Author of the publication

An Optimized Third Harmonic Injection Method for Reducing DC-Link Voltage Fluctuation and Alleviating Power Imbalance of Three-Phase Cascaded H-Bridge Photovoltaic Inverter.

, , , , , and . IEEE Trans. Ind. Electron., 67 (4): 2488-2498 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Computation Offloading With Edge for 5G-Envisioned Internet of Connected Vehicles., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (8): 5213-5222 (2021)Accurate Modeling of the Effective Parasitic Parameters for the Laminated Busbar Connected With Paralleled SiC MOSFETs., , , , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 68 (5): 2107-2120 (2021)Reshaping 3D facial scans for facial appearance modeling and 3D facial expression analysis., , , , , , , and . Image Vis. Comput., 30 (10): 750-761 (2012)Cooperative Edge Computing With Sleep Control Under Nonuniform Traffic in Mobile Edge Networks., , , and . IEEE Internet Things J., 6 (3): 4295-4306 (2019)A Model Predictive Control-Based Common-Mode Voltage Suppression Strategy for Voltage-Source Inverter., , , , and . IEEE Trans. Ind. Electron., 63 (10): 6115-6125 (2016)A Modified Hybrid Modulation Strategy for Suppressing DC Voltage Fluctuation of Cascaded H-Bridge Photovoltaic Inverter., , , , , and . IEEE Trans. Ind. Electron., 65 (5): 3932-3941 (2018)Energy efficient hybrid satellite terrestrial 5G networks with software defined features., , , , , and . J. Commun. Networks, 19 (2): 147-161 (2017)Poster: Cluster analysis based traffic prediction method from real traffic traces in LTE networks., , , , and . ChinaCom, page 646-647. IEEE, (2014)Optimization of collaborating secondary users in a cooperative sensing under noise uncertainty., , , and . PIMRC, page 2502-2506. IEEE, (2013)Locating Vulnerability in Binaries Using Deep Neural Networks., , , , and . IEEE Access, (2019)