12.07.2015 Views

application of frequency-domain system identification techniques in ...

application of frequency-domain system identification techniques in ...

application of frequency-domain system identification techniques in ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

9.3. Applications 251with their unknown operational scal<strong>in</strong>g factor for all considered modes i.φ ref[:,i] = α iψ ref[:,i] (9.35)Although this operation is straightforward for the second order approximation andthe Rayleigh quotient approach, care has to be taken for the multi step first orderapproach. S<strong>in</strong>ce this method alters the mode shapes dur<strong>in</strong>g each step, expression(9.35) should only be substituted <strong>in</strong> the expression for the first step (n = 0), i.e.,the normalization is effected dur<strong>in</strong>g the first step. The related expressions thenbecome∂φ (0)[k,i]∂m k∂ω (0)i∂m k≃ −α i ψ [k,i]⎛⎝ α2 i2 ψ2 [k,i] + N m∑ω (1)i = ω (0)= − ωref i2 α2 i ψ[k,i] 2 (9.36)r=1,r≠i∑N ki +k=1(ω ref rφ (1)[k,i] = α iψ [k,i] + ∆φ (0)[k,i] = α iψ [k,i] +(ωi ref ) 2) 2 − (ω refi) 2 α2 r ψ2 [k,r]⎞⎠ (9.37)∂ω (0)i∂m k∆m kN s(9.38)∑N kk=1∂φ (0)[k,i] ∆m k(9.39)∂m k N sFor n > 0 the orig<strong>in</strong>al expressions (9.15)–(9.18) are reta<strong>in</strong>ed. For all three methods,the optimization is accomplished by m<strong>in</strong>imiz<strong>in</strong>g the follow<strong>in</strong>g cost functionsfor the second order approximation, the multi step first order method and theRayleigh quotient iteration method respectively.∑N mK 2ND(α 1 , . . . , α Nm ) = ∣ ωmodii=1− (ω modi ) 2ND∣ ∣2(9.40)∑N m∣K MS(α 1 , . . . , α Nm ) =i=1∑N m∣K RQ(α 1 , . . . , α Nm ) =i=1∣ω modi∣ω modi− (ω modi ) MS∣ ∣2− (ω modi ) RQ∣ ∣2(9.41)(9.42)Reasonable start<strong>in</strong>g values for α i can be generated from (4.24) by the orig<strong>in</strong>al firstorder approach as presented <strong>in</strong> Chapter 4, Sec. 4.2.2.9.3.2 Sensitivity-based damage <strong>identification</strong>Another related <strong>application</strong> is sensitivity-based damage <strong>identification</strong> (Chapter 7).The ma<strong>in</strong> idea is to <strong>in</strong>terpret experimentally determ<strong>in</strong>ed changes <strong>in</strong> modal parameters<strong>in</strong> order to obta<strong>in</strong> <strong>in</strong>formation on the structural modifications, i.e., damage,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!