Author of the publication

Time Reverse Modeling of Damage Detection in Underwater Concrete Beams Using Piezoelectric Intelligent Modules.

, , , , and . Sensors, 20 (24): 7318 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design a flexible surgical instrument for robot-assisted minimally invasive surgery., , , and . ROBIO, page 260-264. IEEE, (2016)RFID reader-to-reader collision avoidance model with multiple-density tag distribution solved by artificial immune network optimization., , , , and . Appl. Soft Comput., (2015)Conceptual Graph Matching for Semantic Search., , , and . ICCS, volume 2393 of Lecture Notes in Computer Science, page 92-196. Springer, (2002)Segmentation of overlapping chromosome images using U-Net with improved dilated convolutions., , , , , , and . J. Intell. Fuzzy Syst., 40 (3): 5653-5668 (2021)Adaptive hierarchical artificial immune system and its application in RFID reader collision avoidance., , , and . Appl. Soft Comput., (2014)A Parallel Genetic Algorithm with GPU Accelerated for Large-scale MDVRP in Emergency Logistics., , and . CSE, page 602-605. IEEE Computer Society, (2011)Trajectory Planning for Digital Camouflage Spray Painting Robot Based on Projection Method., , , , and . ICIRA (1), volume 11740 of Lecture Notes in Computer Science, page 221-230. Springer, (2019)Comparative performance analysis of various artificial immune networks applied to RFID reader-to-reader collision avoidance., , , , and . Appl. Soft Comput., (2015)RFID reader anti-collision algorithm using adaptive hierarchical artificial immune system., , , and . Expert Syst. Appl., 41 (5): 2126-2133 (2014)A Neural Network Model for a Hierarchical Spatio-temporal Memory., , , , , , and . ICONIP (1), volume 5506 of Lecture Notes in Computer Science, page 428-435. Springer, (2008)