Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple resource expansion planning in smart grids with high penetration of renewable generation., , , , and . SmartGridComm, page 564-569. IEEE, (2012)Overcoming Geoinformatic Knowledge Fence: An Exploratory of Intelligent Geospatial Data Preparation within Spatial Analysis., , , and . ICCS (2), volume 5545 of Lecture Notes in Computer Science, page 385-394. Springer, (2009)No One Can Escape: A General Approach to Detect Tampered and Generated Image., , , , and . IEEE Access, (2019)URL Based Gateway Side Phishing Detection Method., , , and . Trustcom/BigDataSE/ISPA, page 268-275. IEEE, (2016)Torque Ripple Minimization of Predictive Torque Control for PMSM With Extended Control Set., , , , and . IEEE Trans. Ind. Electron., 64 (9): 6930-6939 (2017)Generalized Predictive Contour Control of the Biaxial Motion System., , , , and . IEEE Trans. Ind. Electron., 65 (11): 8488-8497 (2018)Output Feedback Stabilization for a Scalar Conservation Law with a Nonlocal Velocity., and . SIAM J. Math. Anal., 45 (5): 2646-2665 (2013)Load Shaping Strategy Based on Energy Storage and Dynamic Pricing in Smart Grid., , , and . IEEE Trans. Smart Grid, 5 (6): 2868-2876 (2014)CT Image of Liver Cancer Enhancement Using Wavelet Transform., , , , , and . WAA, page 263-268. World Scientific, (2003)VulAware: Towards Massive-Scale Vulnerability Detection in Cyberspace., , , , , and . MLICOM, volume 251 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 144-149. Springer, (2018)