Mathematical Problems in Engineering

Volume 2013 (2013), Article ID 416941, 10 pages

http://dx.doi.org/10.1155/2013/416941

## Combined Data with Particle Swarm Optimization for Structural Damage Detection

^{1}Faculty of Infrastructure Engineering, Dalian University of Technology, Dalian 116024, China^{2}College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023, China

Received 23 October 2012; Accepted 11 December 2012

Academic Editor: Sheng-yong Chen

Copyright © 2013 Fei Kang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

This paper proposes a damage detection method based on combined data of static and modal tests using particle swarm optimization (PSO). To improve the performance of PSO, some immune properties such as selection, receptor editing, and vaccination are introduced into the basic PSO and an improved PSO algorithm is formed. Simulations on three benchmark functions show that the new algorithm performs better than PSO. The efficiency of the proposed damage detection method is tested on a clamped beam, and the results demonstrate that it is more efficient than PSO, differential evolution, and an adaptive real-parameter simulated annealing genetic algorithm.

#### 1. Introduction

A structural system or mechanical component continuously accumulates damage during their service life. The presence of damages may reduce the performance of a structure, such as decreasing the service life, or even progressing to catastrophic failure. In recent years, the damage assessment of structures has drawn wide attention from various engineering fields. Structural damage usually causes a decrease in structural stiffness, which produces changes in the vibration characteristics and static displacements of the structure. Major damage detection approaches can be clarified into three major categories, the static identification methods using static test data [1, 2], the dynamic identification methods using vibration test data [3, 4], and the combination methods adopt both vibration data and static data [5]. The vibration data of a structure include natural frequencies, mode shapes, frequency response functions, and modal curvatures. Static responses generally include static displacements and static strain.

The usual damage detection methods minimize an objective function, which is defined in terms of the discrepancies between the vibration data or static data identified by testing and those which are computed from the analytical model. Traditional damage detection methods have some disadvantages such as the damage position and damage extent cannot be detected simultaneously and are not so efficient in detecting the damage extent and adopt local optimization methods which usually lead to a local minimum only.

In recent years, evolutionary algorithms have been extensively applied to damage detection and the related optimal sensor placement problems [6–8]. For example, genetic algorithm (GA) as a stochastic search algorithm using static data [1, 2] or vibration data [3, 4] has been applied to damage detection. Some combination methods using both dynamic data and static data can be seen in [5, 9]. Damage detection methods of GA combining with simulated annealing [10] and artificial neural networks [11] were also proposed. In order to get more accurate structural parameters and structural responses for damage detection, parthenogenetic algorithm approach was proposed for optimal sensor placement [12, 13]. However, the disadvantage of GA is it exhibits a distinguished drop in efficiency as the number of unknown parameters to be identified is more than two [14] and premature convergence is likely to happen [15–19].

Addition to GA, some new techniques are proposed for engineering optimization problems, such as particle swarm optimization (PSO) [20–22], differential evolution [23, 24], artificial bee colony (ABC) [25–28], and so on. Among these optimization algorithms, PSO has obtained the most extensive attention and applications. Although PSO shares many similarities with genetic algorithms, the standard PSO does not use genetic operators such as crossover and mutation. PSO is applied to structural damage detection problems. Meanwhile, to improve the convergence speed and accuracy, some immune mechanisms, such as selection, receptor editing, and vaccination, are incorporated into PSO and propose an immunity enhanced particle swarm optimization (IEPSO). The algorithm is applied to the benchmark function optimization and damage detection problems using combined data. Results show that the performance of PSO is improved, because the convergence speed is accelerated and the default, which is easily getting entrapped in a local optimum when solving complex multimodal problems, is meliorated. Compared with PSO, DE and an adaptive real-parameter simulated annealing genetic algorithm (ARSAGA), IEPSO is the most efficient optimization method for damage identification.

This paper is organized as follows. Section 2 presents the mathematical model for structural damage detection. Section 3 introduces the original PSO, several immune mechanisms and then IEPSO is proposed. Sections 4 and 5 shows the performance of IEPSO on function optimization and damage detection, respectively. Finally, conclusions are given in Section 6.

#### 2. Mathematical Model for Structural Damage Detection Using Combined Data

The analytical static model for an intact structure in the finite-element formulation is

The characteristic evaluation of a dynamic undamaged structure can be expressed as

In (1), is the structural stiffness matrix, is the displacement vector, and is the load vector. In (2), is the mass matrix, is the th natural frequency, and is the corresponding mode shape.

In the context of discretized finite elements, structural damage can be represented by a decrease in the stiffness of the individual elements as where is the th element stiffness matrix of the damaged structure, is the stiffness damage factor (SDF) [13] of the th element and is a value between 0 and 1. is 1 with no damage and zero with complete damage in the th element, respectively.

A uniform damage for the whole element has been assumed in (3). The SDF allows estimating not only the damage severity but also the damage location since the damage identification is carried out at the element level.

In general, a small number of sensors will result in nonunique solutions. The sparsity of measurement can be overcome by increasing the number of loading conditions instead of increasing the number of sensors [29]; So we adopt several load cases which have been used in [2, 10]. To combine the static responses (displacements) and dynamic responses (natural frequencies), the final objective function can be written as where is a weight factor of the output error at the th point due to the th load case. is the number of displacement points considered and is the number of load cases. is the measured displacement of the th point due to the th load case, and is the theoretically computed counterpart. is the th measured natural frequency, and is the th theoretically computed natural frequency. is a weighting factor for the output error of the th natural frequency. is the number of natural frequencies considered.

The first part is defined by the normalized difference between the measured and theoretical computed displacements. The second part is defined by the normalized difference between the measured and theoretically computed natural frequencies. Differences between displacements and natural frequencies are normalized to get a better representation of the relative change in response.

To include the uncertainty in the measured data and to study the sensitivity of IEPSO to noise, uniformly distributed random noise [2] is added to measurements in the simulated tests as where is the measured displacement of the th point due to the th load case with noise; is the th measured natural frequency with noise; and are the noise amplitudes; is a uniformly distributed random variable in the range .

#### 3. Immunity-Enhanced Particle Swarm Optimization

##### 3.1. Particle Swarm Optimization

Inspired by a model of social interactions between independent animals seeking for food, PSO utilizes swarm intelligence to achieve the goal of optimization. Instead of using genetic operators to manipulate the individuals, each individual in PSO flies in the search space with a velocity which is dynamically adjusted according to its own flying experience and flying experience of its companions [20, 21]. Each individual is treated as a volumeless particle (a point) in the -dimensional search space. The th particle is represented as in the -dimensional space, where , . The best previous position of the th particle is recorded as . The index of the best particle among all the particles in the population is represented by the symbol . The velocity for particle is represented as , which is clamped to a maximum velocity . In each time step , the particles are manipulated according to the following equations: where and are two positive constants, which control how far a particle will move in a single iteration. and are random values in the range .

Shi and Eberhart [21] later introduced inertia term term by modifying (6) to

They proposed that suitable selection of will provide a balance between global and local explorations, thus requiring fewer iterations on average to find a sufficiently optimal solution. As originally developed, often decrease linearly from about 0.9 to 0.4 according to the following equation: where and are the initial weight and final weight, respectively, is the maximum number of allowable generations, and the current generation number.

An explicit maximum velocity or a constriction factor is usually utilized in PSO algorithms to control the exploration abilities of particles; however, it cannot prevent them from going outside the allowable solution space and hence produce invalid solutions. Four types of boundary conditions, namely, absorbing, reflecting, invisible, and damping, have been reported in the literature [30]. The optimization of a 2D array antenna [31] shows that the damping boundary condition offers more robust and consistent performance.

As for damage detection problem, generally only few elements are damaged and most elements are still intact. The parameter values of these intact elements are always in the upper bound [9]. In order to avoid oscillating around the upper boundary and to quickly return to the feasible region around the lower boundary, a combined boundary condition is used. This boundary is also convenient to the comparison of different algorithms. The upper bound adopts damping bound [30] and the low bound adopts the bound described in [24], which can be described as follows: where and are the lower and upper bounds of dimension , respectively, is a random number in the range .

##### 3.2. Artificial Immune System

AIS can be defined as abstract computational systems inspired by theoretical immunology and observed immune functions, principles, and models, applied to solve problems [32]. In AIS, an antigen is used to represent the programming problem to be addressed. An antibody is set (a repertoire), wherein each member represents a candidate solution. Affinity is used to represent the fit of an antibody (a solution candidate) to the antigen (the problem) [33]. Several immune properties, selection, receptor editing, and vaccination, can be adopted to improve the performance of PSO.

###### 3.2.1. Selection

The antibodies present in a population set contain much information regarding the solution of the problem. Based on their affinity, the antibodies are selected to proliferate and produce clones. Traditionally, deterministic selection rule is adopted to select better antibodies for proliferation. However, deterministic selection rule selects only the best antibodies for proliferation, and that may lead to the premature convergence of the algorithm [34].

To overcome this difficulty, rank-based fitness assignment and roulette wheel selection rule is adopted. The fitness of an individual can be calculated as where is the population size, is the order number of the individual in the whole population, is the selection pressure, , is the rank-based fitness of the individual.

###### 3.2.2. Receptor Editing

In AIS, receptor editing allows an antibody to take large steps, landing in a locale where the affinity might be lower. However, occasionally the leap will lead to an antibody on the side where the region is more promising. From this locale, point mutations followed by selection can drive the antibody to reach the global optimum. Receptor editing offers the ability to escape from local optima [32]. In order to simulate receptor editing, we introduce non-uniform mutation [35] into PSO.

For each individual in a population of generation , create an offspring through a non-uniform mutation as follows: if is a solution and the element is selected for this mutation, the result is a vector , where where and are the lower and upper bounds of the variable , respectively. The function returns a value in the range such that approaches to zero as increases. This property allows this operator to search the space uniformly at early stages, and very locally at later stages. We use the following function: where is a uniform random number in the range , and is a system parameter determining the degree of nonuniformity.

###### 3.2.3. Vaccination

Given an individual , vaccination means modifying the genes on some bits in accordance with a priori knowledge so as to gain a better solution with greater probability [36]. As for real-parameter optimization problems, a vaccination means modifying the elements of some individuals. A vaccine is abstracted from the prior knowledge of the problem. During the actual operation, a detailed analysis is firstly carried out on the problem, simultaneously, as many basic characteristics of the problem as possible ought to be found. Then, the characteristics are abstracted to be a vaccine. A vaccine can also be regarded as estimation on some elements of the optimal individual.

Two types of vaccines are adopted for function optimization and damage detection. For the function optimization problem, the vaccine can be abstracted from the best individuals of the population. If is an individual and the element is selected for vaccination, the result is a vector , where means the th element of the best individual. For the damage detection problem, generally only few elements are damaged and most elements are still intact. The parameter values of these intact elements are always in the upper bound. So boundary mutation is adopted as a vaccine for damage detection problem. If is an individual and the element is selected for vaccination, the result is a vector: .

##### 3.3. Immunity-Enhanced Particle Swarm Optimization

In IEPSO, a population of particles is sampled randomly in the feasible space. Then the population executes PSO or its variants, including the update of position and velocity. After that, it executes receptor editing operator (non-uniform mutation) according to a certain probability , and vaccination operator according to probability . The new generation is obtained by the selection operator after the flying of particles and two immune operators (receptor editing and vaccination). Pseudocodes for IEPSO are shown in Algorithm 1.

In Algorithm 1, is the receptor editing probability; is the vaccination probability; is the best position of individual ; is the best position of the whole population; is the fitness of individual .

In the new algorithm, selection and vaccination can improve the convergence speed and receptor editing, helping the algorithm to avoid premature convergence.

#### 4. Tests on Benchmark Functions

Three nonlinear benchmark functions that are commonly used in literatures are adopted. Their formulas and variable ranges are shown in Table 1.

To evaluate the performance of the proposed IEPSO, the basic PSO and DE are used for comparisons. The version of DE used in this paper is known as DE/rand/1/bin, or “classic DE” [23].

The parameters used for IEPSO and PSO are recommended in [21, 22]. The parameter used is recommended by Shi and Eberhart [21] with a linearly decreasing, which changes from 0.9 to 0.4 according to (9). The maximum velocity and minimum velocity are set at half value of the upper bound and lower bound, respectively. The acceleration constants and are both 2.0. For DE algorithm, the parameters are recommended in [23, 24]. The control parameters are or 0.5 and . The other parameters for IEPSO are listed in Table 2. The generation number and population size of PSO and DE are the same as IEPSO.

The three algorithms are executed in 50 independent runs. The mean fitness values of the best individual found during the 50 runs for the three functions are listed in Table 3. Evolutionary processes for three functions are shown in Figure 1. From Table 3 and Figure 1, it can be seen that IEPSO outperforms PSO and DE in most cases. By introducing selection operator and vaccination operator, the convergence speed is accelerated and by introducing receptor editing operator, the ability of escaping from a local optimum is enhanced.

#### 5. Damage Detection Examples

A clamped beam adopted from Wang et al. [9] is used to verify the efficiency of IEPSO on damage identification. The initial geometry of the beam is shown in Figure 2. The total numbers of elements and nodes are 20 and 21, respectively. There are two applied load cases. The first load case and acts at node 11, and the second load case and acts at node six. The material properties are , . In the following tests the objective functions include nineteen node displacements in each load case and the first 10 natural frequencies. The weight factor in (13) is chosen as .

Statistical analysis is a good way to compare different stochastic algorithms. But the damage detection of a structure needs a long time. To compare different stochastic algorithms on these time-consuming problems, usually adopt the best results obtained from several runs, and this can avoid chanciness in some extent [37, 38]. In this paper each stochastic algorithm performs three independent runs [14, 26], and the best results obtained from each algorithm are presented as representative ones to yield more clear conclusions because values obtained are not much different.

##### 5.1. Double Damage Occurrence

The first case (case 1) has two damages in which element 1 has 50% reduction in Young’s modulus and element 9 has a severe 87.5% reduction in Young’s modulus. That means and in this case.

The comparison of logarithmic best fitness values of three algorithms is shown in Figure 3(a). From this figure, we can see that IEPSO converges the fastest and PSO converges faster than DE. The convergence processes of SDF of damaged elements are shown in Figure 3(b). It can be seen that the SDF of element 1 and element 9 quickly converges to 0.49998 and 0.12504 which are quite close to the theoretical values. The comparison of SDF of each element between theoretical values and IEPSO detected values is shown in Figure 4(a). It can be seen that the detected values are quite close to the theoretical values and no extra damage is detected. The comparison of damage detection results using three algorithms after 100 generations is shown in Figure 4(b). It can be seen that IEPSO outperforms PSO and DE.

##### 5.2. Triple Tiny Damage Occurrence

A triple damage occurrence with different damage extents (case 2) is considered. In this example, element 2 has 10% reduction in Young’s modulus, element 9 has 10% reduction in Young’s modulus, and element 16 has 15% reduction in Young’s modulus. This means that , , and . It is noted that all the three damage extents are very tiny, and the difficulty in damage detection is increased.

The comparison of logarithmic best fitness values of three algorithms is shown in Figure 5(a). From this figure, we can see that IEPSO still converge the fastest and PSO converges faster than DE. The convergence processes of SDF of damaged elements are shown in Figure 5(b). It can be seen that the SDF of element 2, element 9, and element 16 quickly converges to 0.90015, 0.90101, and 0.85091 which are quite close to the theoretical values. The comparison of SDF of each element between theoretical values and IEPSO detected values is shown in Figure 6(a). It can be seen that the detected values are quite close to the theoretical values and no extra damage is detected. The comparison of damage detection results using three algorithms after 100 generations is shown in Figure 6(b). It can be seen that IEPSO still performs better than PSO and DE.

Damage detection performance of IEPSO is also compared with ARSAGA [10] in this case and the result is shown in Table 4. The value in the parenthesis represents the relative error. The damaged elements and the maximum errors of different algorithms are shown in bold. It can be seen that damage detection accuracy of IEPSO is higher than ARSAGA.

##### 5.3. The Effect of Noise

To include the uncertainty in the measured data and to study the sensitivity of IEPSO to noise, different uniformly distributed random noise is added to measured data in the simulation as described (5). It is commonly believed that the relative measurement error of frequency is about 1% [3]. Take case 1 as an example, in the first test 1% noise is added to both static displacements and natural frequencies. In the second test 5% noise is added to static displacements and 2% noise is added to natural frequencies.

The comparison of SDF of each element between theoretical values and IEPSO detected values under the condition 1% noise is shown in Figure 7(a). It can be seen that the detected values are still quite close to the true values and a tiny extra damage is detected in element 19. The comparison of SDF of each element between theoretical values and IEPSO detected values under the condition with 5% noise is shown in Figure 7(b). It can be seen that the two damages can still be detected under this condition, but several tiny extra damages are also detected.

It can be seen from these figures that noise decreases the accuracy of the algorithm. When noise increases, the misidentifications also increase. This may be because that large noise increases the uncertainty in theoretical response data and noise may be taken as damage by the procedure. From this point, the results detected by the procedure are still reasonable.

#### 6. Conclusions

In this paper, a new IEPSO algorithm for structural damage identification is presented. It bases on a particle swarm optimization algorithm and introduces immune properties selection, receptor editing, and vaccination into it. Selection and vaccination can improve the convergence speed and receptor editing helps the algorithm to avoid premature convergence.

Boundary conditions for PSO are also discussed in the paper, and a combined boundary is adopted for damage detection problems. This boundary condition can avoid oscillating around the upper boundary and can quickly return to the feasible region around the lower boundary.

The feasibility of the methodology is first demonstrated through several numerical examples. Three benchmark functions are used to test the performance of IEPSO in complex function optimization problems. Numerical results show that IEPSO performs better than PSO and DE in most cases because its convergence speed is the fastest and converges to the best fitness value.

The proposed algorithm is then tested on damage detection problems of a clamped beam. Two damage cases can be detected quickly and accurately by the proposed algorithm when noise is free. Comparing with PSO and DE, IEPSO is more efficient in damage detection problems. The accuracy of IEPSO is also higher than ARSAGA in case 2. When different levels of noise are added, the accuracy of the algorithm is decreased. However, this is still reasonable because noise may be taken as damages in the beam during the damage detection process.

#### Acknowledgments

This work was supported by the National Natural Science Foundation of China (51109028, 90815024) and the Fundamental Research Funds for the Central Universities (DUT11RC(3)38).

#### References

- F. Bakhtiari-Nejad, A. Rahai, and A. Esfandiari, “A structural damage detection method using static noisy data,”
*Engineering Structures*, vol. 27, no. 12, pp. 1784–1793, 2005. View at Publisher · View at Google Scholar · View at Scopus - B. Kouchmeshky, W. Aquino, J. C. Bongard, and H. Lipson, “Co-evolutionary algorithm for structural damage identification using minimal physical testing,”
*International Journal for Numerical Methods in Engineering*, vol. 69, no. 5, pp. 1085–1107, 2007. View at Publisher · View at Google Scholar · View at Scopus - B. H. Koh and S. J. Dyke, “Structural health monitoring for flexible bridge structures using correlation and sensitivity of modal data,”
*Computers and Structures*, vol. 85, no. 3-4, pp. 117–130, 2007. View at Publisher · View at Google Scholar · View at Scopus - F. Kang, J. J. Li, and Q. Xu, “Damage detection based on improved particle swarm optimization using vibration data,”
*Applied Soft Computing*, vol. 12, no. 8, pp. 2329–2335, 2012. View at Publisher · View at Google Scholar - B. H. Oh and B. S. Jung, “Structural damage assessment with combined data of static and modal tests,”
*Journal of Structural Engineering*, vol. 124, no. 8, pp. 956–965, 1998. View at Publisher · View at Google Scholar · View at Scopus - S. Y. Chen, Y. J. Zheng, C. Cattani, and W. L. Wang, “Modeling of biological intelligence for SCM system optimization,”
*Computational and Mathematical Methods in Medicine*, vol. 2012, Article ID 769702, 10 pages, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - P. Z. Lu, S. Y. Chen, and Y. J. Zheng, “Artificial intelligence in civil engineering,”
*Mathematical Problems in Engineering*, vol. 2012, Article ID 145974, 22 pages, 2012. View at Publisher · View at Google Scholar - S. Y. Chen and Y. F. Li, “Automatic sensor placement for model-based robot vision,”
*IEEE Transactions on Systems, Man, and Cybernetics B*, vol. 34, no. 1, pp. 393–408, 2004. View at Publisher · View at Google Scholar · View at Scopus - X. Wang, N. Hu, H. Fukunaga, and Z. H. Yao, “Structural damage identification using static test data and changes in frequencies,”
*Engineering Structures*, vol. 23, no. 6, pp. 610–621, 2001. View at Publisher · View at Google Scholar · View at Scopus - R. S. He and S. F. Hwang, “Damage detection by an adaptive real-parameter simulated annealing genetic algorithm,”
*Computers and Structures*, vol. 84, no. 31-32, pp. 2231–2243, 2006. View at Publisher · View at Google Scholar · View at Scopus - B. Sahoo and D. Maity, “Damage assessment of structures using hybrid neuro-genetic algorithm,”
*Applied Soft Computing Journal*, vol. 7, no. 1, pp. 89–104, 2007. View at Publisher · View at Google Scholar · View at Scopus - F. Kang, J. J. Li, and Q. Xu, “Strategy for optimizing sensor placement related to structural health monitoring,” in
*Proceeding of International Conference on Health Monitoring of Structure, Material and Environment*, pp. 474–478, Southeast University Press, Nanjing, China, 2007. - F. Kang, J. J. Li, and Q. Xu, “Virus coevolution partheno-genetic algorithms for optimal sensor placement,”
*Advanced Engineering Informatics*, vol. 22, no. 3, pp. 362–370, 2008. View at Publisher · View at Google Scholar · View at Scopus - K. H. Lee, S. W. Baek, and K. W. Kim, “Inverse radiation analysis using repulsive particle swarm optimization algorithm,”
*International Journal of Heat and Mass Transfer*, vol. 51, no. 11-12, pp. 2772–2783, 2008. View at Publisher · View at Google Scholar · View at Scopus - S. Y. Chen, C. Y. Yao, G. Xiao, Y. S. Ying, and W. L. Wang, “Fault detection and prediction of clocks and timers based on computer audition and probabilistic neural networks,” in
*Computational Intelligence and Bioinspired Systems*, vol. 3512 of*Lecture Notes on Computer Science*, pp. 952–959, 2005. View at Google Scholar - M. Li, S. C. Lim, and S. Chen, “Exact solution of impulse response to a class of fractional oscillators and its stability,”
*Mathematical Problems in Engineering*, vol. 2011, Article ID 657839, 9 pages, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - S. C. Lim, C. H. Eab, K. H. Mak, M. Li, and S. Y. Chen, “Solving linear coupled fractional differential equations by direct operational method and some applications,”
*Mathematical Problems in Engineering*, vol. 2012, Article ID 653939, 28 pages, 2012. View at Publisher · View at Google Scholar · View at MathSciNet - S. Y. Chen, Y. H. Wang, and C. Cattani, “Key issues in modeling of complex 3D structures from video sequences,”
*Mathematical Problems in Engineering*, vol. 2012, Article ID 856523, 17 pages, 2012. View at Publisher · View at Google Scholar - Z. Teng, J. He, A. J. Degnan et al., “Critical mechanical conditions around neovessels in carotid atherosclerotic plaque may promote intraplaque hemorrhage,”
*Atherosclerosis*, vol. 223, no. 2, pp. 321–326, 2012. View at Publisher · View at Google Scholar - J. Kennedy and R. C Eberhart, “Particle swarm optimization,” in
*Proceedings of the IEEE International Conference on Neural Networks*, pp. 1942–1948, December 1995. View at Scopus - Y. Shi and R. C. Eberhart, “A modified particle swarm optimizer,” in
*Proceedings of the IEEE International Conference on Evolutionary Computation (ICEC '98)*, pp. 69–73, May 1998. View at Publisher · View at Google Scholar · View at Scopus - Y. Shi and R. C. Eberhart, “Empirical study of particle swarmoptimization,” in
*Proceeding of the IEEE Congress on Evolutionary Computation (CEC '99)*, pp. 1945–1950, July 1999. - R. Storn and K. Price, “Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces,”
*Journal of Global Optimization*, vol. 11, no. 4, pp. 341–359, 1997. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - J. Rönkkönen, S. Kukkonen, and K. V. Price, “Real-parameter optimization with differential evolution,” in
*Proceedings of the IEEE Congress on Evolutionary Computation (CEC '05)*, pp. 506–513, Edinburgh, Scotland, September 2005. View at Scopus - D. Karaboga and B. Basturk, “A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm,”
*Journal of Global Optimization*, vol. 39, no. 3, pp. 459–471, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - F. Kang, J. J. Li, and Q. Xu, “Structural inverse analysis by hybrid simplex artificial bee colony algorithms,”
*Computers and Structures*, vol. 87, no. 13-14, pp. 861–870, 2009. View at Publisher · View at Google Scholar · View at Scopus - F. Kang, J. Li, and Z. Ma, “Rosenbrock artificial bee colony algorithm for accurate global optimization of numerical functions,”
*Information Sciences*, vol. 181, no. 16, pp. 3508–3531, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - F. Kang, J. Li, and Z. Ma, “An artificial bee colony algorithm for locating the critical slip surface in slope stability analysis,”
*Engineering Optimization*. In press. View at Publisher · View at Google Scholar - I. Y. Choi, J. S. Lee, E. Choi, and H. N. Cho, “Development of elastic damage load theorem for damage detection in a statically determinate beam,”
*Computers and Structures*, vol. 82, no. 29-30, pp. 2483–2492, 2004. View at Publisher · View at Google Scholar · View at Scopus - T. Huang and A. S. Mohan, “A hybrid boundary condition for robust particle swarm optimization,”
*IEEE Antennas and Wireless Propagation Letters*, vol. 4, no. 1, pp. 112–117, 2005. View at Publisher · View at Google Scholar · View at Scopus - S. H. Xu and Y. Rahmat-Samii, “Boundary conditions in particle swarm optimization revisited,”
*IEEE Transactions on Antennas and Propagation*, vol. 55, no. 3, pp. 760–765, 2007. View at Publisher · View at Google Scholar · View at Scopus - L. N. de Castro and J. I. Timmis,
*Artificial Immune Systems: A New Computational Intelligence Paradigm*, Springer, New York, NY, USA, 2002. - P. Musilek, A. Lau, M. Reformat, and L. Wyard-Scott, “Immune programming,”
*Information Sciences*, vol. 176, no. 8, pp. 972–1002, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - N. Khilwani, A. Prakash, R. Shankar, and M. K. Tiwari, “Fast clonal algorithm,”
*Engineering Applications of Artificial Intelligence*, vol. 21, no. 1, pp. 106–128, 2008. View at Publisher · View at Google Scholar · View at Scopus - X. C Zhao, X. S. Gao, and Z. C. Hu, “Evolutionary programming based on non-uniform mutation,”
*Applied Mathematics and Computation*, vol. 192, no. 1, pp. 1–11, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - L. C Jiao and L. Wang, “A novel genetic algorithm based on immunity,”
*IEEE Transactions on Systems, Man, and Cybernetics A*, vol. 30, no. 5, pp. 552–561, 2000. View at Publisher · View at Google Scholar · View at Scopus - T. Yi, H. Li, and X. Zhang, “Sensor placement on Canton Tower for health monitoring using asynchronous-climbing monkey algorithm,”
*Smart Materials and Structures*, vol. 21, no. 12, pp. 1–12, 2012. View at Google Scholar - T. Yi, H. Li, and M. Gu, “Optimal sensor placement for structural health monitoring based on multiple optimization strategies,”
*The Structural Design of Tall and Special Buildings*, vol. 20, no. 7, pp. 881–900, 2011. View at Google Scholar