2009
DOI: 10.12989/sem.2009.32.6.787
|View full text |Cite
|
Sign up to set email alerts
|

Experimental deployment and validation of a distributed SHM system using wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2011
2011

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…After an integer (M) multiple of 2 h periods At the reference sensor node t = 2 h × 60 min h −1 × 60 s min −1 t = M × 2 h × 60 min h −1 × 60 s min −1 At the ith sensor node t i = t + α i t + δt i t i = t + α i t + δt i TSE at the beginning of next block of data sensing TSE = t i − t = α i × 2 × 60 × 60 s + δt i TSE = t i − t = α i × M × 2 × 60 × 60 s + δt i measurement points in a SHM system becomes quite feasible with WSNs. Researchers have successfully implemented these networks with a variety of damage detection strategies on several systems [4][5][6][7][8][9].…”
Section: After the First 2 Hmentioning
confidence: 99%
See 1 more Smart Citation
“…After an integer (M) multiple of 2 h periods At the reference sensor node t = 2 h × 60 min h −1 × 60 s min −1 t = M × 2 h × 60 min h −1 × 60 s min −1 At the ith sensor node t i = t + α i t + δt i t i = t + α i t + δt i TSE at the beginning of next block of data sensing TSE = t i − t = α i × 2 × 60 × 60 s + δt i TSE = t i − t = α i × M × 2 × 60 × 60 s + δt i measurement points in a SHM system becomes quite feasible with WSNs. Researchers have successfully implemented these networks with a variety of damage detection strategies on several systems [4][5][6][7][8][9].…”
Section: After the First 2 Hmentioning
confidence: 99%
“…To this end, effective damage detection algorithms must be integrated into these SHM systems. 4 Author to whom any correspondence should be addressed.…”
Section: Introductionmentioning
confidence: 99%