Author of the publication

Feasibility of Output-Only Modal Identification Using Wireless Sensor Network: A Quantitative Field Experimental Study.

, , , and . IJDSN, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering-driven evolutionary algorithms: an application of path relinking to the quadratic unconstrained binary optimization problem., , , , and . J. Heuristics, 25 (4-5): 629-642 (2019)DeepDDK: A Deep Learning based Oral-Diadochokinesis Analysis Software., , , , , , and . BHI, page 1-4. IEEE, (2019)A Distributed Object Tracing System., , , , , and . IWNAS, page 29-35. IEEE Computer Society, (2006)Multiple query-dependent RankSVM aggregation for document retrieval., , , , and . CIDM, page 1-6. IEEE, (2011)Carriers Selection for Content Dissemination in Social Opportunistic Networks., , and . CIC, page 235-243. IEEE, (2015)Revisiting Optimistic Fair Exchange Based on Ring Signatures., , and . IEEE Trans. Information Forensics and Security, 9 (11): 1883-1892 (2014)An Algorithm for Finding Parameter Dependent: Connected Components of Gray Images., and . PICS, page 380-385. IS&T - The Society for Imaging Science and Technology, (1998)Non-stationary noise estimation using dictionary learning and Gaussian mixture models., , and . Image Processing: Algorithms and Systems, volume 9019 of SPIE Proceedings, page 90190L. SPIE, (2014)Cheap and Available State Machine Replication., and . USENIX Annual Technical Conference, page 265-279. USENIX Association, (2016)Key-leakage evaluation of authentication in quantum key distribution with finite resources., , , , and . Quantum Information Processing, 13 (4): 935-955 (2014)