Multiple Crack Detection in 3D Using A Stable XFEM and Global Optimization
Multiple Crack Detection in 3D Using A Stable XFEM and Global Optimization
https://doi.org/10.1007/s00466-017-1532-y
ORIGINAL PAPER
Received: 24 February 2017 / Accepted: 18 December 2017 / Published online: 19 February 2018
© The Author(s) 2018. This article is an open access publication
Abstract
A numerical scheme is proposed for the detection of multiple cracks in three dimensional (3D) structures. The scheme is
based on a variant of the extended finite element method (XFEM) and a hybrid optimizer solution. The proposed XFEM
variant is particularly well-suited for the simulation of 3D fracture problems, and as such serves as an efficient solution to the
so-called forward problem. A set of heuristic optimization algorithms are recombined into a multiscale optimization scheme.
The introduced approach proves effective in tackling the complex inverse problem involved, where identification of multiple
flaws is sought on the basis of sparse measurements collected near the structural boundary. The potential of the scheme is
demonstrated through a set of numerical case studies of varying complexity.
123
836 Computational Mechanics (2018) 62:835–852
extent of flaw) form the optimization variables. The inverse ple shaped inclusions/void and cracks with XFEM [32,33],
problem solution calls for multiple analyses of the so-called as well as in the modeling of arbitrarily-shaped objects as
forward problem, i.e., the simulation of the system given demonstrated by Benowitz and Waisman [34], and Jung and
prescribed structural and flaw properties. In this sense, it is Taciroglu [35].
evident that the problem may become computationally tax- Complimentary to the forward problem, an appropriate
ing when forward analysis of complex systems is involved, optimization procedure need be enforced. Heuristic opti-
including analyses in the three dimensional space. Since it mization [36] is particularly suited to such an end, since
is oftentimes desired to perform the diagnostic tasks in the it allows for flexibility in the formulation of the forward
short time that follows an initial indication of damage, the problem, which need not be linear, convex, or smooth. Due
corresponding analysis tools ought to ensure rapid computa- to this feature, different forms of heuristic procedures have
tion. been adopted in the context of Structural Health Monitoring.
Within this context, a number of techniques have been Hunaidi [37] employs evolution-based Genetic Algorithms
proposed in recent literature for cutting down on computa- (GAs) for non-destructive assessment of pavements on the
tion while maintaining estimation accuracy, the majority of basis of surface waves tests; Farley et al. [38] adopt an
which rely on reduced order representations. A first approach artificial neural network approach for defect detection via
pertains to the use of surrogate models [18,19], which are ultrasonic signals; Lee et al. [39] formulate an inverse scat-
often data-driven albeit not necessarily linked to first prin- tering problem on the basis of Particle Swarm Optimization;
ciples (physical) information. A second alternative however, while Bernieri et al. [40] reconstruct cracks via eddy current
pertains to reduced representations that are founded on the testing and a machine learning approach.
principles of computational mechanics, such as multiscale For the solution of the inverse problem in the particular
schemes [20] for composite systems, component mode syn- domain of flaw/crack detection, Rabinovich et al. [41,42],
thesis methods [21] for structural dynamics problems, or the combine and XFEM approach with GAs for crack identifica-
extended Finite Element Method (XFEM) for linear elastic tion in static and dynamic 2D problems. Waisman et al. [43]
fracture mechanics [22]. and Chatzi et al. [44], extend and experimentally validate
In the case of fracture, a significant challenge faced by the XFEM–GA scheme for identification of generalized flaw
reduced order representations lies in the tackling of the non- types. Sun at al. [45] presented an adaptive algorithm, once
linearities that are associated with the fracture or damage again relying on XFEM, able to detect multiple flaws without
process. These typically require inclusion of a large number prior knowledge on their number by means of an Enhanced
of modes for accurately capturing the high-frequency nature Artificial Bee Colony (EABC) algorithm [46] and a sweeping
of the solution around the damage zone. The latter may in window method for dynamic problems [47]. Yan et al. [48]
general not be entirely precomputed due to the non-linearities introduce a guided bayesian inference approach for detec-
in the damage and fracture processes. tion of multiple flaws. Jung and Taciroglu employ XFEM
To address this, a number of possibilities exist, mainly for identification of an arbitrarily shaped scatterer embed-
relying on updating the reduced space on-the-fly. The inter- ded in elastic heterogeneous media [35]. Nanthakumar et
ested reader is referred to the work of Kerfriden and cowork- al. [49] combine XFEM to the Multilevel Coordinate Search
ers and the publications therein, where Newton–Krylov (MCS) method to detect cracks and voids in piezoelectric
[23], local–global [24] domain-wise model order reduction materials, while in a later work [50] they employ deriva-
[25], and Bayesian approaches [26] are proposed. Those tives of the level sets for the optimization step in order to
algebraic-based model order reduction techniques may be increase the robustness and efficiency of their method. In
complemented by multiscale approaches, as in [27], where a more recent work [51], the same authoring team applies
a scale-selection approach is proposed for determining the the XFEM–MCS scheme to the detection of multiple cracks
optimal model for a given region. Finally, statistical-based in piezoelectric structures under dynamic electric loads. In
approaches have been proposed [28] in order to determine Ma et al. [52] XFEM is incorporated in a three step algo-
the fracture process zone based on the lack of ability of rithm for the detection of multiple flaw clusters. Finally,
reduced order models to represent the failure of the sys- XFEM is employed in damage detection schemes for dams
tem. in the works of Alalade et al. [53] and Pirboudaghi et
In this paper, and motivated by previous works of the al. [54].
authoring team in the two-dimensional domain, we rely A characteristic feature of the aforementioned works is
on XFEM for solution of the forward problem. XFEM their confinement and demonstration in the two-dimensional
alleviates the need for remeshing [29,30] for diverse flaw domain. The extension in the third dimension comes with a
locations and geometries thereby significantly cutting down number of challenges, some of which have recently been
on the computational toll of the forward analysis [31]. tackled in a robust 3D XFEM scheme introduced by the
XFEM has been proven adept in the modeling of multi- authoring team [55,56]. This XFEM scheme was coupled
123
Computational Mechanics (2018) 62:835–852 837
123
838 Computational Mechanics (2018) 62:835–852
The equilibrium equations are formulated in weak form Moreover, it enables the use of higher order enrichment func-
as: tions in 3D linear elastic fracture mechanics.
Find a kinematically admissible displacement field u ∈ U Perhaps the most critical feature of extended and general-
such that ∀v ∈ V ized finite element methods (X/GFEM) is the enrichment of
the FE approximation with functions which are able to rep-
(u) : D : (v) dΩ = b · v dΩ + t̄ · v dΓ (4) resent known features of the solution. Enrichment is realized
Ω Ω Γt by employing the partition of unity (PU) method [63]:
where:
u (x) = N I (x) u I + N I∗ (x) Ψ (x) b I (9)
3 ∀I
∀I
U = u|u ∈ H 1 (Ω) , u = ū on Γu (5) FE approximation enriched part
123
Computational Mechanics (2018) 62:835–852 839
Functions N I∗ (x) used for the partition of unity enrich- 4 Parametrization and constraints
ment are typically selected to coincide with the FE shape
functions N I (x) ≡ N I∗ (x) . In the variant used herein how- Since the present work is only one of the first attempts to
ever, an alternative definition is used which has been shown extend flaw detection schemes [41,43,44] in 3D, some sim-
[55,56] to provide improved conditioning of the resulting plifications are made in order to reduce the complexity of the
stiffness matrices. More specifically, a superimposed mesh general problem. Two main simplifications are made, with
of special elements discretizing the crack front is introduced, regard to the crack geometries and interactions.
as illustrated in Fig. 2 and the shape functions correspond- The first aims at reducing the number of parameters used
ing to those front elements are used as a basis for the PU to represent crack geometries by only employing elliptical
enrichment. cracks for the forward problem, and approximating cracks of
The shape functions of the front elements are defined as different shapes by appropriately varying the ellipse param-
simple 1D FE shape functions: eters. Although this approach may seem somehow limited, it
provides the possibility to model a variety of crack shapes,
1−ξ 1+ξ while requiring a relatively small number of parameters to
Ng (ξ ) = (12)
2 2 describe each crack.
A second simplification is assumed with respect to the
where ξ is the local coordinate of the superimposed element interactions between different cracks. Although multiple
(Fig. 3). This parameter is defined in detail in References [55, cracks are considered, we herein only investigate cases where
56]. the minimum distances between the different cracks are
Blending problems between the standard and the enriched larger than some predefined value. The above approach is
part of the approximation [68–70] are dealt with using the necessary in order to avoid crack intersections which would
techniques developed in the works of Fries [68] and Ventura pose problems in the solution of the forward problem with
et al. [69] and applied in a 3D framework in our previous XFEM, since the treatment of intersecting cracks in 3D can
works [55,56]. These introduce a weight function ϕ (x) that be problematic.
assumes a value of unity for the fully enriched elements, The above simplifications can be overviewed as follows.
and linearly fades to zero for the blending elements. The The scheme developed in this work aims at determining the
123
840 Computational Mechanics (2018) 62:835–852
123
Computational Mechanics (2018) 62:835–852 841
of the bounding boxes are given the values 2ai + 2c, 2bi + 2c
besides being physically meaningless, could potentially and 2c where a and b are the lengths defining the correspond-
cause numerical problems and should be discarded. ing crack. Parameter c should be attributed a large enough
– If the majority of points assume low values (below a pre- value in order to ensure that enriched elements belonging to
defined tolerance), the crack is considered invalid since different cracks do not overlap. Subsequently, the separat-
an actual crack would not lie on the structural boundary. ing axis theorem [72] is employed to determine whether two
This case could also cause numerical problems. bounding boxes intersect.
– If the RBF repeatedly alternates in sign along a line of For a given set of candidate cracks the detection of inter-
points (Fig. 5), then the crack is discarded since only sections is achieved by investigating all possible crack pairs
simple intersections of the crack with the boundary are and determining weather the corresponding bounding boxes
considered. intersect. If two bounding boxes are found to intersect, then
one of the corresponding cracks is discarded. In our current
Considering the above, some further remarks can be made implementation the selection of the crack to be discarded
regarding the definition and use of the RBF in the present is being done arbitrarily since it is assumed the cracks will
application: be either overlapping or in close proximity therefore either
of the cracks will eventually converge to the actual crack if
– Since the RBF values of several points are taken into retained.
account in order to determine the position of the crack A more refined method for performing the above selec-
with respect to the structure, the zero iso-surface of the tion would consist of evaluating the fitness function for both
function does not need to coincide very accurately with cracks and eliminating the crack leading to the worst value.
the structure boundaries. As a result the number of points Such a criterion might lead in faster convergence of the opti-
needed to define the RBF can be kept relatively small, mization process in the expense of increasing the numerical
making the generation and evaluation of the function cost of the evaluation of individual crack configurations. Nev-
faster. ertheless, a detailed comparison would exceed the purposes
– The RBF function can be modified in order to restrict the of the present work.
search space in a part of the structure where the cracks are
expected to be lying, thus making the whole procedure
faster. 5 Inverse problem solution
4.3 Constraints for multiple cracks For the solution of the inverse problem a multiscale strategy,
similar to Reference [46] is employed, which utilizes two
The procedure described above for a single crack has to different optimization algorithms. In what follows, the two
be applied for each individual crack in the case of multi- algorithms are first briefly described with the proposed hybrid
ple cracks. Additionally, overlapping or intersecting cracks strategy introduced next.
have to be detected and discarded.
5.1 Genetic algorithms
4.3.1 Detection of overlapping cracks
Genetic algorithms (GAs) are a category of optimization
In order to detect overlapping or intersecting cracks a bound- tools inspired by biological evolution [73,74]. Solutions to
ing box is first defined for each crack as in Fig. 6. The sides optimization problems are obtained by iteratively improving
123
842 Computational Mechanics (2018) 62:835–852
a set of candidate solutions in an attempt to mimic natural increased. This is achieved by setting the mean in each
evolution processes. Following the GA terminology, the set iteration equal to the weighted average of a predefined
of candidate solutions is termed the population of individuals, number of candidates with the best fitness values from
while each iteration corresponds to a generation. Each indi- the previous iteration.
vidual in the population is represented by set of genes whose Covariance matrix The covariance matrix is updated so
numerical equivalent is a binary array. Moreover, in order that the probability of successful search directions is
to mimic natural selection through survival of the fittest, a increased and in addition information from previous gen-
fitness value is assigned to each individual by evaluating the erations is utilized.
fitness function which usually coincides with the objective Step size The step size is adjusted in order to avoid prema-
function [75]. Typically the following steps take place in a ture convergence while yet ensuring that the algorithm
genetic algorithm: converges fast enough.
Initialization Once the number of parameters and the pop- 5.3 The proposed multiscale strategy
ulation size have been set the initial population is
generated, usually randomly. The basic idea behind the strategy proposed herein, is sim-
Selection The fitness function is evaluated for all the indi- ilar to the one introduced in Sun et al. [46]. In particular, a
viduals in each generation and only a percentage of the two step procedure is adopted where in the first step a dis-
population, corresponding to the highest fitness values, crete optimization algorithm is used to obtain the number
is selected to form the next generation. and approximate location, size, and orientation of the cracks
Reproduction During this step the fittest individuals from while in the second step a continuous optimization algorithm
each generation reproduce to form the next generation, is employed to refine the values of the parameters obtained in
two processes are involved in this reproduction: the first step. The discrete optimization step is employed in
Crossover The genes of two individuals (parents) are com- order to reduce the complexity of the original problem and
bined, through recombination of the bits corresponding obtain an approximate solution which is used as an initial
to their bit representation, to form an offspring. guess for the continuous step where a more accurate solution
Mutation During the reproduction procedure, some bits are can be obtained. The two steps are described in detail in the
randomly flipped in order to simulate mutations that following.
occur in the biological reproduction process.
5.3.1 Discrete optimization step
During this step another practice, called elitism, is commonly
used which consists of allowing the fittest individual or indi- In the first step of the procedure, in which Genetic Algorithms
viduals to survive, unaltered, in the next generation. are used as an optimization tool, the number of cracks is iden-
The above steps are repeated until some prescribed ter- tified, therefore topological variables [45] are employed to
mination criteria are met. The parameters involved in the activate/deactivate candidate cracks. Moreover, the original
above steps are user-defined and include the population size, identification problem is simplified in order to minimize the
crossover rate, mutation rate and the termination criteria. The number of parameters to be identified thus accelerating the
most widely adopted termination criteria include the def- convergence to the approximate solution. The reduction of
inition of a maximal number of generations, a predefined the number of parameters is achieved in two ways, firstly by
target value for the fitness function, as well as a maximal assuming the shape of the cracks to be detected circular rather
consecutive number of generations without improvement in than elliptical and secondly by reducing the number of binary
the fitness values. digits used to represent each of the parameters involved in
the optimization process.
5.2 Covariance matrix adaptation evolution strategy At this stage, the parameters described in Sect. 4.1 are
(CMA-ES) encoded as follows:
In this method [57,76] candidate solutions are generated from
a multivariate normal distribution whose parameters, namely x0 , y0 , z 0 The coordinates of the center of the ellipses are
the distribution mean, covariance matrix and step size, are encoded as:
updated such that the probability of obtaining improved solu-
tions is increased. pi = pimin + ( pimax − pimin ) θi (16)
Distribution mean The distribution mean is updated so that where pi are the coordinates, pimin and pimax are the min-
the probability of successful candidate solutions is imum and maximum values allowed for these coordinates
123
Computational Mechanics (2018) 62:835–852 843
and θi are the design variables used in the genetic algo- space around the initial values. This is achieved by using the
rithm. In order to represent variables θi , n binary digits following encoding for the parameters of the problem.
are used and the resulting values are divided by 2n so
that the variables assume n possible values between 0 θi
pi = pi0 + dpi (17)
and 1. The number of digits defines the total number of 10
possible crack locations and should be chosen according
to the geometry of the solid. It should be noted that a where pi0 are the initial values of the parameters obtained in
different number of digits for each variable can be used. the previous step, dpi are the half lengths of the search space
The minimum and maximum values define a box which (in the direction of each parameter) and θi are the design
should contain the whole domain of interest. variables used in the algorithm.
a, b In the first step of the procedure cracks are considered to In the above, half lengths of the search spaces are given a
be circular, therefore the two ellipse parameters are equal value equal to the distance of two consecutive possible values
and a single variable is required for their representation. (length of the search space for each variable divided by 2n )
The encoding used for this variable is the same as the one of the previous step of the algorithm. The design variables
used for the previous variables (Eq. 16) and the minimum are initialized to zero and the step size is set to σ = 3 which
and maximum values should be chosen according to the implies that the final solution lies in the interval 0 ± 2σ =
expected size of the cracks to be detected. 0 ± 6.
φx , φ y , φz Since cracks are assumed to be circular only the For the parameters that were omitted in the first step (a
first two angles are used at this stage. The encoding used and θz ) a slightly different approach is used. Regarding the
is again that of Eq. (16) and the minimum and maximum parameters of the ellipse, the value computed in the first step
values are set to 0 and π respectively while the number (were the two parameters were assumed equal) is used as
of digits used is n = 2 which results in 4 possible val- an initial value for parameter b for which the encoding of
ues for each angle. For these parameters variables are Eq. (17) is used. Parameter a which should be larger than or
divided by 2n + 1 so that the value π is not included equal to parameter b is obtained as the sum of parameter b
in the possible values for the angles since it is equiv- and an additional parameter ainc :
alent to the value 0. For the specific choice n = 2
the possible values for each angle are 0, π/4, π/2 and a = b + ainc (18)
3π/4.
where the additional parameter is computed as:
At this step of the algorithm, candidate solutions that vio-
|θa |
late the constraints described in Sect. 4 are penalized by ainc = da (19)
being assigned large fitness values. For those solutions the 10
forward problem does not have to be solved. Also, it is pos- In the above, θa is the design variable corresponding to ainc ,
sible that the solution produced by this step contains two or da is the maximum allowed difference between a and b and
more overlapping cracks. Although those cracks might be the absolute value is used to prevent ainc from assuming neg-
activated through their corresponding topological variables, ative values and therefore b from assuming larger values than
the procedure described in Sect. 4.3 will discard all but one of a.
the overlapping cracks and therefore the value of the fitness Regarding angle φz , the following encoding is employed:
function obtained will correspond to a single crack at that
specific location. At the end of the step cracks that have been θφz π
discarded through the above process are considered inactive φz = (20)
10 2
and as a result are not considered in the next step of the
optimization procedure. in order to restrict the possible values of the angle in the
interval [−π/2, π/2].
5.3.2 Continuous optimization step At this step candidate solutions that violate constraints are
re-sampled.
In the second part of the multiscale strategy, the results
obtained in the previous stage are used as an initial solu- 5.3.3 Discussion
tion for the CMA-ES algorithm. The number of cracks is
assumed to have been correctly determined in the previous In the strategy described above, the problem to be solved
step. Furthermore, the scaling of the parameters and the ini- in each individual step is of reduced complexity in com-
tial step size used in the algorithm are chosen so that the parison to the original problem definition. In the first step,
search space is confined in a small part of the original search the dimension of the search space is significantly reduced
123
844 Computational Mechanics (2018) 62:835–852
by removing some of the problem parameters, and reducing presence of at least one standard element between two
the number of binary digits used to represent the remaining enriched elements.
ones. In the second step, the search space is restricted in a – It is considered that cracks are far enough so that no inter-
small region around the solution obtained in the previous action between cracks takes place and that cracks which
step. Moreover, in the second part of the algorithm the num- are in close proximity can be approximated by a single
ber of cracks is considered to have already been determined, larger crack. As a result, the allowed distance between
and as a result the problem is further simplified. Without cracks can be further increased to prevent evaluations of
these simplifications, the complexity of the problem would the forward problem for cases that are not of interest and
render convergence extremely slow, or even impossible. to avoid the aforementioned numerical problems.
123
Computational Mechanics (2018) 62:835–852 845
(a) (b)
Fig. 8 Unit cube, zero iso surface of the radial basis function used to
describe the cube boundaries for the imposition of constraints
Fig. 9 Convergence of the proposed multiscale strategy for the problem
of a unit cube with multiple cracks
ables can be adjusted to the actual number of cracks (two).
The population size was set to 40 individuals, the mutation
rate was set to 0.4 in order to prevent the algorithm from ations is illustrated. In Table 1 the actual and detected values
converging to local minima and the optimization was set to of the parameters describing the crack geometry are pro-
run for 2000 evaluations of the fitness function. vided.
For the second part of the procedure the default parameters
of the CMA-ES algorithm are adopted resulting in a popu- 6.2 Detection of three edge cracks in a beam under
lation of 12 individuals. The scaling of parameters defined three point bending
in Subsection 5.3.2 results in each variable assuming values
in the interval [−10, 10] which would require an initial step In this example a beam under three point bending,as illus-
size equal to σ0 = 6. However, since the initial values of trated in Fig. 11, is considered with edge cracks in three
the parameters should already be close to the actual solution different locations. The geometry parameters are defined as
the initial step size is given a smaller value equal to σ0 = 3. L x = 0.6 units, L y = 0.15 units, L z = 0.15 units and the
The maximum allowed difference between the two param- load is given a unit value (P = 1 unit). Academic material
eters of the ellipse is set to da = 0.10 units. The CMA-ES properties E = 200, 000 units and ν = 0.3 are used. A net-
algorithm is set to run for 2000 evaluations of the forward work of 4 × 8 sensors is assumed to be located in each of the
problem. long sides of the beam (Fig. 11).
In Fig. 9 the fitness function value achieved by the best The beam is meshed with an unstructured mesh consist-
individual of the population is given as a function of the ing of 68,439 tetrahedral elements and 14,039 nodes. For
number of evaluations of the fitness function, while in simulating measurements a finer mesh consisting of 491,244
Fig. 10 the best solution after different numbers of evalu- tetrahedral elements and 89,757 nodes is used. Both meshes
123
846 Computational Mechanics (2018) 62:835–852
Table 1 Actual and detected values for the parameters describing crack
geometries for the problem of a unit cube with multiple cracks
Parameter Actual value Identified value
Crack 1 Crack 2 Crack 1 Crack 2
Fig. 12 Meshes used for the three point bending problem. a Coarse
mesh for the solution of the forward problem and b fine mesh for sim-
ulating measurements
123
Computational Mechanics (2018) 62:835–852 847
123
848 Computational Mechanics (2018) 62:835–852
(a) (b)
123
Computational Mechanics (2018) 62:835–852 849
Fig. 17 Possible crack locations for the first step of the multiscale crack
detection scheme for the case of a wind turbine blade
Fig. 19 Best candidate solution after different numbers of evaluations
for the problem of a wind turbine blade with two edge cracks
123
850 Computational Mechanics (2018) 62:835–852
123
Computational Mechanics (2018) 62:835–852 851
14. Xu ZD, Wu Z (2007) Energy damage detection strategy based on 33. Sukumar N, Chopp DL, Moës N, Belytschko T (2000) Modeling
acceleration responses for long-span bridge structures. Eng Struct holes and inclusions by level sets in the extended finite element
29(4):609–617 method. Comput Methods Appl Mech Eng 190(46–47):6183–6200
15. Abdalla MO, Zimmerman DC, Grigoriadis KM (1999) Structural 34. Benowitz BA, Waisman H (2013) A spline-based enrichment func-
damage detection using strain data via linear matrix inequality tion for arbitrary inclusions in extended finite element method
based methods. In: American control conference, 1999. Proceed- with applications to finite deformations. Int J Numer Methods Eng
ings of the 1999, vol 2. IEEE, pp 1114–1118 95(5):361–386
16. Ostachowicz WM (2008) Damage detection of structures using 35. Jung J, Taciroglu E (2014) Modeling and identification of an arbi-
spectral finite element method. Comput Struct 86(3–5):454–462 trarily shaped scatterer using dynamic XFEM with cubic splines.
17. Park S, Yun CB, Roh Y, Lee JJ (2005) Health monitoring of steel Comput Methods Appl Mech Eng 278:101–118
structures using impedance of thickness modes at PZT patches. 36. Maringer DG (2006) Portfolio management with heuristic opti-
Smart Struct Syst 1(4):339–353 mization, vol 8. Springer, Berlin
18. Spiridonakos MD, Chatzi EN (2015) Metamodeling of dynamic 37. Hunaidi O (1998) Evolution-based genetic algorithms for analysis
nonlinear structural systems through polynomial chaos NARX of non-destructive surface wave tests on pavements. NDT & E Int
models. Comput Struct 157:99–113 31(4):273–280 (Non-destructive Testing in Civil Engineering)
19. Papadimitriou C, Angelikopoulos P, Koumoutsakos P, Papadioti 38. Farley SJ, Durodola JF, Fellows NA, Hernndez-Gmez LH (2012)
DC (2013) Efficient techniques for bayesian inverse modeling of High resolution non-destructive evaluation of defects using artifi-
large-order computational models. In: Safety, reliability, risk and cial neural networks and wavelets. NDT & E Int 52:69–75
life-cycle performance of structures and infrastructures: proceed- 39. Lee W, Sun C, Chiu C (2014) Nondestructive evaluation of buried
ings of the 11th International Conference on Structural Safety and dielectric cylinders by asynchronous particle swarm optimization.
Reliability, New York, USA, 16–20 June 2013. CRC Press J Test Eval 43(1):212–220
20. Triantafyllou SP, Chatzi EN (2014) A hysteretic multiscale for- 40. Bernieri A, Ferrigno L, Laracca M, Molinara M (2008) Crack shape
mulation for nonlinear dynamic analysis of composite materials. reconstruction in eddy current testing using machine learning sys-
Comput Mech 54(3):763–787 tems for regression. IEEE Trans Instrum Meas 57(9):1958–1968
21. Papadimitriou C, Papadioti DC (2013) Component mode synthe- 41. Rabinovich D, Givoli D, Vigdergauz S (2007) XFEM-based crack
sis techniques for finite element model updating. Comput Struct detection scheme using a genetic algorithm. Int J Numer Meth Eng
126:15–28 71(9):1051–1080
22. Wang Y, Waisman H (2015) Progressive delamination analysis 42. Rabinovich D, Givoli D, Vigdergauz S (2008) Crack identification
of composite materials using XFEM and a discrete damage zone by arrival time using XFEM and a genetic algorithm. Int J Numer
model. Comput Mech 55(1):1–26 Methods Eng 77(3):337–359
23. Kerfriden P, Gosselet P, Adhikari S, Bordas SPA (2011) Bridg- 43. Waisman H, Chatzi E, Smyth AW (2010) Detection and quantifi-
ing proper orthogonal decomposition methods and augmented cation of flaws in structures by the extended finite element method
Newton–Krylov algorithms: an adaptive model order reduction and genetic algorithms. Int J Numer Meth Eng 82(3):303–328
for highly nonlinear mechanical problems. Comput Methods Appl 44. Chatzi EN, Hiriyur B, Waisman H, Smyth AW (2011) Experimental
Mech Eng 200(5):850–866 application and enhancement of the XFEM–GA algorithm for the
24. Kerfriden P, Passieux JC, Bordas SPA (2012) Local/global model detection of flaws in structures. Comput Struct 89(7):556–570
order reduction strategy for the simulation of quasi-brittle fracture. 45. Sun H, Waisman H, Betti R (2013) Nondestructive identification of
Int J Numer Meth Eng 89(2):154–179 multiple flaws using XFEM and a topologically adapting artificial
25. Kerfriden P, Goury O, Rabczuk T, Bordas SPA (2013) A parti- bee colony algorithm. Int J Numer Methods Eng 95(10):871–900
tioned model order reduction approach to rationalise computational 46. Sun H, Waisman H, Betti R (2014) A multiscale flaw detection
expenses in nonlinear fracture mechanics. Comput Methods Appl algorithm based on XFEM. Int J Numer Methods Eng 100(7):477–
Mech Eng 256:169–188 503
26. Goury O, Amsallem D, Bordas SPA, Liu WK, Kerfriden P 47. Sun H, Waisman H, Betti R (2015) A sweeping window method for
(2016) Automatised selection of load paths to construct reduced- detection of flaws using an explicit dynamic XFEM and absorbing
order models in computational damage micromechanics: from boundary layers. Int J Numer Methods Eng 105(13):1014–1040
dissipation-driven random selection to bayesian optimization. 48. Yan G, Sun H, Waisman H (2015) A guided bayesian inference
Comput Mech 58(2):213–234 approach for detection of multiple flaws in structures using the
27. Rahimabadi A Akbari, Kerfriden P, Bordas S, Bordas S (2015) extended finite element method. Comput Struct 152:27–44
Scale selection in nonlinear fracture mechanics of heterogeneous 49. Nanthakumar SS, Lahmer T, Rabczuk T (2013) Detection of flaws
materials. Philos Mag 95(28–30):3328–3347 in piezoelectric structures using extended FEM. Int J Numer Meth-
28. Kerfriden P, Schmidt KM, Rabczuk T, Bordas SPA (2013) Sta- ods Eng 96(6):373–389
tistical extraction of process zones and representative subspaces 50. Nanthakumar SS, Lahmer T, Rabczuk T (2014) Detection of mul-
in fracture of random composites. Int J Multiscale Comput Eng tiple flaws in piezoelectric structures using XFEM and level sets.
11(3):253–287 Comput Methods Appl Mech Eng 275:98–112
29. Belytschko T, Black T (1999) Elastic crack growth in finite ele- 51. Zhang C, Nanthakumar SS, Lahmer T, Rabczuk T (2017) Mul-
ments with minimal remeshing. Int J Numer Methods Eng 620(July tiple cracks identification for piezoelectric structures. Int J Fract
1998):601–620 206(2):151–169
30. Moës N, Dolbow J, Belytschko T (1999) A finite element method 52. Ma C, Yu T, Van Lich L, Bui TQ (2017) An effective computa-
for crack growth without remeshing. Int J Numer Meth Eng tional approach based on XFEM and a novel three-step detection
46(1):131–150 algorithm for multiple complex flaw clusters. Comput Struct
31. Sukumar N, Moës N, Moran B, Belytschko T (2000) Extended 193:207–225
finite element method for three-dimensional crack modelling. Int J 53. Alalade M, Nguyen-Tuan L, Wuttke F, Lahmer T Damage identi-
Numer Methods Eng 48(November 1999):1549–1570 fication in gravity dams using dynamic coupled hydro-mechanical
32. Daux C, Moës N, Dolbow J, Sukumar N, Belytschko T (2000) XFEM. Int J Mech Mater Des 1–19. https://doi.org/10.1007/
Arbitrary branched and intersecting cracks with the extended finite s10999-017-9367-4
element method. Int J Numer Meth Eng 48(12):1741–1760
123
852 Computational Mechanics (2018) 62:835–852
54. Pirboudaghi S, Tarinejad R, Alami MT (2017) Damage detection 69. Ventura G, Gracie R, Belytschko T (2009) Fast integration and
based on system identification of concrete dams using an extended weight function blending in the extended finite element method.
finite element–wavelet transform coupled procedure. J Vib Control. Int J Numer Methods Eng 77(July 2008):1–29
https://doi.org/10.1177/1077546317722428 70. Loehnert S, Mueller-Hoeppe DS, Wriggers P (2011) 3D corrected
55. Agathos K, Chatzi E, Bordas SPA, Talaslidis D (2015) A well- XFEM approach and extension to finite deformation theory. Int J
conditioned and optimally convergent XFEM for 3D linear elastic Numer Methods Eng 86(October 2010):431–452
fracture. Int J Numer Methods Eng 105(9):643–677 71. Carr JC, Beatson RK, Cherrie JB, Mitchell TJ, Fright WR, McCal-
56. Agathos K, Chatzi E, Bordas S (2016) Stable 3D extended finite lum BC, Evans TR (2001) Reconstruction and representation of
elements with higher order enrichment for accurate non planar frac- 3D objects with radial basis functions. In: Proceedings of the
ture. Comput Methods Appl Mech Eng 306:19–46 28th annual conference on Computer graphics and interactive tech-
57. Hansen N, Muller SD, Koumoutsakos P (2003) Reducing the time niques. ACM, pp 67–76
complexity of the derandomized evolution strategy with covariance 72. Gottschalk S, Lin MC, Manocha D (1996) OBBtree: A hierarchi-
matrix adaptation (CMA-ES). Evol Comput 11(1):1–18 cal structure for rapid interference detection. In Proceedings of
58. Agathos K, Chatzi E, Bordas S (2016) 3D crack detection using the 23rd annual conference on Computer graphics and interactive
an XFEM variant and global optimization algorithms. In: Proceed- techniques. ACM, pp 171–180
ings of the 9th International Conference on Fracture Mechanics of 73. Holland JH (1992) Adaptation in natural and artificial systems:
Concrete and Concrete Structures FraMCoS-9 an introductory analysis with applications to biology, control and
59. Glisic B, Inaudi D (2008) Fibre optic methods for structural health artificial intelligence. MIT Press, Cambridge
monitoring. Wiley, Hoboken 74. Goldberg DE (1989) Genetic algorithms in search, optimization
60. Moës N, Gravouil A, Belytschko T (2002) Non-planar 3D crack and machine learning, 1st edn. Addison-Wesley Longman Pub-
growth by the extended finite element and level sets-part I: mechan- lishing Co. Inc, Boston
ical model. Int J Numer Methods Eng 53(11):2549–2568 75. Banzhaf Wolfgang, Francone Frank D, Keller Robert E, Nordin
61. Gravouil A, Moës N, Belytschko T (2002) Non-planar 3D crack Peter (1998) Genetic programming: an introduction: on the auto-
growth by the extended finite element and level sets-part II: level matic evolution of computer programs and its applications. Morgan
set update. Int J Numer Methods Eng 53(11):2569–2586 Kaufmann Publishers Inc., San Francisco
62. Duflot M (2007) A study of the representation of cracks with level 76. Auger A, Hansen N (September 2005) A restart CMA evolution
sets. Int J Numer Methods Eng 70(November 2006):1261–1302 strategy with increasing population size. In: 2005 IEEE congress
63. Melenk JM, Babuska I (1996) The partition of unity finite ele- on evolutionary computation, vol 2. pp 1769–1776
ment method: basic theory and applications. Comput Methods Appl 77. Renard Y, Pommier J (2004–2014) Gmm++ library. http://
Mech Eng 139(1–4):289–314 download.gna.org/getfem/html/homepage/gmm/index.html
64. Stazi FL, Budyn E, Chessa J, Belytschko T (2003) An extended 78. Geuzaine C, Remacle JF (2009) Gmsh: A 3-D finite element mesh
finite element method with higher-order elements for curved generator with built-in pre-and post-processing facilities. Int J
cracks. Comput Mech 31(1–2):38–48 Numer Methods Eng 79(11):1309–1331
65. Laborde P, Pommier J, Renard Y, Salaün M (2005) High-order 79. Ahrens J, Geveci B, Law C, Hansen CD, CR Johnson (2005) An
extended finite element method for cracked domains. Int J Numer end-user tool for large-data visualization. Paraview
Methods Eng 64(3):354–381 80. Ayachit U (2015) The paraview guide: a parallel visualization appli-
66. Béchet E, Minnebo H, Moës N, Burgardt B (2005) Improved imple- cation. https://dl.acm.org/citation.cfm?id=2789330
mentation and robustness study of the X-FEM for stress analysis 81. Hansen N, Kern S (2004) Evaluating the CMA evolution strategy
around cracks. Int J Numer Methods Eng 64(8):1033–1056 on multimodal test functions. In: Parallel problem solving from
67. Menk A, Bordas SPA (2011) A robust preconditioning technique nature-PPSN VIII. Springer, pp 282–291
for the extended finite element method. Int J Numer Methods Eng 82. Niroomandi S, Alfaro I, Gonzalez D, Cueto E, Chinesta Francisco
85(October 2010):1609–1632 (2012) Real-time simulation of surgery by reduced-order model-
68. Fries TP (2008) A corrected XFEM approximation without prob- ing and X-FEM techniques. Int J Numer Methods Biomed Eng
lems in blending elements. Int J Numer Methods Eng 75(November 28(5):574–588
2007):503–532
123