Author of the publication

Reserve indicator with security and stability constraints taken into account for power system security assessment.

, , , , and . ICIT, page 540-544. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A vision-based fully-automatic calibration method for hand-eye serial robot., , , and . Ind. Robot, 42 (1): 64-73 (2015)Synchronous Fingerprint Acquisition System Based on Total Internal Reflection and Optical Coherence Tomography., , , , , , and . IEEE Trans. Instrum. Meas., 69 (10): 8452-8465 (2020)CeHAR: CSI-Based Channel-Exchanging Human Activity Recognition., , , and . IEEE Internet Things J., 10 (7): 5953-5961 (April 2023)Knowledge-Based Control and Optimization of Blast Furnace Gas System in Steel Industry., , and . IEEE Access, (2017)Bayesian multi-distribution-based discriminative feature extraction for 3D face recognition., , , and . Inf. Sci., (2015)Semantically guided self-supervised monocular depth estimation., , , , and . IET Image Process., 16 (5): 1293-1304 (2022)Oriented boundary padding for iterative and oriented fringe pattern denoising techniques., , , , , and . Signal Process., (2014)Global Fixed-Time Sliding Mode Trajectory Tracking Control Design for the Saturated Uncertain Rigid Manipulator., , , , and . Axioms, 12 (9): 883 (September 2024)Counting crowd flow based on feature points., , and . Neurocomputing, (2014)Lightning: Leveraging DVFS-induced Transient Fault Injection to Attack Deep Learning Accelerator of GPUs., , , , , , and . ACM Trans. Design Autom. Electr. Syst., 29 (1): 14:1-14:22 (January 2024)