Author of the publication

Risk Assessment of Cascading Outages in Power Systems Using Fuzzy Neural Network.

, , , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 1422-1427. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Timer Trigger Parameter Tuning Method of Primary Frequency Regulation for BESS., , , , , and . ISGT, page 1-5. IEEE, (2020)Design of Self-adaptive Single Neuron Facts Controllers Based on Genetic Algorithm., , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 1332-1337. Springer, (2006)Communication-Free Distributed Charging Control for Electric Vehicle Group., , , , and . IEEE Trans. Smart Grid, 15 (3): 3028-3039 (May 2024)Low Voltage Risk Assessment in Power System Using Neural Network Ensemble., , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 1416-1421. Springer, (2006)Parallel Transient Stability-Constrained Optimal Power Flow Using GPU as Coprocessor., , and . IEEE Trans. Smart Grid, 8 (3): 1436-1445 (2017)Robust Transient Stability Emergency Control Considering Wind Power Uncertainties., , , and . IEEE Access, (2023)Application of Multi-objective Evolutionary Algorithm in Coordinated Design of PSS and SVC Controllers., , , and . CIS (1), volume 3801 of Lecture Notes in Computer Science, page 1106-1111. Springer, (2005)Recent Developments on Applications of Neural Networks to Power Systems Operation and Control: An Overview., , , and . ISNN (2), volume 3174 of Lecture Notes in Computer Science, page 188-193. Springer, (2004)Data-Driven Transient Stability Boundary Generation for Online Security Monitoring., , and . CoRR, (2020)Risk Assessment of Cascading Outages in Power Systems Using Fuzzy Neural Network., , , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 1422-1427. Springer, (2006)