Next Article in Journal
Black Fungi and Stone Heritage Conservation: Ecological and Metabolic Assays for Evaluating Colonization Potential and Responses to Traditional Biocides
Next Article in Special Issue
Experimental and Empirical Study for Prediction of Blast Loads
Previous Article in Journal
Incorporating Code Structure and Quality in Deep Code Search
Previous Article in Special Issue
Analytical Model Formulation of Steel Plate Reinforced Concrete Walls against Hard Projectile Impact
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Machine Learning Model for the Prediction of Concrete Penetration by the Ogive Nose Rigid Projectile

by
Qadir Bux alias Imran Latif
1,*,
Zubair Ahmed Memon
2,
Zafar Mahmood
3,
Mohsin Usman Qureshi
4 and
Abdalrhman Milad
1,*
1
Department of Civil and Environmental Engineering, College of Engineering, University of Nizwa, P.O. Box 33, Nizwa 616, Ad-Dakhliyah, Oman
2
Department of Engineering Management, Prince Sultan University, Riyadh 11586, Saudi Arabia
3
Department of Civil and Architectural Engineering, College of Engineering, University of Buraimi, P.O. Box 890, Buraimi 512, Oman
4
Faculty of Engineering, Sohar University, P.O. Box 44, Sohar 311, Oman
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2022, 12(4), 2040; https://doi.org/10.3390/app12042040
Submission received: 11 January 2022 / Revised: 9 February 2022 / Accepted: 11 February 2022 / Published: 16 February 2022
(This article belongs to the Special Issue Blast and Impact Engineering on Structures and Materials)

Abstract

:
In recent years, research interest has been revolutionized to predict the rigid projectile penetration depth in concrete. The concrete penetration predictions persist, unsettled, due to the complexity of phenomena and the continuous development of revolutionized statistical techniques, such as machine learning, neural networks, and deep learning. This research aims to develop a new model to predict the penetration depth of the ogive nose rigid projectile into concrete blocks using machine learning. Genetic coding is used in Python programming to discover the underlying mathematical relationship from the experimental data in its non-dimensional form. A populace of erratic formulations signifies the rapport amid dependent parameters, such as the impact factor (I), the geometry function of the projectile (N), the empirical constant for concrete strength (S), the slenderness of the projectile (λ), and their independent objective variable, X/d, where X is the penetration depth of the projectile and d is the diameter of the projectile. Four genetic operations were used, including the crossover, sub-tree transfiguration, hoist transfiguration, and point transfiguration operations on supervised test datasets, which were divided into three categories, namely, narrow penetration (X/d < 0.5), intermediate penetration (0.5 ≤ X/d < 5.0), and deep penetration (X/d ≥ 5.0). The proposed model shows a significant relationship with all data in the category for medium penetration, where R2 = 0.88, and R2 = 0.96 for deep penetration. Furthermore, the proposed model predictions are also compared with the most commonly used NDRC and Li and Chen models. The outcome of this research shows that the proposed model predicts the penetration depth precisely, compared to the NDRC and Li and Chen models.

1. Introduction

1.1. Research Background

In the 20th century worldwide, various studies were conducted to produce innovative concrete variations [1]. However, since the 19th century, ordinary concrete is still the foremost distinctive practical material and is commonly used to build structures against accidentally-occurring impact loads [1]. These accidentally-occurring impact loads, such as vehicle crashes, plane crashes, tsunami, tornadoes, and flying objects are the main sources of penetration in concrete [2]. Figure 1 shows the illustration of penetration that occurs due to ogive nose rigid projectile impacts on concrete structures [2].
The historical penetration depth prediction model, that was developed based on experimental data, showed that the USA most frequently used the Petry model/the modified Petry model to predict penetration depth into a concrete block [1,3]. The Petry model was initially developed in 1910 and is considered the oldest available empirical model in literature [1,3]. Later, the Petry model was modified by Q.M. Li in the S.I unit [1,3]. In 1941, the Ballistic Research Laboratory (BRL) proposed the penetration prediction model [1,3]. Commencing in 1943, the Army Corp of Engineers also established the ACE model [1,3]. In 1946, the National Defense Research Committee (NDRC) proposed a model founded on the ACE model [1,3,4] The limitation of the NDRC hypothesis was that the NDRC model was used for rear penetration depths [1,3]. The NDRC also suggested a nose shape factor N* for projectiles, as mentioned in Table A1. Later, Ammann and Whitney’s model was anticipated to foretell the penetration of concrete traceable to the effect of strenuously precipitated particles at comparatively sophisticated velocities [1,3]. According to Kennedy [5], the Ammann and Whitney model can be used for velocities over 1000 ft/s [1,3]. Whiffen further continued research in the British Road Research Laboratory in the United Kingdom, using experimental data acquired from World War II, and developed a prediction model for penetration depth [1,3]. Kar altered the NDRC model, employing reversion regarding the modulus of elasticity (E), where E is the modulus of elasticity of the projectile, and Es is the modulus of elasticity of steel [1,3]. In the United Kingdom, Barr recommended a UKAEA model by reforming the NDRC model derived from wide-ranging research on nuclear power plant structures [1,3]. The Haldar–Hamieh model [1,3,6] of penetration depth relies on the dimensionless impact factor (Ia), where and N* is the nose shape factor [1,3,6]. Adeli and Amin improved the impact factor (Ia), familiarized by Halder and Hamieh, using regression on Sliter’s experimental data [1,3]. Hughes revised the NDRC hypothesis and suggested a model where Ih is a non-dimensional impact factor [1,3] and Nh is a nose shape factor [1,3]. Hughes proposed that the tensile and compressive strength of the concrete (ft/fc) ratio is constant [1,3,7]. Hughes also showed the importance of the strain rate and the dynamic increase factor (DIF), represented by ‘S’ [1,3,7]. Healy and Weissman introduced a model for penetration depth by revising the NDRC and Kar models [1,3]. The CRIEPI Model, mentioned below in Table A1, assumes the thickness of the concrete barrier Hr = 20 cm (0.2 m) [1,3]. In 1985, the United Kingdom Nuclear Electronics (UKNE) began intrinsic research on the behavior of concrete structures resisting hard projectile penetration by creating the R3 Concrete Impact Working Party [1,3]. The UMIST model for penetration depth (X) improved the form with the reflection of the nose shape [1,3]. Li and Chen [1,3,8] further advanced Forrestal et al.’s [1,3,9] model and proposed a semi-empirical or semi-analytical model for penetration depth (X). The model is in a non-dimensional homogenous form, and these models are valid for an extensive scope of penetration depth, where I is the impact function, and N is the geometry function. S = 72 f c 0.5 is an empirical function of fc (MPa). The Li and Chen model is applicable for X/d ≥ 5.0 [2,4]. Li and Chen [1,3,8,10] recommended X/d < 5.0 for small-to-medium penetration depths, where h is the length of the nose of the projectile. In the case of narrow penetrations when X/d < 0.5, the penetration depth is given by [1,3,8,10]. Chen and Li [1,3,8,10] recommended a simplified model of X/d = 0.5(I) to predict the penetration depth for deep penetration. The details of the discussed models are given in Appendix A Table A1.
Since 2005, researchers turned their attention to developing models in terms of the required critical impact energy [1,2]. Furthermore, research also turned to the advancement of concrete, creating high-performance concrete (HPC), ultra-high-performance concrete (UHPC), and high-performance fiber-reinforced concrete (HPFRC). However, until today, normal concrete and normal reinforced concrete are still the most commonly used materials for the construction of structures. The revised interest of researchers on concrete penetration depth emerged in 2015, when Husseini and Dalvand implemented an evolution of the statistical model developing technique, the neural network, to develop a model for the prediction of the rigid projectile penetration depth in concrete. Furthermore, in 2021, research was conducted using gradient tree boosting machine learning to predict RC panel failure modes under impact loading. These two kinds of research emerged with the need for the redevelopment of the model, using advanced machine learning tools to develop a prediction model based on an extensive collection of experimental data. Therefore, this research is focused on developing a model based on an extensive collection of 257 experimental test data, using machine learning symbolic regression. Furthermore, the proposed prediction model is validated with the prediction of the NDRC and Li and Chen models, because, in the literature, the most prominent model used to predict penetration depth is the Li and Chen dimensionless model [1].

1.2. Research Motivation

Based on the literature, there is a need to modernize the penetration depth prediction model in recent years. This is mainly due to the complexity of penetration phenomena, where there is a continuous evolution of techniques, such as neural networks and machine learning, especially since concrete is still commonly used in structures [11,12].
In 2015, Husseini and Dalvand used a neural network on 70 experimental datasets taken to estimate the penetration depth in concrete targets using an ogive nose rigid projectile [8,10,13,14,15,16]. The neural network models have a very low rate of error and high correlation coefficients compared to the regression-based models [17]. In 2021, Thai et al. used gradient tree boosting machine learning to predict RC panel failure modes under impact loading. The accuracy of the prediction result was not as high as expected, due to the lack of data and the unbalance experimental output features. However, this new approach was recommended for further investigation [18].

1.3. Research Objectives

The main objective of this research is to develop a modernized model for predicting penetration depth using machine learning symbolic regression genetic programming in Python. The model can predict the penetration depth with greater accuracy on a wide range of 257 tests, compared with the NDRC and Li and Chen models. The total of 257 test datasets from [2,8,10,13,14,15,16,19] is divided into three categories of narrow penetration depths, where X/d < 0.5; intermediate penetration depth, where 0.5 < X/d < 5.0; and deep penetration, where X/d > 5.0. X is the penetration depth and d is the diameter of the projectile. The significance of this research is that a reasonable number of 257 test datasets are trained and tested using machine learning symbolic regression with a genetic programming crossover, sub-tree transfiguration, hoist transfiguration, and point transfiguration to develop a model with better accuracy. The proposed model further compares with the NDRC and Li and Chen equations.

2. Machine Learning Symbolic Regression Genetic Programming Using Python

An interpretable supervised machine learning symbolic regression was used to discover the fundamental scientific equation to describe a Python correlation. Symbolic regression discovers mathematical equations using genetic programming [20]. A populace of erratic formulations is used to signify rapport amid dependent parameters, such as the impact factor (I), the geometry function of the projectile (N), the empirical constant for concrete strength (S), the slenderness of projectile (λ) and their independent objective variable, X/d, where X is the penetration depth of the projectile and d is the diameter of the projectile. In the iterative process, the consecutive propagation of a series of events is progressed from its predecessor’s generation by choosing the populace’s adequate entities to undertake genetic maneuvers. Genetic encoding yields a sequence of entirely unplanned programs (or models) and further predicts scientific equations to express the relationship between the reliant and sovereign parameters [21]. Four genetic operations used in genetic programming are the crossover, sub-tree transfiguration, hoist transfiguration, and point transfiguration operations, as shown in Figure 2. A sub-tree is randomly selected from the front-runner of an event in the crossover method and is replaced with a randomly selected sub-tree, since it is the front-runner of one more event (Figure 2a). A sub-tree is randomly chosen from the front-runner of an event in the sub-tree mutation method, and it is replaced with a sub-tree that is generated randomly (Figure 2b). The hoist mutation method selects a sub-tree of a randomly selected sub-tree from the winner of a tournament, which replaces the previously chosen sub-tree (Figure 2c). The point mutation method randomly selects some nodes from the tournament winner and replaces them with other building blocks (Figure 2d).
Symbolic regression generates a populace of unplanned scientific formulations with independent data factors as variants [22]. This scientific formulation genus transfigures and emerges as innovative models via genetic encoding [22]. The resulting formulations endeavor to predict trial data by appraising the specified metric (e.g., mean absolute error, root mean-squared error, or mean-squared error) between the predicted and actual values as shown in Figure 3.

3. Data Analysis

The penetration of the projectile can be divided into three categories, namely, deep penetration (X/d ≥ 5.0), intermediate penetration (0.5 ≤ X/d < 5.0), and narrow penetration (X/d < 0.5), where X is the penetration depth and d is the projectile’s diameter [10]. Experimental data in dimensionless form, shown in Table 1, is used for the symbolic regression analysis to obtain a mathematical model [2,8,10,13,14,15,16,19]. The data’s dimensionless parameters include the impact factor I = ( M V o 2 f c d 3 S ) , where M is mass of the rigid projectile, Vo is impacting projectile velocity, fc is the compressive strength of the concrete, d is the diameter of the rigid projectile, and S = 72 f c 0.5 is the empirical constant for concrete strength. The geometry function of the projectile is N = ( M l c d 3 N * ) , where M is the mass of the rigid projectile, N* is nose shape factor projectile, l c is the density of concrete, and d is the diameter of the rigid projectile. The slenderness of the projectile is λ = ( M l c d 3 ) , where M is the mass of the rigid projectile, l c is the density of concrete, and d is the diameter of the rigid projectile. The empirical constant for concrete strength is S = 72 f c 0.5 , and X/d refers to the dimensionless penetration depth ratio-to-projectile diameter. The dimensionless penetration X/d is taken as a dependent target variable, whereas I, N, λ, and S are independent variables or predictors.
The correlation among predictors is shown in Figure 4 as a correlation matrix. The correlations are calculated separately for narrow, medium, and deep penetration. N and λ values are identical in the narrow penetration data. Hence, the data have a perfect correlation of 1.0. S and N are also highly correlated. In the medium penetration data, N is highly correlated with I and λ. In the deep penetration data, the correlation among predictors is weak. A summary of the statistics of predictors for different penetration types is shown in Table 2.
In order to explore the distribution of predictors, a boxplot (or a box-and-whisker plot) of each predictor for the different penetration ranges is shown in Figure 5. The median is shown by the vertical line inside the box, whereas the left and right sides of the box are the first and third quartiles, respectively. Most of the data lie in the first and third quartiles, and the lines that are referred to as whiskers extend on the right and left sides of the box to indicate the range. There is a clear separation of I, N, and λ in the different penetration ranges. The median of S is the same for different penetration ranges, while there is more deep penetration data. More outliers in all predictors in the medium penetration are observed, as seen by the points plotted beyond the whiskers.
Figure 6, Figure 7 and Figure 8 show pair plots of the predictors for narrow, medium, and dense penetration ranges, respectively. The diagonals are density plots calculated from the data through a kernel density estimate (KDE) [20,21]. The KDE plots can be considered as smoothed histograms. The plots above the diagonal are scattered plots with bivariate KDE contours overlapping the scatter points. The bivariate KDE plot estimates the probability density of two variables. The shaded contours represent different density levels. The plots below the diagonal are scattered plots with linear regressions among predictors. In the narrow penetration range, the distribution of I, N, and S is skewed, with a high correlation between N and S. In the medium penetration range, the distribution of all predictors is skewed with a high correlation of N with I and λ, respectively. The I and S distributions are skewed in the deep penetration range, whereas N and λ have two modes. Furthermore, all predictors are weakly correlated in the deep penetration range.

4. Proposed Model Using Symbolic Regression in Python

Symbolic regression is performed using gplearn [22], which executes genetic encoding in Python through a scikit-learn stimulated and reconcilable application programming interface (API). The hyperparameters used for symbolic regression in gplearn are listed in Table 3. The experimental dataset of 257 observations [2,8,10,13,14,15,16,19] as shown in Table 1, is further separated according to the penetration type. Datasets belonging to narrow, intermediate, and deep penetrations consist of 26, 59, and 174 data observations, respectively. Symbolic regression is performed separately for each dataset to obtain the underlying mathematical expressions to describe the best relationship. For intermediate and deep penetration datasets, 70% of data is used to construct the mathematical model (i.e., train the model), and 30% of data is used to test the mathematical model’s performance (i.e., test the model). Since data observations in the narrow penetration are small and consist of 26 data observations only, all data is used to construct the mathematical model. The hyperparameters used for symbolic regression in gplearn are shown in Table 3.
The mathematical model obtained for narrow, medium, and deep penetration datasets from symbolic regression is shown in the Figure 9, Figure 10 and Figure 11 as expression tress (ETs).
The proposed equations, obtained from symbolic regression, can be re-written in mathematical form, as follows.
x d = ( I 3 I N ) ( 1.179 3 I N )   for   x d < 0.5
x d = I 3 + ( I 1.0 ) ( N λ ) + 0.202   for   0.5 < x d < 5.0
x d = 0.5 I + 3.324   for   x d > 0.5

5. Results and Discussion

The mathematical model performances are shown in Figure 12, Figure 13 and Figure 14 and Table 4 for narrow, intermediate, and deep penetration, respectively. Table 4 shows the R2, MSE, MAE of proposed model in comparison with NDRC, and Li and Chen model. Figure 12a shows the comparison of the model-predicted values with the actual values of narrow penetration. The coefficient of determination, R2, is 0.59. Figure 12b illustrates the residual plot of predicted values. The residuals show a constant variance and are evenly spread out. The LOWESS (locally weighted scatterplot smoothing) fit is close to zero but it shows some divergence, as the variance is high at a high predicted value, which is, possibly, an outlier. The frequency distribution of residuals is shown in Figure 12c.
For the intermediate penetration data, Figure 13a compares model-predicted values with actual values. The prediction of the train and test datasets show that the model performs well on unseen test data. The coefficient of determination, R2, for all data is 0.88. The residuals of predicted values are evenly distributed, as seen in the Figure 13b,c, which shows constant variance. The LOWESS fit is near zero and does not display diversion at low or high predicted values, as seen in Figure 13b.
For deep penetration data, Figure 14a compares model-predicted values with actual values. The model performs well on unseen test datasets. The coefficient of determination, R2, for all data is 0.97. The residual of predicted values is evenly distributed at low or high predicted values, exhibiting a constant variance (Figure 14b,c). The LOWESS fit is close to zero, showing an absence of divergence at low or high predicted values.
Furthermore, Figure 15 shows the prediction of the proposed equation for narrow, medium, and deep penetrations compared to the Barr, NDRC, Li and Chen, and L equations. Figure 15a shows that the NDRC and Li and Chen models are almost not applicable in the narrow penetration depths. However, the present model can be useful, compared to other models with less accuracy, due to the complexity of penetration phenomena. Figure 15b,c shows that the proposed model for the prediction of X/d is more accurate, as compared to the NDRC and Li and Chen models within the range of 0.5 ≤ X/d < 5.0 and X/d ≥ 5.0.

6. Conclusions

The concrete penetration of rigid projectiles is a complex phenomenon that depends on several concrete strength parameters and projectiles. For centuries, continuous research has been conducted to predict penetration with respect to advanced tools and technology. In recent years, machine learning has evolved as an advanced statistical tool that is capable of solving complex phenomena, such as penetration, with acceptable accuracy. This research developed a new model that considers four genetic operations (crossover, sub-tree transfiguration, hoist transfiguration, and point transfiguration operations) using symbolic regression machine learning tools in Python to predict penetration and to compare with the well-established NDRC and Li and Chen models. The three equations are proposed for predicting X/d < 0.5, 0.5 ≤ X/d < 5.0, and X/d ≥ 5.0, respectively. The proposed equations show good relationships between test data and predicted X/d, with R2 = 0.88 for 0.5 ≤ X/d < 5.0, and R2 = 0.96 for X/d ≥ 5.0. Furthermore, the proposed model is also compared with the predictions of the NDRC and Li and Chen equations. The significance of this research shows that proposed equation predictions are more accurate than the NDRC and Li and Chen models within 0.5 ≤ X/d < 5.0 and X/d ≥ 5.0. In conclusion, it is recommended to use machine learning tools to achieve great accuracy in complex studies such as penetration, scabbing, and perforation.

Author Contributions

Conceptualization, Q.B.a.I.L. and A.M.; methodology, Z.M. and M.U.Q.; formal analysis, Z.M.; investigation, Z.M. and Q.B.a.I.L.; resources, Q.B.a.I.L., Z.A.M. and A.M.; writing—original draft preparation, Q.B.a.I.L. and Z.M.; writing—review and editing, M.U.Q. and Z.A.M.; visualization, Z.M. and M.U.Q.; supervision, Q.B.a.I.L. and A.M.; project administration, Q.B.a.I.L.; funding acquisition, Z.A.M. All authors have read and agreed to the published version of the manuscript. The data collection was conducted at the University of Nizwa, Oman. The data analysis was performed at Sohar University, Oman. The Model development was done at the University of Buraimi, Oman.

Funding

Prince Sultan University support paying the Article Processing Charges (APC) of this publication.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The article provides all data used in this research.

Acknowledgments

The authors would like to thank Prince Sultan University (PSU) for their financial support.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Previous studies equations for prediction of penetration depth with limitations.
Table A1. Previous studies equations for prediction of penetration depth with limitations.
ReferencesEquation in S.I. Unit
Petry model [1,3,5] x d = k M d 3 log 10 ( 1 + V o 2 19 , 974 )
Ballistic Research Laboratory (BRL) Model [1,3] x d = 1.33 × 10 3 f c ( M d 3 ) d 0.2 V o 1.33
Army Corp of Engineers (ACE model) [1,3,23] x d = 3.5 × 10 4 f c ( M d 3 ) d 0.2 V o 1.5 + 0.5
National Defense Research Committee (NDRC) Model [1,3,4,24] G = 3.8 × 10 5 N * M d f c ( V o d ) 1.8 G = ( x 2 d ) 2 x d ≤ 2
G = x d 1 x d > 2
x d = 2 G 0.5 G ≥ 1
x d = G + 1 G < 1
Ammann and Whitney model [1,3] x d = 6 × 10 4 f c N * ( M d 3 ) d 0.2 V o 1.8
Whiffen model [1,3,25] x d = ( 2.61 f c 0.5 ) ( M d 3 ) ( d a ) 0.1 ( V o 533.4 ) n n = 97.51 f c 0.25
Kar Model [1,3,26,27] G = 3.8 × 10 5 N * M d f c ( E E s ) 1.25 ( V o d ) 1.8 x d = 2 G 0.5 G ≥ 1
x d = G + 1 G < 1
UKAEA model [1,3,28] G = 3.8 × 10 5 N * M d f c ( V o d ) 1.8 x d = 0.275 [ 0.0756 G ] 0.5 G ≤ 0.0726
x d = [ 4 G 0.242 ] 0.5 0.0726 ≤ G ≤ 1.06
x d = G + 0.9395 G ≥ 1.06
G = 0.55 ( x d ) ( x d ) 2 x d < 0.22
G = ( x 2 d ) 2 + 0.0605 0.22     x d ≤ 2.0
G = x d 0.9395 x d ≥ 2.0
Haldar and Hamieh model [1,3,6] x d = 0.2251 I a + 0.0308 I a = M N * V o 2 f c d 3 0.3 ≤ Ia ≤ 4.0
x d = 0.0567 I a + 0.6740 4.0 ≤ Ia ≤ 21
x d = 0.0299 I a + 1.1875 21 ≤ Ia ≤ 455
Adeli and Amin Model [1,3] x d = 0.0416 + 0.1698 I a 0.0045 I a 2 I a = M N * V o 2 f c d 3 for 0.3 ≤ Ia ≤ 4
x d = 0.0123 + 0.196 I a 0.008 I a 2 + 0.0001 I a 3 4 ≤ Ia ≤ 21
Hughes Model [1,3,7] x d = 0.19 N h I h S I h = M V o 2 f t d 3 Ih < 3500
S = 1.0 + 12.3 l n ( 1.0 + 0.03 I h )
Healy and Weissman Model [1,3] G = 4.36 × 10 5 ( E E s ) N * M d f c ( V o d ) 1.8 x d = 2 G 0.5 G ≥ 1
x d = G + 1 G < 1
CREIPI Model [1,3,29] x d = 0.0265 N * M d 0.2 V o 2 [ 114 6.83 × 10 4 f c 2 3 ] f c 2 3 [ ( d + 1.25 H r ) H r ( d + 1.25 H o ) H o ]
UMIST model [1,3] x d = ( 2 π ) N * 0.72 M V o 2 σ t d 3
σ t ( P a ) = 4.2 f c ( P a ) + 135 × 10 6 + [ 0.014 f c ( P a ) + 0.45 × 10 6 ] V o
Li and Chen Model [1,3,8,10] x d = ( 1 + ( k π 4 N ) ) 1 + ( I N ) 4 k I π I = I * S = 1 S ( M V o 2 f c d 3 )
N = λ N * = 1 N * ( M l c d 3 )
S = 72 f c 0.5
k = ( 0.707 + h d )
x d ≤ 5
x d = 2 π N ln [ 1 + ( I N ) 1 + ( k π 4 N ) ] + k x d > 5
x d = 1.628 ( ( 1 + ( k π 4 N ) ) 1 + ( I N ) 4 k I π ) 1.395 x/d < 0.5
x d = 4 k I π 1 + ( I N ) If N » 1 for   x d k
x d = 2 π N ln ( 1 + I N ) + k 2 for x d > k
x d = 1.628 ( 4 k I π 1 + ( I N ) ) 1.395 x/d < 0.5
x d = 4 k I π When I/N « 1 x d k
x d = k 2 + 2 I π x d > k
x d = 1.628 ( 4 k π I ) 1.395 x/d < 0.5

References

  1. Li, Q.; Reid, S.; Wen, H.; Telford, A. Local impact effects of hard missiles on concrete targets. Int. J. Impact Eng. 2005, 32, 224–284. [Google Scholar] [CrossRef]
  2. Latif, Q.B.A.I.; Rahman, I.A.; Zaidi, A.M.A.; Latif, K. Critical impact energy for spalling, tunnelling and penetration of concrete slab impacted with hard projectile. KSCE J. Civ. Eng. 2014, 19, 265–273. [Google Scholar] [CrossRef]
  3. Rahman, I.A.; Ahmad Zaidi, A.M.; Imran Latif, Q.B. Review on Empirical Studies of Local Impact Effects of Hard Missile on Concrete Structures. Int. J. Sustain. Constr. Eng. Technol. (IJSCET) UTHM 2010, 1, 71–95. [Google Scholar]
  4. NDRC. Effects of Impact and Explosion; Summary Technical Report of Division 2; National Defence Research Committee: Washington, DC, USA, 1946; Volume 1. [Google Scholar]
  5. Kennedy, R.P. A review of procedures for the analysis and design of concrete structures to resist missile impact effects. Nucl. Eng. Des. 1976, 37, 183–203. [Google Scholar] [CrossRef]
  6. Haldar, A.; Hamieh, H.A. Local Effect of Solid Missiles on Concrete Structures. J. Struct. Eng. 1984, 110, 948–960. [Google Scholar] [CrossRef]
  7. Hughes, G. Hard missile impact on reinforced concrete. Nucl. Eng. Des. 1984, 77, 23–35. [Google Scholar] [CrossRef]
  8. Li, Q.M.; Chen, X.W. Dimensionless formulae for penetration depth of concrete target impacted by a non-deformable projectile. Int. J. Impact Eng. 2003, 28, 93–116. [Google Scholar] [CrossRef]
  9. Forrestal, M.; Altman, B.; Cargile, J.; Hanchak, S. An empirical equation for penetration depth of ogive-nose projectiles into concrete targets. Int. J. Impact Eng. 1994, 15, 395–405. [Google Scholar] [CrossRef]
  10. Chen, X.W.; Li, Q.M. Deep penetration of a non-deformable projectile with different geometrical characteristics. Int. J. Impact Eng. 2002, 27, 619–637. [Google Scholar] [CrossRef]
  11. Milad, A.; Hussein, S.H.; Khekan, A.R.; Rashid, M.; Al-Msari, H.; Tran, T.H. Development of ensemble machine learning approaches for designing fiber-reinforced polymer composite strain prediction model. Eng. Comput. 2021, 1–13. [Google Scholar] [CrossRef]
  12. Abdolrasol, M.G.M.; Hussain, S.M.S.; Ustun, T.S.; Sarker, M.R.; Hannan, M.A.; Mohamed, R.; Ali, J.A.; Mekhilef, S.; Milad, A. Artificial Neural Networks Based Optimization Techniques: A Review. Electronics 2021, 10, 2689. [Google Scholar] [CrossRef]
  13. Forrestal, M.J.; Frew, D.J.; Hanchak, S.J.; Brar, N.S. Penetration of grout and concrete targets with ogive-nose steel projectiles. Int. J. Impact Eng. 1996, 18, 465–476. [Google Scholar] [CrossRef] [Green Version]
  14. Frew, D.; Hanchak, S.; Green, M.; Forrestal, M. Penetration of concrete targets with ogive-nose steel rods. Int. J. Impact Eng. 1998, 21, 489–497. [Google Scholar] [CrossRef]
  15. Forrestal, M.; Frew, D.; Hickerson, J.; Rohwer, T. Penetration of concrete targets with deceleration-time measurements. Int. J. Impact Eng. 2003, 28, 479–497. [Google Scholar] [CrossRef]
  16. Frew, D.J.; Forrestal, M.J.; Hanchak, S.J. Penetration Experiments with Limestone Targets and Ogive-Nose Steel Projectiles. J. Appl. Mech. 2000, 67, 841–845. [Google Scholar] [CrossRef]
  17. Hosseini, M.; Dalvand, A. Neural Network Approach for Estimation of Penetration Depth in Concrete Targets by Ogive-nose Steel Projectiles. Lat. Am. J. Solids Struct. 2015, 12, 492–506. [Google Scholar] [CrossRef] [Green Version]
  18. Thai, D.-K.; Tu, M.; Bui, Q.; Bui, T.-T. Gradient tree boosting machine learning on predicting the failure modes of the RC panels under impact loads. Eng. Comput. 2019, 1, 3. [Google Scholar] [CrossRef]
  19. Ahmad Zaidi, A.M.; Imran Latif, Q.B.; Rahman, I.A.; Ismail, M.Y. Development of empirical prediction formula for penetration of ogive nose hard missile into concrete targets with effect of CRH ratio. Am. J. Eng. Appl. Sci. 2010, 7, 711–716. [Google Scholar]
  20. Duong, T.; Hazelton, M.L. Cross-validation Bandwidth Matrices for Multivariate Kernel Density Estimation. Scand. J. Stat. 2005, 32, 485–506. [Google Scholar] [CrossRef]
  21. Zambom, A.Z.; Dias, R. A review of Kernel density estimation with applications to econometrics. Int. Econom. Rev. 2013, 5, 20–42. [Google Scholar]
  22. Afzal, W.; Torkar, R. On the application of genetic programming for software engineering predictive modeling: A systematic review. Expert Syst. Appl. 2011, 38, 11984–11997. [Google Scholar] [CrossRef]
  23. Chelapati, C.V.; Kennedy, R.P.; Wall, I.B. Probabilistic assessment of hazard for nuclear structures. Nucl. Eng. Des. 1972, 19, 333–364. [Google Scholar] [CrossRef] [Green Version]
  24. Kennedy, R.P. Effects of an Aircraft Crash into a Concrete Reactor Containment Building; Holmes & Narver Inc.: Anaheim, CA, USA, 1966. [Google Scholar]
  25. Bulson, P. Explosive Loading of Engineering Structures; E & FN Spon: London, UK, 1997. [Google Scholar]
  26. Bangash, M.Y.H. Concrete and Concrete Structures: Numerical Modelling and Application; Elsevier Applied Science: London, UK, 1989. [Google Scholar]
  27. Kar, A.K. Local Effects of Tornado-Generated Missiles. J. Struct. Div. 1978, 104, 809–816. [Google Scholar] [CrossRef]
  28. Barr, P. Guidelines for the Design and Assessment of Concrete Structures Subjected to Impact; Report; UK Atomic Energy Authority, Safety and Reliability Directorate, HMSO: London, UK, 1990.
  29. Kojima, I. An experimental study on local behaviour of reinforced concrete slabs to missile impact. Nucl. Eng. Des. 1991, 130, 121–132. [Google Scholar] [CrossRef]
Figure 1. Penetration of concrete caused by ogive nose rigid projectile.
Figure 1. Penetration of concrete caused by ogive nose rigid projectile.
Applsci 12 02040 g001
Figure 2. (a) The schematic diagrams of crossover method genetic operations. (b) The schematic diagrams of sub-tree transfiguration genetic operations. (c) The schematic diagrams of hoist transfiguration, genetic operations. (d) The schematic diagrams of point transfiguration, genetic operations.
Figure 2. (a) The schematic diagrams of crossover method genetic operations. (b) The schematic diagrams of sub-tree transfiguration genetic operations. (c) The schematic diagrams of hoist transfiguration, genetic operations. (d) The schematic diagrams of point transfiguration, genetic operations.
Applsci 12 02040 g002aApplsci 12 02040 g002b
Figure 3. Flowchart of a genetic algorithm.
Figure 3. Flowchart of a genetic algorithm.
Applsci 12 02040 g003
Figure 4. Correlation among N, I, S, λ, and X/d using Python.
Figure 4. Correlation among N, I, S, λ, and X/d using Python.
Applsci 12 02040 g004
Figure 5. Box-and-whisker plot of N, I, S, and λ, in narrow, intermediate, and deep penetration using Python.
Figure 5. Box-and-whisker plot of N, I, S, and λ, in narrow, intermediate, and deep penetration using Python.
Applsci 12 02040 g005
Figure 6. Pair plot of N, I, and S, for narrow penetration data using Python.
Figure 6. Pair plot of N, I, and S, for narrow penetration data using Python.
Applsci 12 02040 g006
Figure 7. Pair plot of N, I, and S, for intermediate penetration data using Python.
Figure 7. Pair plot of N, I, and S, for intermediate penetration data using Python.
Applsci 12 02040 g007
Figure 8. Pair plot of N, I, and S, for deep penetration data using Python.
Figure 8. Pair plot of N, I, and S, for deep penetration data using Python.
Applsci 12 02040 g008
Figure 9. Model equation for narrow penetration, in expression tree form, identified by symbolic regression.
Figure 9. Model equation for narrow penetration, in expression tree form, identified by symbolic regression.
Applsci 12 02040 g009
Figure 10. Model equation for intermediate penetration, in expression tree form, identified by symbolic regression.
Figure 10. Model equation for intermediate penetration, in expression tree form, identified by symbolic regression.
Applsci 12 02040 g010
Figure 11. Model equation for deep penetration, in expression tree form, identified by symbolic regression.
Figure 11. Model equation for deep penetration, in expression tree form, identified by symbolic regression.
Applsci 12 02040 g011
Figure 12. Symbolic regression model for narrow penetration. (a) Comparison between actual and predicted values for all data, (b) residual plot of predicted values, and (c) frequency distribution of residuals.
Figure 12. Symbolic regression model for narrow penetration. (a) Comparison between actual and predicted values for all data, (b) residual plot of predicted values, and (c) frequency distribution of residuals.
Applsci 12 02040 g012
Figure 13. Symbolic regression model for intermediate penetration. (a) Comparison between actual and predicted values for train and test datasets, (b) residual plot of predicted values, and (c) frequency distribution of residuals.
Figure 13. Symbolic regression model for intermediate penetration. (a) Comparison between actual and predicted values for train and test datasets, (b) residual plot of predicted values, and (c) frequency distribution of residuals.
Applsci 12 02040 g013
Figure 14. Symbolic regression model for deep penetration. (a) Comparison between actual and predicted values for train and test datasets, (b) residual plot of predicted values, and (c) frequency distribution of residuals.
Figure 14. Symbolic regression model for deep penetration. (a) Comparison between actual and predicted values for train and test datasets, (b) residual plot of predicted values, and (c) frequency distribution of residuals.
Applsci 12 02040 g014
Figure 15. Comparison of performance with different equations for (a) narrow penetration, (b) medium penetration, and (c) deep penetration.
Figure 15. Comparison of performance with different equations for (a) narrow penetration, (b) medium penetration, and (c) deep penetration.
Applsci 12 02040 g015
Table 1. Dimensionless data with penetration depths for regression analysis.
Table 1. Dimensionless data with penetration depths for regression analysis.
λSNI(X/d)testλSNI(X/d)test
15.221143.414.459.835.3111.815.310.660.86
15.221143.436.5524.155.3111.045.310.780.91
15.221143.447.2827.795.3112.415.311.331.22
15.221143.454.7332.045.3112.075.311.251.29
15.221143.493.7749.545.3111.815.311.361.31
15.221143.4133.1365.795.3111.045.311.161.29
15.22120012.58.5910.7512.4110.751.471.51
15.22120035.9424.1510.7512.0710.751.431.73
15.22120054.7333.9810.7511.8110.751.451.58
15.22120085.0751.3210.7511.0410.751.371.58
15.221200118.6766.5610.7512.4110.752.772.36
19.6412125.98.456.4310.7512.0710.752.712.89
19.7312126.517.3311.5210.7511.8110.752.422.27
19.661212618.9315.2810.7511.0410.752.292.36
19.7712126.729.0217.846.1210.816.122.411.45
19.7312126.532.6219.526.1211.396.121.651.47
19.6212125.836.5527.16.1211.866.120.711
19.5312125.233.619.076.1210.86.121.71.5
19.5712125.543.4822.573.1411.393.140.350.65
19.6212125.846.0223.053.1411.173.140.440.77
19.5312125.264.0232.193.1411.173.141.391.1
19.612125.676.4535.615.8510.775.851.911.25
19.917127.623.1513.126.3410.776.341.161.2
19.727126.424.714.286.3411.196.342.541.65
19.937127.825.8516.25
19.877127.425.3415.6914.4515144.511.663.15
19.917127.639.8323.4214.415144.032.294.07
19.767126.738.3522.4912.9811.26121.913.773.94
14.4415135.653.425.51
15.215.2143.421.9513.1614.3115134.433.425.91
15.215.2143.434.6219.3512.9611.26121.695.054.99
15.215.2143.456.334.8312.9311.26237.716.478.01
15.215.2143.475.0842.5714.4715266.014.867.61
15.215.2143.49658.0512.9711.26121.796.555.91
15.215.2143.4118.2465.7914.515136.155.368.14
15.215.220020.2813.1614.2815134.126.629.58
15.215.220039.4720.914.4715135.896.669.06
15.215.220054.4531.7319.6412125.698.466.43
15.215.220076.944.1212.9711.26121.839.086.96
15.215.220099.9558.8214.5815136.916.949.97
15.215.2200128.3868.1114.4515135.689.4112.6
24.848.6234.321.4314.7814.4915136.099.6112.34
24.848.6234.339.6323.6514.4915136.099.7112.21
24.848.6234.371.3137.4414.4615135.789.7113.39
24.848.6234.390.7246.812.9711.26238.3813.3712.99
24.848.6234.3103.0945.3213.0211.26122.2313.8912.34
24.848.6234.3110.9746.3119.917127.4423.1513.12
24.5210.5231.317.2812.1319.727126.1824.714.28
24.5210.5231.320.9513.7719.877127.1625.3416.25
24.5210.5231.331.2918.3619.947127.5825.9315.69
24.5210.5231.344.6425.5724.6410.5231.4117.3612.13
24.5210.5231.368.0934.4314.4715266.0712.2616.4
24.5210.5231.370.9940.3324.848.6233.3121.4214.78
24.5210.5231.385.3146.2314.5415136.512.3215.49
24.5210.5231.3107.2357.3824.638.7231.321.9714.14
24.5210.5231.3120.2964.2624.617.9231.1324.5115.08
24.5210.5231.3151.9266.5619.7312126.2517.3311.52
24.5210.5230.2620.9513.77
24.638.7232.421.9714.1419.6612125.8318.9315.28
24.638.7232.441.9224.1914.8420.2194.9112.958.51
24.638.7232.474.741.3815.1921199.5112.58.59
24.638.7232.4114.564.0419.767126.4638.3522.49
24.638.7232.4151.8578.3319.917127.4439.8323.42
24.638.7232.470.3735.9614.8420.2139.3414.9810.06
24.638.7232.4111.1257.1415.1921142.6314.459.83
24.638.7232.4152.6471.9214.8415.2194.9120.2213.16
24.617.9232.224.515.0824.5210.5230.2631.2818.36
24.617.9232.242.2125.914.8415.2139.3421.8813.16
24.617.9232.277.9140.3324.617.9231.1342.2125.9
24.617.9232.2118.8563.9324.848.6233.3139.6323.65
24.617.9232.2121.7864.2619.7712126.5229.0217.84
24.617.9232.2171.1587.5424.638.7231.341.8524.19
19.7312126.2532.6219.52
39.6911.0239.690.180.7119.531212533.619.07
3.4811.13.480.150.5619.6212125.5536.5527.1
3.4811.13.480.150.6624.5610.5230.6944.7125.57
2.4511.12.450.150.4119.5712125.2743.4822.57
3.4811.13.480.170.6114.8415.2139.3434.5219.35
2.4511.12.450.150.3419.6212125.5546.0223.05
2.4512.222.450.241.3114.8415.2194.9139.3720.9
2.9312.222.930.150.3224.638.7231.370.3735.96
2.4512.222.450.170.4124.848.6233.3171.3137.44
2.9412.222.940.20.7824.617.9231.1378.4240.33
3.4812.223.480.270.7324.639.04231.368.7749.75
3.4812.223.480.220.4924.639.04231.369.8160.39
2.4512.222.450.30.5724.638.7231.374.741.38
2.4512.222.450.080.0724.5810.5230.8468.2434.43
2.9412.222.940.30.5424.5210.5230.2670.9840.33
3.4811.343.480.31.4714.8420.2194.9137.2423.99
2.4511.342.450.330.9515.1921199.5135.9324.15
2.9411.342.940.10.114.8420.2139.3437.8823.99
2.9411.342.940.220.4415.1921142.6336.5524.15
2.4511.762.450.40.7519.531212564.0232.19
13.0411.7613.040.380.524.848.6233.3190.7246.8
4.611.764.60.250.6614.8415.2194.9154.2931.73
2.4511.762.450.270.2614.8415.2139.3456.1234.83
13.0411.7613.040.372.1524.848.6233.31103.0745.32
2.4511.762.450.10.2124.5610.5230.6985.4646.23
4.611.764.60.110.3619.612125.4176.4535.61
0.8310.60.830.090.3224.617.9231.13116.9364.26
1.6311.671.630.20.9524.617.9231.13118.8663.93
0.8312.130.830.161.0424.848.6233.31110.9446.31
0.6911.250.690.080.5424.617.9231.13121.7964.26
0.6911.410.690.040.1324.638.7231.3111.1257.14
1.0511.11.050.050.3414.8420.2139.3448.8527.86
0.5310.60.530.060.2315.1921142.6347.1427.79
0.9511.410.950.280.3424.638.7231.3114.564.04
0.9510.740.950.350.5524.510.5230.12107.1557.38
0.711.670.70.240.514.8415.2139.3474.8542.57
0.711.250.70.35114.8420.2139.3456.7331.73
0.5611.030.560.140.514.8420.2194.9156.7334.06
96.1514.2896.155.253.615.1921142.6354.7432.04
96.1514.5196.1510.975.815.1921199.5154.7433.98
96.6312.2996.631.141.214.8415.2194.9176.6744.12
96.6310.9996.632.091.624.6610.5231.56121.0264.26
96.6310.9696.632.23224.638.7231.3151.8578.33
96.6311.1496.631.921.724.638.7231.3152.6471.92
5.0211.135.020.040.0924.617.9231.13171.1687.54
512.6750.070.2514.8415.2139.3495.758.05
512.1750.31.1324.617.9231.13185.7292.79
512.3450.230.3814.8415.2194.9199.6558.82
5.0512.745.050.390.5624.5610.5230.69152.1866.56
5.5615.315.560.030.0614.8420.2194.9188.1451.08
5.6513.935.650.030.0515.1921199.5185.0551.32
5.6513.935.650.060.0414.8415.2139.34117.8865.79
5.6112.95.610.10.1214.8415.2194.91127.9968.11
5.6513.935.650.140.1414.8420.2139.3497.1849.54
10.4613.9310.460.060.0615.1921142.6393.7749.54
10.4613.9310.460.10.0614.8420.2194.91122.9666.56
5.3112.415.310.830.9514.8420.2139.34137.9765.79
5.3112.075.310.791.02
Table 2. Descriptive statistics of N, I, S, and λ in narrow, intermediate, and deep penetrations.
Table 2. Descriptive statistics of N, I, S, and λ in narrow, intermediate, and deep penetrations.
StatisticsIndependent Variables
INλS
NarrowIntermediateDeepNarrowIntermediateDeepNarrowIntermediateDeepNarrowIntermediateDeep
Count2659174265917426591742659174
Mean0.121.1960.053.8322.29182.813.8314.2019.9612.2411.7412.75
Std0.0741.1544.292.6039.8547.242.6025.937.301.240.894.55
Cov0.620.970.740.681.790.260.681.830.370.100.080.36
Min0.030.083.420.530.5696.150.530.5612.9310.6010.747.00
25%0.060.3023.152.453.14135.942.453.1415.1911.3411.108.70
50%0.100.7945.372.945.31194.912.945.3119.6511.9911.6712.00
75%0.151.6890.725.4310.75231.305.4310.7524.6112.8412.1515.20
Max0.285.25185.7210.46144.51266.0710.4696.6396.1515.3115.0021.00
Std: standard deviation; Cov: coefficient of variation; 25%: 25th percentile (i.e., 25 percent of data is below this value); 50%: 50th percentile; 75%: 75th percentile.
Table 3. The hyperparameters for symbolic regression in gplearn.
Table 3. The hyperparameters for symbolic regression in gplearn.
ParameterValue
EQ 1EQ 2EQ 3
population size500050005000
generations 606060
stopping_criteria0.010.010.01
p_crossover0.90.70.7
p_subtree_mutation0.010.010.1
p_hoist_mutation0.010.050.05
p_point_mutation0.010.10.1
function_set+, −, ×, ÷+, −, ×, ÷, √+, −, ×, ÷
tournament size252525
parsimony_coefficient0.00030.0020.003
metricMAEMAEMAE
const_range(−5, 5)(−5, 5)(−5, 5)
The following is an explanation of the hyperparameters: population size: number of mathematical formulas in each generation; generations: maximum number of generations; stopping_criteria: MAE value that program stops; p_crossover: crossover probability; p_subtree_mutation: subtree mutation probability; p_hoist_mutation: hoist mutation probability; p_point_mutation: point mutation probability; function_set: building blocks containing mathematical operators; parsimony_coefficient: a constant that penalizes large individuals by adjusting their MAE to make them less favorable for selection; metric: measures how well an individual fits; const_range: the range of constants included in the model.
Table 4. Statistics of previous studies compared to the proposed study.
Table 4. Statistics of previous studies compared to the proposed study.
MetricComparison of Performance between Different Equations
NDRC Barr Li and Chen Sym. Reg.a (Present Study)
Narrow penetration (X/d < 0.5)
R2−3.2620.145−0.0310.590
MSE0.0850.0170.0210.008
MAE0.2700.0970.1180.068
Intermediate penetration (0.5 ≤ X/d < 5)
R20.7460.6500.7460.884
MSE0.1030.1420.2310.106
MAE0.2220.2610.3300.216
Deep penetration (X/d ≥ 5)
R20.565-0.9630.967
MSE199.369-16.87715.087
MAE11.295-2.7992.470
a Equation (1) for narrow penetration, Equation (2) for intermediate penetration, and Equation (3) for deep penetration.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Imran Latif, Q.B.a.; Memon, Z.A.; Mahmood, Z.; Qureshi, M.U.; Milad, A. A Machine Learning Model for the Prediction of Concrete Penetration by the Ogive Nose Rigid Projectile. Appl. Sci. 2022, 12, 2040. https://doi.org/10.3390/app12042040

AMA Style

Imran Latif QBa, Memon ZA, Mahmood Z, Qureshi MU, Milad A. A Machine Learning Model for the Prediction of Concrete Penetration by the Ogive Nose Rigid Projectile. Applied Sciences. 2022; 12(4):2040. https://doi.org/10.3390/app12042040

Chicago/Turabian Style

Imran Latif, Qadir Bux alias, Zubair Ahmed Memon, Zafar Mahmood, Mohsin Usman Qureshi, and Abdalrhman Milad. 2022. "A Machine Learning Model for the Prediction of Concrete Penetration by the Ogive Nose Rigid Projectile" Applied Sciences 12, no. 4: 2040. https://doi.org/10.3390/app12042040

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop