2002
DOI: 10.1088/0266-5611/18/3/318
|View full text |Cite
|
Sign up to set email alerts
|

Real time computational algorithms for eddy-current-based damage detection

Abstract: Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and R… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
21
0

Year Published

2003
2003
2016
2016

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(21 citation statements)
references
References 34 publications
(72 reference statements)
0
21
0
Order By: Relevance
“…Corrosion occurs in many different forms, and several mathematical models for electrostatic fields in the presence of corrosion have been studied in the literature (see, for example, Kaup and Santosa [16], Kaup et al [17], Vogelius and Xu [21], Inglese [12], Luong and Santosa [13], Banks et al [3] and references therein).…”
Section: Introductionmentioning
confidence: 99%
“…Corrosion occurs in many different forms, and several mathematical models for electrostatic fields in the presence of corrosion have been studied in the literature (see, for example, Kaup and Santosa [16], Kaup et al [17], Vogelius and Xu [21], Inglese [12], Luong and Santosa [13], Banks et al [3] and references therein).…”
Section: Introductionmentioning
confidence: 99%
“…Damage detection and location identification algorithms include wavelet-based approaches 33 , two-stage modal frequency analysis 34 , and methods for eddy-current-based damage detection 35 . Property matrix updating, nonlinear response analysis, and damage detection using neural networks are all methods used to manipulate the information gathered by SHM systems for decision making.…”
Section: Damage Detection Algorithmsmentioning
confidence: 99%
“…Some of these procedures are: the acoustic emission (Li et al, 2011), infrared thermography (Shih et al, 2000), ultrasound (Voigt et al, 2003), image processing (Nishikawa et al, 2012), eddy currents (Banks et al, 2002), and radiographs (Vossoughi et al, 2007); which are all used in assessing structural damage. However, the aforementioned methods possess several disadvantages; for instance, it is required that the location of the damage be known a priori, the section of the structure under inspection needs to be easily accessible and in several cases, the structures must be closed temporarily during its inspection (Curadelli et al, 2008).…”
Section: Introductionmentioning
confidence: 99%