Author of the publication

Enhanced Dynamic Dual-Latent Variable Model for Multirate Process Monitoring and Its Industrial Application.

, , , and . IEEE Trans. Instrum. Meas., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Application of Computer Technology to Clinical Practice Guideline Implementation: A Scoping Review., , , , , , , , , and 1 other author(s). J. Medical Syst., 48 (1): 6 (December 2024)Identify Silent Data Corruption Vulnerable Instructions Using SVM., and . IEEE Access, (2019)DELTA: A DEep learning based Language Technology plAtform., , , , , , , , , and 13 other author(s). CoRR, (2019)Make Imbalance Useful - An Energy-Efficient Charging Scheme in Wireless Sensor Networks., , and . ICPCA/SWS, volume 8351 of Lecture Notes in Computer Science, page 160-171. Springer, (2013)Schedulability decision of charging missions in wireless rechargeable sensor networks., and . SECON, page 450-458. IEEE, (2014)Minimizing the number of mobile chargers in a large-scale wireless rechargeable sensor network., and . WCNC, page 1297-1302. IEEE, (2015)A novel sine-curve mobility model for intrusion detection in wireless sensor networks., , and . Wirel. Commun. Mob. Comput., 13 (17): 1555-1570 (2013)Predicting the Silent Data Corruption Vulnerability of Instructions in Programs., and . ICPADS, page 862-869. IEEE, (2019)Reaching Consensus for SDN Multi-controller Networks., and . HCC, volume 11956 of Lecture Notes in Computer Science, page 443-457. Springer, (2019)Applying Bourdieu's Practice Theory to Social Commerce: toward a Dynamic Process-Oriented Research Framework., , , and . CONF-IRM, page 35. (2019)