Author of the publication

Extended Prony Analysis on Power System Oscillation Under a Near-Resonance Condition.

, , , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast multicast scheme with secure network coding in cloud data centers., , , , , and . Comput. Sci. Inf. Syst., 13 (2): 531-545 (2016)Accurate Power Sharing and Synthetic Inertia Control for DC Building Microgrids With Guaranteed Performance., , , , , and . IEEE Access, (2019)CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency., and . ISC, volume 9290 of Lecture Notes in Computer Science, page 319-335. Springer, (2015)A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity.. Future Gener. Comput. Syst., (2018)Ship detection for Radarsat-2 ScanSAR data using DoG scale-space., , , , , and . IGARSS, page 1881-1884. IEEE, (2013)A Resilient Power System Operation Strategy Considering Transmission Line Attacks., , , , , and . IEEE Access, (2018)Vague color image enhancement on fractional differential and improved retinex., , , , and . Color Imaging: Displaying, Processing, Hardcopy, and Applications, volume 9395 of SPIE Proceedings, page 93950Q. SPIE, (2015)Fuzzy games with communication networks., , , and . GAMENETS, page 1-4. IEEE, (2014)Multi-Sensor Registration in High-Precision CMM Based on a Composite Standard., , , , , , and . Sensors, 18 (4): 1220 (2018)Leakage resilient CCA secure IBE with all-but-one lossy filter.. Int. J. Ad Hoc Ubiquitous Comput., 21 (4): 266-272 (2016)