• Tidak ada hasil yang ditemukan

Developing An Efficient Deep Learning Model For Anomaly Detection For Monitoring The Structural Health Of Buildings

N/A
N/A
Protected

Academic year: 2023

Membagikan "Developing An Efficient Deep Learning Model For Anomaly Detection For Monitoring The Structural Health Of Buildings "

Copied!
15
0
0

Teks penuh

(1)

9724 Vol. 71 No. 4 (2022)

http://philstat.org.ph

Developing An Efficient Deep Learning Model For Anomaly Detection For Monitoring The Structural Health Of Buildings

Ujjwal Thakur

MTech Scholar, Department of Civil Engineering

Shri Shankaracharya Institute of Professional Management and Technology Raipur, India

[email protected] Rajan Kumar Singh

Assistant Professor, Department of Civil Engineering

Shri Shankaracharya Institute of Professional Management and Technology Raipur, India

[email protected] Sanjeev Ashatkar

MTech Scholar, Department of Civil Engineering

Shri Shankaracharya Institute of Professional Management and Technology Raipur, India

[email protected]

Article Info

Page Number: 9724 9738 Publication Issue:

Vol 71 No. 4 (2022)

Article History

Article Received: 15 September 2022 Revised: 25 October 2022

Accepted: 14 November 2022 Publication: 21 December 2022

Abstract: — Due to their ability to maintain the structural health and discover deterioration to important civil constructions including buildings, flyovers, and pipelines, contemporary structural health monitoring methods are increasingly used in civil construction. While significant advancements have been made in improving abnormality recognition to maintain public safety, algorithms that could be utilized for long-term supervision on inexpensive technology remain still a community-wide unanswered question.

Owing to the unbalanced design of the parts, structural response identification is a difficult task. Consequently, Gabor filters provide a benefit for one-stage detection. To substitute the lowest convolution layers that make up the SSD's architecture, generalized Gabor filters are developed. Using a deep neural network and SSD detectors, a technique for autonomously identifying and removing anomalous information is suggested in this study.

Initially, a time series classifying issue is used to simulate the anomalous detecting issue. The initial sequences are processed using data pre-processing and enrichment, comprising information enlargement and down-sampling to create new instances. Information extension techniques such as symmetric switching, noise additions and arbitrarily growing outliers are employed for a limited amount of instances in the information collection, and images that have the same label are contributed without expanding the initial records.

The optimum value and lowest mean are simultaneously extracted symmetrical in order to minimise the complexity of the intake samples while keeping the majority of the information's features. CNN is better at handling uneven training dataset when the categorization parameters are hyper variable tuned. The anomalous identification of accelerating statistics on a long-span building is the last demonstration of the efficiency of the suggested technique. The suggested method may successfully identify

(2)

9725 Vol. 71 No. 4 (2022)

http://philstat.org.ph

numerous anomalous behaviour for the anomalous recognition problems that is represented as a standard statistical classifications task.

Keywords: Structural HealthMonitoring; Convolutional Neural Network;

Gabor filter; SSD Detector; VGG-19

INTRODUCTION

An area of science known as structural health monitoring (SHM) focuses on assessing and keeping track of a structure's stability. Systems for monitoring the structural health of machines and structures are built on the layout of sensing applications and structural models[1].The primary goals of structural health monitoring in buildings are to track the state of the structure, identify structural damage or abnormalities, and assess the security of the structure by using long-term monitoring data gathered from a variety of sensors mounted on the structure.This is a cutting-edge, multifunctional technology that serves as a potent instrument for raising the bar for intelligently managing and maintaining civil infrastructures [2]. Long-term monitoring of a civil structural system will also aid in the thorough knowledge of structural performance and behavior under real-world environmental and impact resistance.Structural Health Monitoring systems are made up of a number of hardware and software components. The important elements of Structural Health Monitoring are Operation analysis, data gathering, extraction of features, and standard prediction model [3].

The operation analysis is a potion pertaining to operational circumstances and damage modeling. The data gathering comprises data preprocessing and sensor system design [4].

The extraction of features is utilized to identify the delicate damage characteristics in accordance with the capability of the intended structural health management system. The standard prediction model is the process of designing and putting a data or physics-based model in action [5]. Individual components of enormous civil constructions and sophisticated machinery are among the properties monitored by Structural Health Monitoring, which has several application areas. In order to evaluate the existing condition of the structure and, in some circumstances, forecast how the building will respond to future earthquake events, building SHM systems concentrate on sensing modifications in the physical parameters.

The solution to this problem has been determined to be anomaly detection, which is utilized to find unexpected observations or occurrences that arouse suspicion. This method has been widely employed in a variety of application areas, including civil infrastructure health monitoring employing vibration signals, quality management in manufacturing, criminal identification, clinical anomaly identification, and weather monitoring[6].Anomaly detection in the building industry focuses on the identification and diagnosis of anomalous building operation tendencies, which can be caused by unusual operating characteristics, mistakes in the monitoring and designing of a system, defects in the equipment, and unproductive methods of operation[7].It has been employed at three distinct levels: the level of the entire building, the level of the subsystem, and the level of the component. For building operation personnel to comprehend building operating circumstances, conduct energy performance evaluations, and create practical energy-saving strategies, the prompt detection of anomalies in building operations may be highly beneficial.Due to advancements

(3)

9726 Vol. 71 No. 4 (2022)

http://philstat.org.ph

in information technology, building energy management systems (BEMS) or building automation systems can effectively monitor and regulate real-time building operational performance (BAS). There are vast volumes of operational building data being gathered and analyzed[8]. Therefore, the development of information techniques for achieving precise and trustworthy anomaly detection is particularly promising. Current anomaly detection techniques in the construction industry may be divided into two categories, supervised and unsupervised techniques, depending on the types of data analytics employed.However, creating efficient anomaly detectors is a difficult challenge. Data sources are frequently unbalanced and substantially under-sampled for anomalous information. The minimal occurrence frequency of anomalous occurrences is the fundamental cause of their rarity[9].

These occurrences, which may include the total destruction of things and infrastructure, are very expensive to produce intentionally. Further, due to the enormous amount of effort and specialized knowledge required in label generation, publicly accessible massive quantities of labeled datasets among all sorts of anomalous occurrences are often not available.

Additionally, some of the oddities might not be anticipated.

Although many different Structural Health Management systems have been developed, installed, and monitored on many types of civil infrastructure over the past 20 years, a significant gap still remains between Structural Health Management and structural management and maintenance [10].One of the primary causes is that the widespread use of Structural Health Management technology is severely constrained by the difficulties that the present data processing techniques face from ambient noise, the quantity of data measured, the difficulty of computing, etc. The Structural Health Management community has been very concerned with realizing the independent, precise, and reliable handling of the monitoring data. Researchers in the Structural Health Management field have worked hard to analyze and interpret the vast amounts of monitoring data through the use of deep learning techniques, which are essential elements of Artificial Intelligence. Besides assisting everyone in precisely and thoroughly recognizing the structural service condition and the features of the target building's long-term degradation, removing and prospecting the patterns and regulations intrinsic in the classic multi-source diverse field monitoring data will also enable us to make judgments about the investigation, fixing, and enhancing. In this paper, we are using the deep learning algorithm to detect the anomaly in the building to maintain structural health. Deep learning is a type of representation learning technique that enables a network design to learn fairly abstract characteristics on its own from unprocessed data in order to complete detection or categorization challenges[11]. Recent years have seen increased interest in deep learning, a branch of machine learning algorithms that are modelled after the structure and operation of the brain. Deep-learning techniques uncover the intricate patterns in the data without assuming anything about its emerging themes.

I. RELATED WORKS

The identification of civil structural parts is a crucial step throughout the structural health monitoring process for the evaluation and interpretation of losses related to different structural components. The uneven design of the components makes it difficult to identify structural parts. Gabor filters to just a one-stage detector is added to improve it. The lowest convolutional filters of SSD's core are replaced with generic Gabor filters. This same variant

(4)

9727 Vol. 71 No. 4 (2022)

http://philstat.org.ph

SSD detector's assessment of structural imaging yields encouraging detection outcomes. The experimental outcomes demonstrate an increase throughout the variant SSD detector's learning rate and accuracy.Meanwhile Gabor filters have a ring alike impact at the boundaries because of their high-frequency retort, employing them as such a convolutional modulator also isn't examined, a comparison with various cutting-edge detectors shows that the SSD employing Gabor filters is preferable [12].

With a focus on structural health monitoring, a simulation centred decision technique is employed for the proactive management of complex structures. The plan is built on a data- driven methodology that takes advantage of an offline-online deconstruction. By resolving a parameterized time-dependent partially differential equation for a collection of input parameters with samples taken from respective probability distribution of natural fluctuations, a simulated dataset is created offline. In order to build multiple data sources of healthy configuration, trained classifiers are created using the time signals that have been gathered and extracted from the sensor sites. A one class Support Vector Machines are then trained on these datasets to look for anomalies. A fresh measurement, presumably derived from a broken configuration, is assessed utilising classifiers even during online phase.In order to offer information on deterioration, a hierarchical approach is used. Initially, binary feedback is used to categorise the entire structure reaction as either healthy or damaged. Next, again for outliers, the results of several classifiers to extract data on the gravity and position of the damages was used. A method order reduction approach is used to lessen the computational load due to the enormous numeral of signals required to generate the databases offline. In demand to simulate the vibrational behaviour of complex constructions under the influence of an active sources, the concept to both 2D and 3D issues is used. the efficiency of the method for identifying and localising cracks was demonstrated.The harm indicator features in the situation are not modified, and other anomaly detection techniques like autoencoders just are not utilized to automatically recognise the fundamental properties of healthy signals [13].

In order to enable the visual check of civilian infrastructure, the study discusses the implementation of anomaly recognition of flaws on concrete constructions using deep learning. To quickly and accurately identify faults from the numerous picture databases, a convolutional autoencoder been skilled as a reconstruction-depended system using the defect- free images. Without a labelling, the training method was carried out in unsupervised mode, negating the requirement for prior knowledge and significantly cutting down on label preparation process time. The built-in anomaly detector promotes reducing the reconstruction faults of imperfection-free images, resulting in significant modernization mistakes of defects, hence identifying their location. The evaluation demonstrates that the suggested anomaly detection method is reliable and flexible enough to handle flaws of various sizes.The findings of the anomaly mapping beat other segmentation technique in regards to precision, F1 score, recall, and F2 measure, avoiding significant often under as well as over-segmentation.

A similarity was also done with the segmentation findings presented through other automatic conventional techniques. Wherever flaws on concrete buildings are found, the irregularity rating, which serves as a danger indication for forewarning inspectors, is recorded by every pixel of the anomaly mapping rather than just being a binary mapping. The convolutional

(5)

9728 Vol. 71 No. 4 (2022)

http://philstat.org.ph

autoencoder will eventually not be trained using a more varied picture datasets of the regular class, including such concrete exteriors of varying unevenness and colour exposed to a widespread range of backdrops, illumination circumstances, and capture positions [14].

By introducing an Internet of Things depended SHM framework for the proactive conservation of industrial facilities, civil engineering constructions, as well as substructures.

The cyber physical framework consists of three layers: a data attainment layer constructed happening the latest W3C Web of Things benchmark, a data storing as well as layer of analytics which makes use of dispersed databases and machine learning techniques, as well as a monitor and control layer which thus uses accelerometer-based smart sensors. on the computer hardware and software aspects of the suggested SHM manner, highlighting its benefits for scalability of data, supporting interoperability, and device adaptability is detailed.

In the project, the observation of a metallic structural frame serves as the final test of the system's efficiency. Designing and evaluating data analytics programmes for event recognition and prediction while concurrently applying cutting-edge and ground-breaking signal processing methods for the derivation of modal analysis, which are thought to be more useful for damage localization reasons, is not included [15].

One of the most challenging parts of employing a vibration-based approach to detect structural deterioration is noise in involved parameters through output-only modal analysis because of changing ambient and operational conditions. By combining dynamic response information from two comparable shear wall buildings, the study suggests method for reducing noise levels in vibration analysis and dynamic parameters. A strengthened concrete building with three stories is the study's subject. Initially, the zero-order temporal instant of the vibration analysis and the damage aspects as natural frequencies being investigated. By modelling wall demolition and opening entrance into that same finite element models, such feature changes are also investigated in more detail. It is known that induced structural alterations have less of an effect on dynamic responsiveness than variations in the basic excitation spectrum.A zero-order temporally instant of the vibration analysis, for example, is a time period property that cannot be used with the method. The differential of natural frequencies between two observed buildings is the ideal harm delicate feature vector for the strategy. The technique for combining vibration data from various buildings that communicate the very same operational and ecological conditions effectively filters out environmental noise as well as provides a definite advantage in lowering the potentiality of false alarms during the ongoing and automated structure health monitoring methodology. The efficacy of the approach regarding real structures within their working environment is not evaluated through additional full-scale experimental research [16].

The research method for identifying "bad" outliers—impact damages upon structural frequency signals. A method based on the Minimum Covariance Determinant (MCD), Variational Mode Decomposition (VMD), and Recurrent Neural Network (RNN) incorporating Bidirectional Long Short-Term Memory cells has been devised to achieve th goal. The signals are first denoised and their seasonal patterns are removed using the VMD during pre-processing. The approach then aims to understand the mathematical principles governing the estimation of such Mahalanobis detachments of such points from about their spreading, utilising constraints are extracted from the MCD technique, by having trained an

(6)

9729 Vol. 71 No. 4 (2022)

http://philstat.org.ph

RNN on signal generated from the suboptimal state of the framework.The collected data from the building's posterior state would be used to demonstrate that, because the trained RNN really hasn't learned the rule underlying how damage affects Mahalanobis distances, the predicted values of such values will rise sharply as early as damage happens (together with damage). A numerical example has been used to test the effectiveness of the strategy before it is further validated by completing an experiment instance of such Z24 bridge. The technique is also contrasted with a PCA depended approach. The outcomes show how effective the approach is in evaluating the long-term sustainability of civil organizations. The suggested technique, which is an outcome only state - based technique, only needs a few of the minimum structure natural frequency signals monitored concluded a lengthy structure monitoring period. As a result, it is advised in situations because when EOV measures are unavailable. The method could also be used conjunction with the other output-only and otherwise input-out approaches to enhance or validate the accuracy of their findings.

Additionally, in the accuracy of the findings were lower [17].

II. PROPOSED METHODOLOGY

In order to recognize the input images with fissures, a patch-based strategy was described in this research utilizing fifteen fully convolutional classifier model. It compares the efficiency of the current state-of-the-art Convolutional networks in identifying the cracked spots. The method does this by making sure that there are no overlaps between picture patches before determining whether or not any particular imaging piece has cracks in it.

A. Dataset

The vast numbers of statistics that are readily accessible in relation to engineering structures primarily consist of constructions, some of which may or may not have flaws, rather than the many important structural elements. As a result, it will create a modest construction element data base that has the classes doorway, windows, pillars, beams, walls, rooftop, and stairs. The National Information Service for Earthquake Engineering (NISEE), Designing, and Secure are three infrastructure-related digital libraries that are used to collect database. The images are tagged utilizing three annotation patterns: two dimensional coordinates, Circular region, and Polyline area utilizing the VGG Images Accuracy software.

Table I contains a summary of the information related to the building components.

(7)

9730 Vol. 71 No. 4 (2022)

http://philstat.org.ph

Table 1: Summary of the information related to the building components

B. GABOR FILTERS

When detecting objects, the Detection methods use spatially localised characteristics.

Although Cnn models are renowned for extracting characteristics, they occasionally neglect important traits that they're unable to acquire or comprehend. Comparing to convolution layers, Gabor filters have shown to extract essential components at lower elevations [18].

Upon multiplying a Kernel function by a sinusoidal plane, a two-dimensional Gabor filter is produced. Five characteristics, orientations, frequency, phasing offsets, and aspect ratio—

define Gabor filters appropriate for extracting features, differential assessments, and texture features. A Gabor filter banks produces Gabor filters utilizing the following Gabor feature:

𝐺(𝑚, 𝑛; 𝜇, 𝜆, ∝, ∅, 𝛿) = 𝐸𝑥𝑝 (−𝑚2+𝑛2𝑛2

2∅2 ) 𝐸𝑥𝑝 (𝑗 (2𝜋𝑚

𝜆 +∝)) (1)

where 𝑚= 𝑚𝑐𝑜𝑠𝜃 + 𝑛𝑠𝑖𝑛𝜃, 𝑛 = −𝑠𝑖𝑛𝜃 + 𝑛𝑐𝑜𝑠𝜃 , 𝑎𝑛𝑑 𝑗 represents an imaginedconstraint.(𝑚, 𝑛)signifies the Gabor kernel volume, constraint𝜆 is the wavelength, 𝜃 is the coordination, ∝ signifiesphasing offset, ∅represents bandwidth, and 𝛿describes the dimension proportion. The actual portion of equation 1 follows from the sophisticated system as follows:

𝐺 = 𝐸𝑥𝑝 ((−𝑚2+𝑛2𝑛2

2∅2 )) 𝑐𝑜𝑠 (2𝜋𝑚

𝜆 +∝) (2)

And an imagined component is stated as:

𝐺 = 𝐸𝑥𝑝 (−𝑚2+𝑛2𝑛2

2∅2 ) 𝑠𝑖𝑛 (2𝜋𝑚

𝜆 +∝) (3)

The positioning∝ has aneffectiveranging from 0 and 2𝜋 wavelength 𝜆is either = 2 𝑜𝑟 > 2 characteristic ratio 𝛿divergesbetween0 𝑎𝑛𝑑 1, phasing offset ∝ ranges from

−𝜋 𝑡𝑜 𝜋 and the bandwidth∅ 𝑖𝑠 > 0. Figure 1 displays a sample of information that has been filtered with Gabor filters together with instances of arbitrarily produced generalized Gabor filters.

Types Amoun t

Imag e Datas

et

Analysis

Window s Pillars Roof Top Staircase s

Walls Door Beam

3,775 Googl e image

Polylineregi on shape 2D bounding box

Circularregi on shape

(8)

9731 Vol. 71 No. 4 (2022)

http://philstat.org.ph

C. CONVOLUTIONAL NEURAL NETWORK

An intake layers, convolution layer, pooling layer, dense layer, and output layer are the typical layers of a convolutional neural network's layers. Convolutional and pooling layers often alternate in the initial levels of the CNN framework, and dense levels make up the final several levels that are closest to the output units. The supervised gradient descent algorithm can be utilized to develop the CNN end-to-end training technique framework. A one- dimensional deep neural network may perform similarly to a rnn for period computing issues while having a substantially lower computation complexity. A modest 1-d convolution operation could totally substitute the Recurrent neural system for straightforward applications like time series detection and is quicker. [21].Convolutional neural networks have such a comparable architecture whether one-dimensional or two-dimensional convolution is applied.

Starting with a stacking of convolutional and pooling layers, the architecture is attached to a flattening layer to produce a one-dimensional output from two-dimensional input.

Subsequently, numerous dense layers can be added for classification or regression.

Convolutional neural networks have a slight advantage over multidimensional ones in their ability to employ wider convolution kernels. For instance, a 3 × 3 convolution operation for a two-dimensional convolution layers has 3 × 3 = 9 convolution matrices, whereas a 3 × 3 convolution operation for a single-dimensional convolution layers only includes 3 convolution matrices[19]. As a result, a convolution operation with a value larger than that or equivalent to Nine is simple to employ.To create neural network architecture with GPU accelerator, the Python Science Suite, Tensorflow, and Keras were utilized. The hardware system's Inter Core i5-9400F processors and Nvidia GeForce RTX 2070 graphics cards are its two primary component kinds. The categorized cross-entropy object function in CNN is used to calculate the discrepancy between both the real and projected information types. To assess the efficiency of the system, the measure is assigned to reliability. As an optimization, Adam, a modification of the mini-batch stochastic gradient descent technique, attempts to minimise the outcome of the objective functions.The unbalanced learning algorithm must be taken into account in the categorization; in this collection, there are many more regular tests than aberrant ones. All bad examples would be projected as baseline characteristics throughout the testing if an unbalanced training data set is employed to build the network, even if there will continue to be significant reliability. Nevertheless, this really is pointless.Hence, pick the category weighting strategy, which could also increase the contribution of significant data classes to the objective functionality during training. The technique of batch normalisation has been extensively applied in deep network training[20]. The operators could avoid carefully and gradually tweaking the variables by introducing batch normalisation after the convolution layers and afterwards inserting the activation function. The suggested method's process is depicted in Figure 1.

(9)

9732 Vol. 71 No. 4 (2022)

http://philstat.org.ph

Figure 1: CNN architecture

D. CONVOLUTIONAL NEURAL NETWORKS FOR DETECTION

Convolutional neural networks are well recognised among the various conventional deep learning approaches under evaluation for their capacity to capture important feature points, thus generating impressive outcomes in detecting defects. Researchers have designed a vision-based technique utilising a deep learning model of cnn models for order to recognise concrete cracks without computing the fault characteristics [21]. In order to recognize cracks, the developed Convolutional Neural Network is developed on 40K images with 256 × 256 pixels dimensions by identifying each part individually. The images was first preprocessed utilizing a Gabor filter and SSD Detectors, after which fractures were detected using CNN, and a Deep convolutional neural network was contrasted to an edge recognition system with an evolutionary algorithms optimization. According to the study's findings, CNN performed noticeably superior than edge detection algorithm.

A further work by proposed a CNN-based structural cracking identification technique that separates the images and runs it via deep Network and random forest processing.

Nevertheless, according to the thickness of the areas, the region-based approaches could only offer data on the occurrence of cracks and their general area and structure. If the precise structure and position of the fissures could indeed be provided, the effectiveness of damage detection reduces.For the purpose of identifying surfaces cracks or spalls in concrete structures, the system implemented a Convolutional Neural Network technique. Pixel level fracture detecting techniques are researched as a solution to this problem.The study increased the detection performance to 98.08percent of the overall by integrating the edge optimization method with a methodology based on deep learning to autonomously identify cracks and effectively at a pixels scale, utilizing convolutional component fusing and pixel-level categorization.To successfully identify flaws in structural infrastructures under varied circumstances, the researchers proposed an unique context aware convolutional neural semantic segmentation networks. The suggested technique uses a pixel-by-pixel semantic representations separation networks to separate the cracks on photos of any size without having to rebuild the predicting networks.the utilization of U-Net to forecast picture patching in order to find concrete cracks. The Adam algorithm is used to optimise, with the focused error function chosen as the assessment metric. With great effectiveness and robustness, the trained U-Net can locate fissures in the incoming unprocessed images under a variety of settings, including lighting, a dirty backdrop, the breadth of the fissures, etcetera. Instead of training an original neural network, an effective cracks detection approach was created utilizing the idea of learning algorithms. The following are three common deep learning techniques for building a strong classification model:

• Using a freshly created deep convolutional neural network,

(10)

9733 Vol. 71 No. 4 (2022)

http://philstat.org.ph

• The characteristics of the SSD detector's outcome that were trained using the standard Image Net dataset's VGG19 networks design, and Evaluated is VGG19's fine-tuned topmost layer.

To lessen over flattering brought on by the little and unbalanced training sample, image enhancement is performed. The images database comprises of both fatigue testing images and real inspections photos that were taken in erratic illumination, motion low contrast, and distances situations. The separation and identification of cracks in an asphalt concrete deck were accomplished using a poorly supervised networks. Firstly, the auto encoder distinguished the information and emphasised the unlabelled data characteristics, allowing the initial information to construct a weakly supervised beginning for agreement on their own. Secondly, k-means clustering was used to categorise the features. Finally, pictures of building deck faults showing cracks were examined.

III. RESULT AND DISCUSSION

Choose SSD with VGG-19, DarkNet19, and CNN with Image net as the background systems, accordingly, to compare the provided detector SSD Detector with CNN to. The backhaul systems used were effective in experiments. Accuracy of testing and training As assessment methods, and deficits, Mean Average Precision, and are employed. Utilizing a Gerfoce RTX 2070 as the computing and storage resources and Tensorflow 2.4 as the deep learning platform, the suggested system was trained for 100 epochs. All the other training settings adhere to the SSD's specifications [22].

A. PRECISION AND LOSSES

In comparison to SSD and Convolutional Neural Network, the detectors improve quicker from SDD. As opposed to Convolutional Neural Network, which would be recorded after the 51st epoch, and SSD, which is recorded following the 30th period, SDD with Convolutional Neural Network reports 90percent of total percent reliability sometime after the tenth epoch during training. According to a secondary finding, SSD and Convolutional Neural Network may record data with roughly the same accuracy over a period of five or more periods. This could be ascribed to Gabor filters' strength. When contrasted to SSD and CNN, the SSD detectors without Gabor filters cohere later [23]. The total efficiency for SSD with Convolutional Neural Network is 98.68percent respectively for training with a deficit of 0.0382 and 98.09percentage points for testing with a reduction of 0.0697. Assessment reliability for SSD is 97.26percentage points with a deficit of 0.0602 and performance rate is 96.78percentage points with such a deficit of 0.0689. Reports accuracy rates for both assessment and training of 96.31percentage points and 98.92%, correspondingly, with errors of 0.0831 and 0.0652. An overview of the detection' accuracy and reliability and errors can be found in Table 2.Figure 2 depicts the graphical representation of Reliability and losses of the proposed system

B. LOSS FUNCTION

The task of finding cracks in images has been presented in this study as a binary classification issue by segmenting the images into portions, categorising every patches according to the fact that it contains a cracking, and finally labelling the patches that does.

The formula for the negative log likelihood (NLL) function for this binary categorization issue is as follows:

(11)

9734 Vol. 71 No. 4 (2022)

http://philstat.org.ph

0.00%

50.00%

100.00%

Training Accuracy

Training loss

Testing Accuracy

Testing loss

Reliability and losses

Proposed CNN with SSD SSD

Gabor + SSD Detector

𝑳(𝒙, 𝒙̌) = −𝟏

𝑵𝑵𝒋=𝟏𝒙𝒋𝒍𝒐𝒈(𝒙̌ )𝒋 + (𝟏 − 𝒙𝒋)𝒍𝒐𝒈(𝟏 − 𝒙̌ ) 𝒋 (4) Where𝒙is the realtag, 𝒙̌is the forecastedtag and 𝑁is the amount of examples. Because it is a specific example of the cross entropy value, which measures the proximity among 2 probability distributions(𝒙, 𝒙̌), this function is also referred to as the binary crossed entropy loss. It should be emphasised that NLL offers a singular optimum because it is a smooth variable.Here, 𝒙might be thought of as the model's intake classification process and 𝒙̌is the model's expected category allocation.Entropy refers to the unpredictability in an occurrence from the perspective of data theory, and it is expressed in the form of data bits. The binary cross entropy then represents the extra bits needed to indicate the target class since the dataset shows randomization rather than the genuine classification.Take a look at the variable in equations (4) 𝑥𝑗𝑙𝑜𝑔(𝑥̌ )denoting to the cross entropy of crackthe 2nd term and 𝑗 category 𝑙𝑜𝑔(1 − 𝑥𝑗)𝑙𝑜𝑔(1 − 𝑥̌ )refers to the no-crack class's cross entropy.The inputted data 𝑗 points are aggregated and added up to form these categories. Nil damage, or 𝑳(𝒙, 𝒙̌) = 0, indicates that there was no loss and that the model correctly predicted the data. A score higher than 0 suggests that the model's performance can be improved by adjusting modeling variables. If try to build and evaluate the model, the Bias-Variance trade-off, which is well- known in deep learning, aims to equalize the model's scale back or over fitting. In light of this trade-off, the objective of the method is to make sure that the models neither would under fit nor fit properly for the input information with reducing the gradient descent errors 𝑳(𝒙, 𝒙̌).

Table 2: Reliability and losses of the proposed system Methods Proposed CNN

with SSD

SSD Gabor + SSD

Detector

Training Accuracy 98.64% 96.44% 95.45%

Training loss 0.0234% 0.0567% 0.0785%

Testing Accuracy 97.89% 96.54% 96.87%

Testing loss 0.0456% 0.0567% 0.0544%

Figure 2: Reliability and losses of the proposed system C. MEAN AVERAGE PRECISION

(12)

9735 Vol. 71 No. 4 (2022)

http://philstat.org.ph

The 2014 MS COCO Challenge used the Mean Average Precision to gauge recognition accuracy. Determine the Average Precision (AP) of the building element information in 7 different occasions where the Intersection over Union (IoU) conditions are met. The MAP of APs underneath the designated IoUs are then taken. The findings of the identification are shown in Table 3. The SSD with CNN detector outperforms the conditionals with a little above 1percent visible accuracy when comparing the total MAP. The findings reveal that the proposed detectors recorded the greatest AP underneath the majority of IoUs, indicating that it has the best average MAP among some of the competitors. Figure 2 depicts the performance evaluation of the proposed system.

Table 3: Effectiveness of Identification Modelling techniques With Various Threshold values

Methods Propo sed CNN

with SSD

SSD Gabor + SSD Detector

Average Precision .60

0.9596 0.973 4

0.9654 Average

Precision .65

0.9433 0.941 1

0.9422 Average

Precision .70

0.9123 0.894 4

0.9006 Average

Precision .75

0.8766 0.895 5

0.854

Average Precision .80

0.7865 0.798 8

0.7650

Figure 2: Performance metrics of the Proposed system

0 0.5 1 1.5

Average Precision .60

Average Precision .65

Average Precision .70

Average Precision .75

Average Precision .80

Perfromance Measures

Proposed CNN SSD

Gabor + SSD Detector

(13)

9736 Vol. 71 No. 4 (2022)

http://philstat.org.ph

D. DISCUSSION

Given the large number of research that were analysed, it was determined that the majority of research share the "collection capacity" restriction. As a result, more study is required to create technologies that could handle big datasets and guarantee the suggested system 's reliability in real-world circumstances. In addition, research should concentrate on developing a comprehensive toolset, such as establishing a methodology to demonstrate the optimum data gathering technique, various Cnn methods depending on the nature of fissures and frustrates, and the manner in which the results of image processing are presented. This may result in a system of coordinated management for roads, steel, and concrete structures.This paper offers a thorough analysis of the use of deep learning to identify a variety of concrete and structural frustrates. Deep learning monitoring pavement distresses and deep learning to assess the structural health of buildings were the two main categories used by the studies to group deep learning's application. The results are encouraging, as it has been acknowledged that deep learning has been effectively used to accurately identify a wide variety of cracks. In this work, several optimisation strategies were evaluated in order to improve the level of efficiency. For particular, a Cnn architecture that's been constructed could identify and classify a variety of cracks with a precision more than 97%.There seem to be fewer studies especially in comparison to Pavement's studies in the field of deep learning to assess integrity of the structure, as well as the majority of investigations concentrate on creating solutions to identify and assess particular structural components instead of introducing an incorporated assessment remedy based on deep neural networks.

IV. CONCLUSION

In this study, the anomaly recognition issue was transformed into a classification challenge for time - series data. To generate a search engine data set with a more uniformly distributed, more pronounced characteristics, and lower proportions, the initial sequence is subjected to information pre-processing and data enrichment. Information enlargement and down - sampling are both types of information enhancement. Examples that have the identical labelling are added without expanding the initial information when using the techniques of symmetric inversion, boosting distortion, and arbitrarily producing anomalies for tiny amounts. The input sample's complexity could be successfully reduced while maintaining its characteristics using the down-sampling technique of symmetrically collecting the maximum and lowest values. For series data classification techniques, create a one-dimensional model using convolutional neural networks that is quicker. The networks are better able to handle an uneven training data set by integrating the hyper parameter tweaking of category weighting. Long-span cable-stayed building acceleration information over the period of one monthly is used to validate the methodology. Based on the findings for the anomalous identification issue represented as a time - series data classification issue, the suggested models could effectively and automatically classify a wide range of information anomalous types. The suggested technique could properly detect the majority of anomalous datasets.

(14)

9737 Vol. 71 No. 4 (2022)

http://philstat.org.ph

REFERENCE

[1] A. Sivasuriyan, D. S. Vijayan, W. Górski, Ł. Wodzyński, M. D. Vaverková, and E. Koda, “Practical Implementation of Structural Health Monitoring in Multi-Story Buildings,” Buildings, vol. 11, no. 6, p. 263, Jun. 2021, doi: 10.3390/buildings11060263.

[2] M. Azimi, A. Eslamlou, and G. Pekcan, “Data-Driven Structural Health Monitoring and Damage Detection through Deep Learning: State-of-the-Art Review,” Sensors, vol. 20, no. 10, p. 2778, May 2020, doi: 10.3390/s20102778.

[3] Y. Bao and H. Li, “Machine learning paradigm for structural health monitoring,” Struct. Health Monit., vol. 20, no. 4, pp. 1353–1372, Jul. 2021, doi: 10.1177/1475921720972416.

[4] P. Seventekidis, D. Giagopoulos, A. Arailopoulos, and O. Markogiannaki, “Structural Health Monitoring using deep learning with optimal finite element model generated data,” Mech. Syst. Signal Process., vol. 145, p. 106972, Nov. 2020, doi: 10.1016/j.ymssp.2020.106972.

[5] S. Muin and K. M. Mosalam, “Human-machine collaboration framework for structural health monitoring and resiliency,” Eng. Struct., vol. 235, p. 112084, May 2021, doi:

10.1016/j.engstruct.2021.112084.

[6] Y. Liu, Z. Pang, M. Karlsson, and S. Gong, “Anomaly detection based on machine learning in IoT- based vertical plant wall for indoor climate control,” Build. Environ., vol. 183, p. 107212, Oct. 2020, doi: 10.1016/j.buildenv.2020.107212.

[7] Y. Liu, Z. Pang, M. Karlsson, and S. Gong, “Anomaly detection based on machine learning in IoT- based vertical plant wall for indoor climate control,” Build. Environ., vol. 183, p. 107212, Oct. 2020, doi: 10.1016/j.buildenv.2020.107212.

[8] C. Fan, F. Xiao, Y. Zhao, and J. Wang, “Analytical investigation of autoencoder-based methods for unsupervised anomaly detection in building energy data,” Appl. Energy, vol. 211, pp. 1123–1135, Feb. 2018, doi: 10.1016/j.apenergy.2017.12.005.

[9] Q. Lu, X. Xie, A. K. Parlikad, and J. M. Schooling, “Digital twin-enabled anomaly detection for built asset monitoring in operation and maintenance,” Autom. Constr., vol. 118, p. 103277, Oct. 2020, doi:

10.1016/j.autcon.2020.103277.

[10] J. Mao, H. Wang, and B. F. Spencer, “Toward data anomaly detection for automated structural health monitoring: Exploiting generative adversarial nets and autoencoders,” Struct. Health Monit., vol. 20, no. 4, pp. 1609–1626, Jul. 2021, doi: 10.1177/1475921720924601.

[11] K. Choi, J. Yi, C. Park, and S. Yoon, “Deep Learning for Anomaly Detection in Time-Series Data:

Review, Analysis, and Guidelines,” IEEE Access, vol. 9, pp. 120043–120065, 2021, doi:

10.1109/ACCESS.2021.3107975.

[12] I. O. Agyemang, X. Zhang, I. A. Mensah, B. C. Mawuli, B. L. Y. Agbley, and J. R. Arhin, “Enhanced Deep Convolutional Neural Network for Building Component Detection Towards Structural Health Monitoring,” in 2021 4th International Conference on Pattern Recognition and Artificial Intelligence (PRAI), Yibin, China, Aug. 2021, pp. 202–206. doi: 10.1109/PRAI53619.2021.9551102.

[13] C. Bigoni and J. S. Hesthaven, “Simulation-based Anomaly Detection and Damage Localization: An application to Structural Health Monitoring,” Comput. Methods Appl. Mech. Eng., vol. 363, p.

112896, May 2020, doi: 10.1016/j.cma.2020.112896.

[14] J. K. Chow, Z. Su, J. Wu, P. S. Tan, X. Mao, and Y. H. Wang, “Anomaly detection of defects on concrete structures with the convolutional autoencoder,” Adv. Eng. Inform., vol. 45, p. 101105, Aug.

2020, doi: 10.1016/j.aei.2020.101105.

[15] F. Zonzini et al., “Structural Health Monitoring and Prognostic of Industrial Plants and Civil Structures: A Sensor to Cloud Architecture,” IEEE Instrum. Meas. Mag., vol. 23, no. 9, pp. 21–27, Dec. 2020, doi: 10.1109/MIM.2020.9289069.

[16] L. Gaile, L. Pakrastins, and L. Ratnika, “Structural health monitoring by merging dynamic response data,” Mag. Civ. Eng., vol. 111, no. 3, Art. no. 3, 2022, doi: 10.34910/MCE.111.11.

[17] M. Mousavi and A. H. Gandomi, “Structural health monitoring under environmental and operational variations using MCD prediction error,” J. Sound Vib., vol. 512, p. 116370, Nov. 2021, doi:

10.1016/j.jsv.2021.116370.

[18] W. Deng, Q. Xu, J. Liu, Y. Lu, and M. Fan, “Image Recognition Method of Longhorn Beetles of Yunnan Based on Gabor and CNN,” in 2022 5th International Conference on Pattern Recognition and Artificial Intelligence (PRAI), 2022, pp. 863–869.

(15)

9738 Vol. 71 No. 4 (2022)

http://philstat.org.ph

[19] M. Z. Alom et al., “A state-of-the-art survey on deep learning theory and architectures,” Electronics, vol. 8, no. 3, p. 292, 2019.

[20] F. Chollet, Deep learning with Python. Simon and Schuster, 2021.

[21] B. Kumar and S. Ghosh, “Detection of Concrete Cracks Using Dual-channel Deep Convolutional Network,” in 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2020, pp. 1–7. doi: 10.1109/ICCCNT49239.2020.9225391.

[22] S. Ren, K. He, R. Girshick, and J. Sun, “Faster r-cnn: Towards real-time object detection with region proposal networks,” Adv. Neural Inf. Process. Syst., vol. 28, 2015.

[23] W. Liu et al., “Ssd: Single shot multibox detector,” in European conference on computer vision, 2016, pp. 21–37.

[24] Molla, J. P., Dhabliya, D., Jondhale, S. R., Arumugam, S. S., Rajawat, A. S., Goyal, S. B., . . . Suciu, G. (2023). Energy efficient received signal strength-based target localization and tracking using support vector regression. Energies, 16(1) doi:10.3390/en16010555

[25] Mehraj, H., Jayadevappa, D., Haleem, S. L. A., Parveen, R., Madduri, A., Ayyagari, M. R., &

Dhabliya, D. (2021). Protection motivation theory using multi-factor authentication for providing security over social networking sites. Pattern Recognition Letters, 152, 218-224.

doi:10.1016/j.patrec.2021.10.002

Referensi

Dokumen terkait

4 A COMPREHENSIVE SURVEY OF SOCIAL NETWORK ANALYSIS-BASED ANOMALY DETECTION TECHNIQUES WITH SOFT COMPUTING Govind Singh Mahara Research scholar, Department of Computer Science&