Paper Title:
Research on Identification Theories of Bridge Damage
  Abstract

This paper makes a research on dynamic fingerprints methods and model updating methods of identification theories of bridge damage. And it has a full study on and makes a comparison among the four basic theories of dynamic fingerprints and their applications in engineering, signifying the advantages and disadvantages. The general procedures of damage identification of model updating method are proposed. And finally it points out that the problems needing further studies and the directions of development in damage identification theories.

  Info
Periodical
Advanced Materials Research (Volumes 143-144)
Edited by
H. Wang, B.J. Zhang, X.Z. Liu, D.Z. Luo, S.B. Zhong
Pages
614-618
DOI
10.4028/www.scientific.net/AMR.143-144.614
Citation
G. J. Liu, Y. Q. Yang, F. Guo, "Research on Identification Theories of Bridge Damage", Advanced Materials Research, Vols. 143-144, pp. 614-618, 2011
Online since
October 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Yan Song Diao, Fei Yu, Dong Mei Meng
Chapter 2: Monitoring and Control of Structures
Abstract:When the AR model is used to identify the structural damage, one problem is often met, that is the method can only make a decision whether...
1211
Authors: Long Qiao, Asad Esmaeily
Chapter 2: Monitoring and Control of Structures
Abstract:Deterioration of structures due to aging, cumulative crack growth or excessive response significantly affects the performance and safety of...
834
Authors: Feng Ge Li, Hong Yu
Chapter 2: Disaster Prevention and Reduction of Civil Engineering
Abstract:A new method to diagnose the damage of masonry structure using artificial network is brought forward. The frequencies and the ratio of change...
1148
Authors: M. O. Abdalla, E. Al-Khawaldeh
Chapter 23: Computer-Aided Design, Manufacturing, and Engineering
Abstract:An optimal damage detection sensor placement methodology is presented. The techniques utilize a Particle Swarm Optimization (PSO) algorithm....
5336