Your selections:
Multi-source cyber-attacks detection using machine learning
- Taheri, Sona, Gondal, Iqbal, Bagirov, Adil, Harkness, Greg, Brown, Simon, Chi, Chihung
Past and future ecosystem change in the coastal zone
- Islam, Syed, Maxwell, Shawn, Hossain, Kamal, Park, Sung-Yeul, Park, Sungmin
Performance monitoring of a PMU in a microgrid environment based on IEC 61850-90-5
- Kumar, Shantanu, Das, Narottam, Islam, Syed
Exploiting user provided information in dynamic consolidation of virtual machines to minimize energy consumption of cloud data centers
- Khan, Anit, Paplinski, Andrew, Khan, Abdul, Murshed, Manzur, Buyya, Rajkumar
High performance communication redundancy in a digital substation based on IEC 62439-3 with a station bus configuration
- Kumar, Shantanu, Das, Narottam, Islam, Syed
- Mohseni, Bahar, Hashemnia, Naser, Islam, Syed
Mobile malware detection - An analysis of the impact of feature categories
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq
A triangulation-based technique for building boundary identification from point cloud data
- Awrangjeb, Mohammad, Lu, Guojun
Voltage profile modification in harmonically affected power networks
- Yengejeh, Hadi, Islam, Syed, Galvani, Sadjad
- Zhao, Zhongyong, Islam, Syed, Hashemnia, Naser, Hu, Di, Yao, Chenguo
Analysis of power system communication architectures between substations using IEC 61850
Enhancing the effectiveness of local descriptor based image matching
- Hossain, Md Tahmid, Teng, Shyh, Zhang, Dengsheng, Lim, Suryani, Lu, Guojun
Disconnection time and sequence of rooftop PVs under short-circuit faults in low voltage networks
- Yengejeh, Hadi, Shahnia, Farhad, Islam, Syed
Software implementation of two seamless redundant topologies in a digital protection system based on IEC 62439-3
- Kumar, Shantanu, Das, Narottam, Islam, Syed
Power transformer winding fault analysis using transfer function
- Kalpana, Patel, Das, Narottam, Abu Siada, Ahmed, Islam, Syed
OEE improvement of thermoforming machines through application of TPM at Tibaldi Australasia
- Chundhoo, Vickram, Chattopadhyay, Gopinath, Gunawan, Indra, Ibrahim, Yousef
A new control approach to improve the overall performance of DFIG-based WECS
- Khamaira, Mahmoud, Abu-Siada, Ahmed, Islam, Syed, Masoum, Mohammad
LeSiNN : Detecting anomalies by identifying least similar nearest neighbours
- Pang, Guansong, Ting, Kaiming, Albrecht, David
- Kumar, Shantanu, Das, Narottam, Muigai, John, Islam, Syed
Are you sure you would like to clear your session, including search history and login status?