Author of the publication

Transmission Line Overload Risk Assessment for Power Systems With Wind and Load-Power Generation Correlation.

, , , , and . IEEE Trans. Smart Grid, 6 (3): 1233-1242 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perspectives in Engineering Web-Enabled Electronic Commerce Systems.. PACIS, page 35. AISeL, (2000)Design of a Dendritic Cells inspired Model Based on Danger Theory for Intrusion Detection System., , and . ICNSC, page 1137-1141. IEEE, (2008)Face Detection using BP Network Combined with Gabor Wavelet Transform., and . SNPD, page 526-529. IEEE Computer Society, (2008)A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Particle Swarm Optimization and Cuckoo Search., , , and . TrustCom/BigDataSE/ISPA (1), page 1298-1305. IEEE, (2015)Coordinating processor and main memory for efficientserver power control., , and . ICS, page 130-140. ACM, (2011)Light Curve Properties of Supernovae Associated With Gamma-ray Bursts, and . (Jul 13, 2014)Stock Cloud Computing Platform: Architecture and Prototype Systems., , , , , , and . WAIM Workshops, volume 7901 of Lecture Notes in Computer Science, page 360-370. Springer, (2013)A new conception of image texture and remote sensing image segmentation based on Markov random field., , , , and . Geo-spatial Information Science, 13 (1): 16-23 (2010)Two-Stage Sampling Method for Social Media Bigdata., and . ICNC-FSKD, volume 1075 of Advances in Intelligent Systems and Computing, page 313-320. Springer, (2019)Effects analysis of model parameters uncertainties on battery SOC estimation using H-infinity observer., , , , and . ISIE, page 1647-1653. IEEE, (2014)