Developing generalizable Structural Health Monitoring (SHM) tools for downstream tasks, such as Structural Damage Detection (SDD), is one way to tackle large-scale SHM applications. Such tools become particularly important when dealing with a heterogeneous population of structures lacking prior (damaged and non-damaged) data, a common scenario in large-scale SHM applications. Devising Transfer Learning (TL) mechanisms using representative SHM datasets is a favorable method to address this challenge. Multiple SHM datasets are publicly available but only partially cover the objective representative SHM dataset. The missing parts limit the ability to extract or embed high-level features, resulting in non-generalizable solutions, such as one-to-one (source-to-target) TL models. In the absence of a representative SHM dataset, this study tackles the challenge of accumulating SDD knowledge from sparse, non-similar datasets and integrating them to enable damage detection in unseen target structures with no prior damaged data. The innovation lies in two areas: (1) defining a feature and Domain Adaptation (DA) method that can transfer features between dissimilar structures, and (2) designing an SDD model to learn from these features and a mechanism to combine the learned SDD knowledge from various sources in a zero-shot setting, a necessity in online SHM applications without prior damaged data. To that end, this study proposes a DA-based TL approach and employs ensemble techniques to combine knowledge from parametric models trained on each source dataset, thereby establishing a common ground for fusing data from different structures. The proposed zero-shot Multi-Source TL-SDD technique achieves mean F1 scores of 0.971, 0.959, and 0.922 in three well-known SHM benchmark datasets, without requiring fine-tuning of models pre-trained on source data for the target features. This performance is achieved by integrating signal processing domain knowledge into the DA procedure, outperforming other competitive deep zero-shot SDD techniques trained with the target non-damaged data. Computational complexity analysis is also examined, demonstrating the method satisfying online SHM requirements, a critical feature for real-world applications.
Read full abstract