Author of the publication

Research on Day-Ahead Scheduling Strategy of the Power System Includes Wind Power Plants and Photovoltaic Power Stations Based on Big Data Clustering and Filling.

, , , , , , , and . ICBDS, volume 1796 of Communications in Computer and Information Science, page 25-36. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A lower bound on the 2-adic complexity of modified Jacobi sequence., , and . CoRR, (2017)Composition Stoichiometry of Cs2AgBiBr6 Films for Highly Efficient Lead-Free Perovskite Solar Cells, , , , , , , , and . Nano Letters, 19 (3): 2066--2073 (February 2019)Shallow-Water Bottom Target Detection Based on Time, Frequency Dispersive Channel and Adaptive Beamforming Algorithm., and . LSMS (1), volume 4688 of Lecture Notes in Computer Science, page 561-570. Springer, (2007)Review of Web caching and replication by Michael Rabinovich and Oliver Spatscheck. Addison Wesley 2002., and . SIGMOD Record, 32 (4): 107-108 (2003)A feedback-based construction of multilayer measurement matrix for compressive sensing., , , , and . I2MTC, page 1-6. IEEE, (2017)Performance Assessment of Adaptive AF Relay with Active Antenna System and Angle Estimation Strategy., , , , and . VTC Fall, page 1-5. IEEE, (2013)RaFFD: Resource-aware Fast Foreground Detection in embedded smart cameras., , , and . GLOBECOM, page 481-486. IEEE, (2012)Area-efficient FPGA logic elements: Architecture and synthesis., and . ASP-DAC, page 369-375. IEEE, (2011)Research on Network Malicious Code Detection and Provenance Tracking in Future Network., , , and . QRS Companion, page 264-268. IEEE, (2018)Compositional inverses, complete mappings, orthogonal Latin squares and bent functions., and . CoRR, (2014)