{"id":"https://openalex.org/W2897187493","doi":"https://doi.org/10.1109/ijcnn.2018.8489761","title":"Fault Detection in Steel-Reinforced Concrete Using Echo State Networks","display_name":"Fault Detection in Steel-Reinforced Concrete Using Echo State Networks","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2897187493","doi":"https://doi.org/10.1109/ijcnn.2018.8489761","mag":"2897187493"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2018.8489761","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2018.8489761","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://eprints.keele.ac.uk/9052/1/woottondayhaycockfinal.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050312209","display_name":"Adam J. Wootton","orcid":"https://orcid.org/0000-0001-6432-0503"},"institutions":[{"id":"https://openalex.org/I56007636","display_name":"Keele University","ror":"https://ror.org/00340yn33","country_code":"GB","type":"education","lineage":["https://openalex.org/I56007636"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Adam J. Wootton","raw_affiliation_strings":["Foundation year Centre, Keele University, Keele, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Foundation year Centre, Keele University, Keele, United Kingdom","institution_ids":["https://openalex.org/I56007636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101628406","display_name":"Charles Day","orcid":"https://orcid.org/0000-0001-9707-9189"},"institutions":[{"id":"https://openalex.org/I56007636","display_name":"Keele University","ror":"https://ror.org/00340yn33","country_code":"GB","type":"education","lineage":["https://openalex.org/I56007636"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Charles R. Day","raw_affiliation_strings":["School of Computing and Mathematics, Keele University, Keele, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematics, Keele University, Keele, United Kingdom","institution_ids":["https://openalex.org/I56007636"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089278233","display_name":"P.W. Haycock","orcid":null},"institutions":[{"id":"https://openalex.org/I56007636","display_name":"Keele University","ror":"https://ror.org/00340yn33","country_code":"GB","type":"education","lineage":["https://openalex.org/I56007636"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Peter W. Haycock","raw_affiliation_strings":["Foundation year Centre, Keele University, Keele, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Foundation year Centre, Keele University, Keele, United Kingdom","institution_ids":["https://openalex.org/I56007636"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050312209"],"corresponding_institution_ids":["https://openalex.org/I56007636"],"apc_list":null,"apc_paid":null,"fwci":0.1692,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61280522,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12611","display_name":"Neural Networks and Reservoir Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12611","display_name":"Neural Networks and Reservoir Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9768999814987183,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10320","display_name":"Neural Networks and Applications","score":0.9711999893188477,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/magnetic-flux-leakage","display_name":"Magnetic flux leakage","score":0.6510379314422607},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6108912825584412},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5666970610618591},{"id":"https://openalex.org/keywords/echo-state-network","display_name":"Echo state network","score":0.512577474117279},{"id":"https://openalex.org/keywords/echo","display_name":"Echo (communications protocol)","score":0.5057134628295898},{"id":"https://openalex.org/keywords/reservoir-computing","display_name":"Reservoir computing","score":0.500859260559082},{"id":"https://openalex.org/keywords/nondestructive-testing","display_name":"Nondestructive testing","score":0.48831531405448914},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.4882340729236603},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.48149168491363525},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4814555048942566},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.44389867782592773},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.42490968108177185},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.41638290882110596},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.41579508781433105},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3215981423854828},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.26430606842041016},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.25262200832366943},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.1361578404903412}],"concepts":[{"id":"https://openalex.org/C20892748","wikidata":"https://www.wikidata.org/wiki/Q4390394","display_name":"Magnetic flux leakage","level":3,"score":0.6510379314422607},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6108912825584412},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5666970610618591},{"id":"https://openalex.org/C172025690","wikidata":"https://www.wikidata.org/wiki/Q5332763","display_name":"Echo state network","level":4,"score":0.512577474117279},{"id":"https://openalex.org/C2779426996","wikidata":"https://www.wikidata.org/wiki/Q18389128","display_name":"Echo (communications protocol)","level":2,"score":0.5057134628295898},{"id":"https://openalex.org/C135796866","wikidata":"https://www.wikidata.org/wiki/Q7315328","display_name":"Reservoir computing","level":4,"score":0.500859260559082},{"id":"https://openalex.org/C56529433","wikidata":"https://www.wikidata.org/wiki/Q626700","display_name":"Nondestructive testing","level":2,"score":0.48831531405448914},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.4882340729236603},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.48149168491363525},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4814555048942566},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.44389867782592773},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.42490968108177185},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41638290882110596},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.41579508781433105},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3215981423854828},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26430606842041016},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25262200832366943},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.1361578404903412},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C16389437","wikidata":"https://www.wikidata.org/wiki/Q11421","display_name":"Magnet","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ijcnn.2018.8489761","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2018.8489761","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.keele.ac.uk:9052","is_oa":true,"landing_page_url":"https://eprints.keele.ac.uk/9052/1/woottondayhaycockfinal.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306402149","display_name":"Keele Research Repository (Keele University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56007636","host_organization_name":"Keele University","host_organization_lineage":["https://openalex.org/I56007636"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"pmh:oai:eprints.keele.ac.uk:9052","is_oa":true,"landing_page_url":"https://eprints.keele.ac.uk/9052/1/woottondayhaycockfinal.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306402149","display_name":"Keele Research Repository (Keele University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56007636","host_organization_name":"Keele University","host_organization_lineage":["https://openalex.org/I56007636"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W561097883","https://openalex.org/W616116500","https://openalex.org/W1545352135","https://openalex.org/W1920794317","https://openalex.org/W1975229407","https://openalex.org/W2036451492","https://openalex.org/W2041645455","https://openalex.org/W2047028564","https://openalex.org/W2048843913","https://openalex.org/W2059978238","https://openalex.org/W2092048749","https://openalex.org/W2158698691","https://openalex.org/W2171865010","https://openalex.org/W2293789892","https://openalex.org/W2302384817","https://openalex.org/W2505824562","https://openalex.org/W2516734862","https://openalex.org/W2528283026","https://openalex.org/W2587219850","https://openalex.org/W2797532987","https://openalex.org/W3133288639","https://openalex.org/W4255455317"],"related_works":["https://openalex.org/W57315087","https://openalex.org/W2010974764","https://openalex.org/W4386848428","https://openalex.org/W4205631599","https://openalex.org/W2021379535","https://openalex.org/W2020067398","https://openalex.org/W2967225774","https://openalex.org/W2903992663","https://openalex.org/W4237814686","https://openalex.org/W2997427060"],"abstract_inverted_index":{"The":[0],"cost":[1,19],"of":[2,32,40,97,108,138,146,171,189,192,204],"maintaining":[3],"and":[4,15,44],"repairing":[5],"the":[6,20,30,37,54,77,83,106,120,136,139,174,184,190,202],"world's":[7],"ageing":[8],"reinforced":[9],"concrete":[10],"infrastructure":[11],"continues":[12],"to":[13,18,66,116,126,144,156],"increase,":[14],"is":[16,46,53,153],"expected":[17],"United":[21],"States":[22],"economy":[23],"alone":[24],"$58":[25],"billion":[26],"by":[27],"2020.":[28],"Consequently,":[29],"use":[31,89,208],"non-destructive":[33,62],"testing":[34,198],"technologies":[35],"for":[36,80,206,214],"early":[38],"identification":[39],"faults":[41],"in":[42,69,74,88,169,183],"roads":[43],"bridges":[45],"becoming":[47],"increasingly":[48],"important.":[49],"One":[50],"such":[51,81],"technology":[52],"Electromagnetic":[55],"Anomaly":[56],"Detection":[57],"(EMAD)":[58],"technique,":[59],"which":[60],"exploits":[61],"magnetic":[63,134],"flux":[64],"leakage":[65],"detect":[67],"defects":[68],"steel":[70],"reinforcing":[71],"meshes":[72],"embedded":[73],"concrete.":[75],"Despite":[76],"increasing":[78],"need":[79],"techniques,":[82],"data":[84,117,149],"analysis":[85,150,188],"options":[86],"currently":[87,154],"are":[90],"limited.":[91],"This":[92],"paper":[93],"presents":[94],"an":[95,147,196],"application":[96,182],"Echo":[98],"State":[99],"Networks,":[100],"a":[101,113,210],"recurrent":[102],"neural":[103],"network":[104],"from":[105,131],"field":[107],"reservoir":[109],"computing":[110],"that":[111,145,152,163],"features":[112],"short-term":[114],"memory,":[115],"obtained":[118],"using":[119],"EMAD":[121,158],"technique.":[122],"Having":[123],"been":[124],"trained":[125],"discern":[127],"real":[128,211],"defect":[129],"signals":[130],"other":[132],"anomalous":[133],"features,":[135],"performance":[137,166],"ESNs":[140,205],"was":[141,161,167,177],"then":[142],"compared":[143],"analytical":[148],"technique":[151],"used":[155],"process":[157],"data.":[159],"It":[160],"found":[162],"average":[164],"ESN":[165],"comparable":[168],"terms":[170],"AUC,":[172],"while":[173],"optimal":[175],"threshold":[176],"more":[178],"consistent,":[179],"greatly":[180],"aiding":[181],"`real-world'.":[185],"A":[186],"qualitative":[187],"output":[191],"both":[193],"methods":[194],"on":[195],"unseen":[197],"dataset":[199],"also":[200],"demonstrated":[201],"superiority":[203],"practical":[207],"as":[209],"time":[212],"tool":[213],"on-site":[215],"inspections.":[216]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
