Study on Damage Detection of Bridge Based on Wavelet Multi-Scale Analysis

2013 ◽  
Vol 639-640 ◽  
pp. 1010-1014 ◽  
Author(s):  
Ke Ding ◽  
Ting Peng Chen

The damage detection method based on wavelet multi-scale analysis is presented in the paper. The damage location can be identified by analyzing the multi-scale wavelet transform coefficients of curvatures of mode shapes. The extreme value of wavelet transform coefficients indicates the damage location. But it is difficult to detect the location of defect if the defect is near to the equilibrium position of vibration. In order to solve this problem, we put forward a method which is to add the wavelet transform coefficients of multi modals together. The method can effectively overcome the above problem. Three damage situations of simply supported beam bridge are discussed in the paper. The results show that the peaks of wavelet transform coefficients indicate the damage location of structural. It is possible to pinpoint the damage location based on wavelet multi-scale analysis on curvatures of mode shapes.

1999 ◽  
Vol 25 (8) ◽  
pp. 877-885 ◽  
Author(s):  
M Toubin ◽  
C Dumont ◽  
E.P Verrecchia ◽  
O Laligant ◽  
A Diou ◽  
...  

2010 ◽  
Vol 16 (S2) ◽  
pp. 474-475
Author(s):  
F Wang ◽  
N Li

Extended abstract of a paper presented at Microscopy and Microanalysis 2010 in Portland, Oregon, USA, August 1 – August 5, 2010.


2020 ◽  
pp. 107645
Author(s):  
Lisheng Huang ◽  
Jinye Ran ◽  
Wenyong Wang ◽  
Tan Yang ◽  
Yu Xiang

2014 ◽  
Vol 494-495 ◽  
pp. 908-912
Author(s):  
Da Hui Li ◽  
Tao Jin

In the paper, firstly establishes the pipeline system model based on the principles of correlation analysis, and determines the correlation characteristics of pipeline flow and pressure. Secondly multi-scale analysis is introduced into dynamic system processing. A leak detection method is shown with the multiscale correlation analysis, and is compared to the residual correlation analysis; it overcomes two the mistakes with different nature, such as too much interference or loss of leakage signal details. Finally through the actual data verification, the methods suitable for mutation signal, but slowly changing signals need to find another method.


2013 ◽  
Vol 34 (9) ◽  
pp. 2078-2084 ◽  
Author(s):  
Yun-fei Wang ◽  
Du-yan Bi ◽  
De-qin Shi ◽  
Tian-jun Huang ◽  
Di Liu

Sign in / Sign up

Export Citation Format

Share Document