f) Scenario ⑥; (g) Scenario ⑦.
Figure 13. Histogram of DIV obtained from a set of DIXV for each damage scenario without noise and adding 5%, 10%, 15%, and 20% noise, respectively. (a) Scenario ①; (b) Scenario ②; (c) Scenario ③; (d) Scenario ④; (e) Scenario ⑤; (f) Scenario ⑥; (g) Scenario ⑦.
Sensors 23 00860 g013
Figure 14. The sample proportion histogram of the cable labels identified by the test dataset with 2800 DIXVs. (a) Scenario ①; (b) Scenario ②; (c) Scenario ③; (d) Scenario ④; (e) Scenario ⑤; (f) Scenario ⑥; (g) Scenario ⑦.
Figure 14. The sample proportion histogram of the cable labels identified by the test dataset with 2800 DIXVs. (a) Scenario ①; (b) Scenario ②; (c) Scenario ③; (d) Scenario ④; (e) Scenario ⑤; (f) Scenario ⑥; (g) Scenario ⑦.
Sensors 23 00860 g014
Table 1. Comparison of the first five frequencies by the proposed model and experimental results.
Table 1. Comparison of the first five frequencies by the proposed model and experimental results.
Mode No.Frequency (FEM)
(Hz)
Frequency (Test)
(Hz) [31]
Difference
(%)
MAC
12.0382.0141.1920.978
23.1633.5109.886
34.0883.64512.154
45.3295.5383.774
56.5306.0687.614
The difference = absolute (Frequency (FEM)—Frequency (Test))/Frequency (Test) × 100%.
Table 2. The hypothetical damage scenarios.
Table 2. The hypothetical damage scenarios.
Damage
Scenario
Damaged
Cable Label
Damage Severity (%)Remarks
1#20Single cable damaged
4#10
10#25
1#20Two cables damaged simultaneously
4#10
2#20
12#20
1#10Three cables damaged simultaneously
4#30
10#20
1#30Four cables damaged simultaneously
3#10
9#20
11#30
Table 3. Results of identified damaged cables by a set of DIXVs for each damage scenario using the BVM method and the SVM method [18].
Table 3. Results of identified damaged cables by a set of DIXVs for each damage scenario using the BVM method and the SVM method [18].
Noise LevelMethodScenario ①Scenario ②Scenario ③Scenario ④Scenario ⑤Scenario ⑥Scenario ⑦
0%BVM14101, 42, 121, 4, 101, 2, 3, 9, 10, 11
SVM14101, 42, 12————
5%BVM14101, 42, 121, 4, 101, 2, 3, 9, 10, 11
SVM14101, 42, 12————
10%BVM14101, 42, 121, 4, 101, 2, 3, 9, 11
SVM14101, 42, 12————
15%BVM14101, 41, 2, 3, 121, 4, 101, 3, 9, 10, 11
SVM14101, 42, 12————
20%BVM14101, 42, 11, 121, 3, 4, 9, 101, 3, 9, 10, 11
SVM14101, 42, 12————
“——” means this item does not exist. The values in the blue zone are the identified damaged cables using the SVM method [18].
Table 4. The damage severity identification function, when a single cable is damaged.
Table 4. The damage severity identification function, when a single cable is damaged.
Damaged Cable LabelDamage Severity Identification Function
1#(9#)de1(x) =1.268 × 10−07x3 − 3.624×10−05x2 + 0.006903x − 4.684×10−17
2#(10#)de2(x) = 9.334 × 10−08x3 − 2.985×10−05x2 + 0.006615x + 4.372×10−17
3#(11#)de3(x) = 2.758 × 10−08x3 − 1.341×10−05x2 + 0.004704x + −6.592×10−17
4#(12#)de4(x) = 1.148 × 10−08x3 − 7.828×10−06x2 + 0.004198x + −3.504×10−17
Table 5. The damage severity identification results using the BVM method and the SVM method [18].
Table 5. The damage severity identification results using the BVM method and the SVM method [18].
The Damage
Scenario
Damaged
Cable
Exact Damage Severity (%)Identified Damage Severity (%)
MethodNoise 0%Noise 5%Noise 10%Noise 15%Noise 20%
1#20BVM19.9920.2618.1422.1522.80
SVM19.4319.1720.2523.5719.28
4#10BVM10.009.7610.817.645.78
SVM10.1410.299.369.949.34
9#25BVM25.0026.3724.4629.7129.02
SVM24.7325.0123.0423.0626.09
1#20BVM19.9922.0920.8813.4330.13
SVM19.2819.3220.0719.6123.80
4#10BVM10.0110.269.7811.6912.32
SVM7.928.168.687.815.06
2#20BVM20.4120.9120.6721.1316.17
SVM19.1619.3419.4818.3913.05
12#20BVM19.7019.4622.8619.8317.47
SVM19.3118.2120.2119.3919.73
1#——BVM——————5.36——
3#——BVM——————3.42——
11#——BVM————————3.00
1#10BVM9.419.6410.469.228.11
4#30BVM29.7328.6428.9526.4834.61
10#20BVM20.6620.8722.8127.9915.87
3#——BVM————————9.60
9#——BVM————————3.91
1#30BVM28.0226.4421.0125.3530.31
3#10BVM6.786.423.8211.759.93
9#20BVM15.0015.318.5913.1122.74
11#30BVM28.2628.7327.6322.3030.58
2#——BVM4.087.485.50————
10#——BVM4.693.52——13.055.78
The bold italics indicate the misidentified damaged cable labels and their identified damage severity. “——” means this item does not exist. The values in the pink zone are the identified damage severity using the SVM method [18].
Table 6. The error of the identified damage severity using the BVM method and the SVM method [18].
Table 6. The error of the identified damage severity using the BVM method and the SVM method [18].
The Damage
Scenario
Damaged
Cable
Exact Damage
Severity (%)
Error of Identified Damage Severity (%)
MethodNoise 0%Noise 5%Noise 10%Noise 15%Noise 20%
1#20BVM−0.010.26−1.862.152.8
SVM−0.57−0.830.253.57−0.72
4#10BVM0−0.240.81−2.36−4.22
SVM0.140.29−0.64−0.06−0.66
10#25BVM01.37−0.544.714.02
SVM−0.270.01−1.96−1.941.09
1#20BVM−0.012.090.88−6.5710.13
SVM−0.72−0.680.07−0.393.80
4#10BVM0.010.26−0.221.692.32
SVM−2.08−1.84−1.32−2.19−4.94
2#20BVM0.410.910.671.13−3.83
SVM−0.84−0.66−0.52−1.61−6.95
12#20BVM−0.3−0.542.86−0.17−2.53
SVM−0.69−1.790.21−0.61−0.27
1#10BVM−0.59−0.360.46−0.78−1.89
4#30BVM−0.27−1.36−1.05−3.524.61
10#20BVM0.660.872.817.99−4.13
1#30BVM−1.98−3.56−8.99−4.650.31
3#10BVM−3.22−3.58−6.181.75−0.07
9#20BVM−5−4.69−11.4−6.892.74
11#30BVM−1.74−1.27−2.37−7.70.58
The values in the pink zone are the errors of the identified damage severity using the SVM method [18].
Table 7. The MSE of the identified damaged severity of the 7 damage scenarios’ test dataset using the BVM method and the SVM method [18].
Table 7. The MSE of the identified damaged severity of the 7 damage scenarios’ test dataset using the BVM method and the SVM method [18].
The Damage
Scenario
Damaged
Cable
Exact Damage
Severity (%)
MSE of Identified Damage Severity
MethodNoise 5%Noise 10%Noise 15%Noise 20%
1#20BVM0.00010.00060.00130.0019
SVM0.75901.8913.8895.9577
4#10BVM0.00000.00010.00030.0005
SVM0.06550.20880.39851.1179
10#25BVM0.00030.00130.00240.0041
SVM0.63532.40034.706210.0898
1#20BVM0.00010.00050.00130.0018
SVM1.01662.43574.34625.9171
4#10BVM0.00000.00010.00030.0005
SVM4.17234.52395.01315.5097
2#20BVM0.00020.00070.00220.0040
SVM1.00831.59742.94344.7203
12#20BVM0.00010.00050.00110.0016
SVM1.03723.55396.382610.2385
1#10BVM0.00010.00030.00060.0014
4#30BVM0.00020.00110.00150.0036
10#20BVM0.00030.00080.00190.0039
1#30BVM0.00070.00130.00440.0046
3#10BVM0.00110.00140.00230.0021
9#20BVM0.00330.00370.00800.0076
11#30BVM0.00090.00170.00350.0055
The values in the pink zone are MSE of the identified damage severity using the SVM method [18].
Table 8. The R2 of the identified damaged severity of the 7 damage scenarios’ test dataset using the BVM method and the SVM method [18].
Table 8. The R2 of the identified damaged severity of the 7 damage scenarios’ test dataset using the BVM method and the SVM method [18].
The Damage
Scenario
Damaged
Cable
Exact Damage
Severity (%)
R2 of Identified Damage Severity
MethodNoise 5%Noise 10%Noise 15%Noise 20%
1#20BVM1.0028 1.0154 1.0319 1.0484
SVM1.00201.00501.01011.1056
4#10BVM1.0028 1.0096 1.0296 1.0516
SVM1.00061.00201.00391.0107
10#25BVM1.0053 1.0203 1.0390 1.0720
SVM1.00101.00391.00751.0166
1#20BVM1.0032 1.0114 1.0334 1.0470
SVM1.00281.00651.01161.0154
4#10BVM1.0033 1.0091 1.0255 1.0524
SVM1.07011.07681.08641.0927
2#20BVM1.0055 1.0181 1.0541 1.1033
SVM1.00281.00431.00801.0129
12#20BVM1.0038 1.0128 1.0305 1.0412
SVM1.00281.00951.01801.0269
1#10BVM1.0156 1.0297 1.0738 1.1627
4#30BVM1.0028 1.0122 1.0177 1.0420
10#20BVM1.0062 1.0192 1.0488 1.0982
1#30BVM1.0085 1.0167 1.0622 1.0556
3#10BVM1.2923 1.3935 1.8755 1.6798
9#20BVM1.1725 1.1846 1.4798 1.3949
11#30BVM1.0113 1.0213 1.0467 1.0714
The values in the pink zone are R2 of the identified damage severity using the SVM method [18].
Table 9. The U95 of the identified damaged severity of the 7 damage scenarios’ test dataset using the BVM method and the SVM method [18].
Table 9. The U95 of the identified damaged severity of the 7 damage scenarios’ test dataset using the BVM method and the SVM method [18].
The Damage
Scenario
Damaged
Cable
Exact Damage
Severity (%)
U95 of Identified Damage Severity
MethodNoise 5%Noise 10%Noise 15%Noise 20%
1#20BVM0.00210.00480.00710.0087
SVM0.17080.26960.38650.4784
4#10BVM0.00100.00190.00330.0045
SVM0.05020.08960.12370.2072
10#25BVM0.00360.00720.00960.0126
SVM0.15620.30370.42520.6226
1#20BVM0.00220.00420.00710.0083
SVM0.19760.30590.40860.4768
4#10BVM0.00110.00190.00320.0045
SVM0.40040.41690.43880.4601
2#20BVM0.00300.00530.00910.0124
SVM0.19680.24770.33630.4258
12#20BVM0.00240.00440.00660.0079
SVM0.19960.36950.49520.6272
1#10BVM0.00230.00330.00500.0073
4#30BVM0.00310.00640.00770.0117
10#20BVM0.00310.00560.00860.0122
1#30BVM0.00510.00720.01300.0133
3#10BVM0.00640.00730.00940.0090
9#20BVM0.01120.01190.01750.0171
11#30BVM0.00580.00810.01150.0145
The values in the pink zone are U95 of the identified damage severity using the SVM method [18].
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ren, J.; Zhu, X.; Li, S. Multiple Damaged Cables Identification in Cable-Stayed Bridges Using Basis Vector Matrix Method. Sensors 2023, 23, 860. https://doi.org/10.3390/s23020860

AMA Style

Ren J, Zhu X, Li S. Multiple Damaged Cables Identification in Cable-Stayed Bridges Using Basis Vector Matrix Method. Sensors. 2023; 23(2):860. https://doi.org/10.3390/s23020860

Chicago/Turabian Style

Ren, Jianying, Xinqun Zhu, and Shaohua Li. 2023. "Multiple Damaged Cables Identification in Cable-Stayed Bridges Using Basis Vector Matrix Method" Sensors 23, no. 2: 860. https://doi.org/10.3390/s23020860

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop