Your selections:
- Hasan, M. M., Hossain, Shakhawat, Mofijur, M., Kabir, Zobaidul, Badruddin, Irfan Anjum, Khan, T. M. Yunus, Jassim, Esam
- Sambasivam, Kavitha Munisamy, Kuppan, Praveen, Laila, Lafiya Shanavas, Shashirekha, Viswanaathan, Tamilarasan, Krishnamurthi, Abinandan, Sudharsanam
Optimizing the Spatial Nonuniformity of Irradiance in a Large-Area LED Solar Simulator
- Al-Ahmad, Alaa, Holdsworth, John, Vaughan, Benjamin, Belcher, Warwick, Zhou, Xiaojing, Dastoor, Paul
Gas transition: Renewable hydrogen's future in eastern Australia's energy networks
- Gurieff, Nicholas, Moghtaderi, Behdad, Daiyan, Rahman, Amal, Rose
A Combined Deep Learning and Ensemble Learning Methodology to Avoid Electricity Theft in Smart Grids
- Aslam, Zeeshan, Javaid, Nadeem, Ahmad, Ashfaq, Ahmed, Abrar, Lecathelinais, Christophe, Gulfam, Sardar Muhammad
Performance comparison and current challenges of using machine learning techniques in cybersecurity
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay, Hameed, Ibrahim A., Chen, Shan, Liu, Dongxi, Li, Jiaming
Renewable Energy Equivalent Footprint (REEF): a method for envisioning a sustainable energy future
- Ward, James, Mohr, Steve, Costanza, Robert, Sutton, Paul, Coscieme, Luca
- Jalalabadi, Tahereh, Moghtaderi, Behdad, Allen, Jessica
Kinetics of solid-gas reactions and their application to carbonate looping systems
- Fedunik-Hofman, Larissa, Bayon, Alicia, Donne, Scott W.
Short-term load forecasting in smart grids: an intelligent modular approach
- Ahmad, Ashfaq, Javaid, Nadeem, Mateen, Abdul, Awais, Muhammad, Khan, Zahoor Ali
Effect of summer ventilation on the thermal performance and energy efficiency of buildings utilizing phase change materials
- Zhang, Yi, Cui, Hongzhi, Tang, Waiching, Sang, Guochen, Wu, Hong
Flexible multi-objective transmission expansion planning with adjustable risk aversion
- Qiu, Jing, Zhao, Junhua, Wang, Dongxiao
Two-stage coordinated operational strategy for distributed energy resources considering wind power curtailment penalty cost
- Qiu, Jing, Zhao, Junhua, Wang, Dongxiao, Zheng, Yu
Quantitative vulnerability assessment of cyber security for distribution automation systems
- Ye, Xiaming, Zhao, Junhua, Zhang, Yan, Wen, Fushan
Are you sure you would like to clear your session, including search history and login status?