Author of the publication

Adaptive-critic-based control of a synchronous generator in a power system using biologically inspired artificial neural networks.

, , , , and . IJCNN, page 1-8. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on conservation planning for beijing old city based on RS and GIS., , , , and . IGARSS, page 1488-1491. IEEE, (2005)Compositional time Petri nets and reduction rules., , and . IEEE Trans. Syst. Man Cybern. Part B, 30 (4): 562-572 (2000)KDM Security for Identity-Based Encryption: Constructions and Separations., , , and . IACR Cryptol. ePrint Arch., (2016)Non-Malleable Functions and Their Applications., , , , and . IACR Cryptol. ePrint Arch., (2015)KDM security for identity-based encryption: Constructions and separations., , , and . Inf. Sci., (2019)Causal Discovery for Climate Research Using Graphical Models, and . Journal of Climate, 25 (17): 5648 - 5665 (2012)Heuristic Path Pruning Algorithm Based on Error Handling Pattern Recognition in Detecting Vulnerability., , , , and . COMPSAC Workshops, page 95-100. IEEE Computer Society, (2013)A Framework for Implementing Role-Based Access Control Using CORBA Security Service., and . ACM Workshop on Role-Based Access Control, page 19-30. ACM, (1999)Applying Aspect-Orientation in Designing Security Systems: A Case Study., , , , , and . SEKE, page 360-365. (2004)A user-centric network communication broker for multimedia collaborative computing., , , , and . Multimedia Tools Appl., 50 (2): 335-357 (2010)