Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Anti-islanding techniques for integration of inverter-based distributed energy resources to the electric power system
The emergence of microgrids and the increasing adoption of Distributed Generation
Systems (DGS) have created an opportunity to replace traditional fossil fuels with renewable …
Systems (DGS) have created an opportunity to replace traditional fossil fuels with renewable …
On optimal PMU placement-based defense against data integrity attacks in smart grid
State estimation plays a critical role in self-detection and control of the smart grid. Data
integrity attacks (also known as false data injection attacks) have shown significant potential …
integrity attacks (also known as false data injection attacks) have shown significant potential …
Analysis of scada security using penetration testing: A case study on modbus tcp protocol
J Luswata, P Zavarsky, B Swar… - 2018 29th Biennial …, 2018 - ieeexplore.ieee.org
This paper presents an insight into attacks on Supervisory Control and Data Acquisition
(SCADA) systems specifically focusing on systems that use the Modbus TCP protocol. A …
(SCADA) systems specifically focusing on systems that use the Modbus TCP protocol. A …
[HTML][HTML] Smart fault monitoring and normalizing of a power distribution system using IoT
Conventional outage management practices in distribution systems are tedious and
complex due to the long time taken to locate the fault. Emerging smart technologies and …
complex due to the long time taken to locate the fault. Emerging smart technologies and …
Challenges and opportunities of computational intelligence in industrial control system (ics)
Artificial intelligence (AI) is not a fancy term anymore, or not limited to only researchers and
academia. AI is currently becoming a part and parcel of our daily life, we are using …
academia. AI is currently becoming a part and parcel of our daily life, we are using …
STPGTN–A Multi-Branch Parameters Identification Method Considering Spatial Constraints and Transient Measurement Data.
S Zhang, L Weng - CMES-Computer Modeling in …, 2023 - search.ebscohost.com
Abstract Transmission line (TL) Parameter Identification (PI) method plays an essential role
in the transmission system. The existing PI methods usually have two limitations:(1) These …
in the transmission system. The existing PI methods usually have two limitations:(1) These …
Enhanced feeder reconfiguration in primary distribution networks using backtracking search technique
ABSTRACT The Backtracking Search (BS) technique is a new evolutionary optimiser which
simply prepared to make use of the previous populations. It has been employed to solve the …
simply prepared to make use of the previous populations. It has been employed to solve the …
A computational intelligence system identifying cyber-attacks on smart energy grids
According to the latest projections of the International Energy Agency, smart grid
technologies have become essential to handling the radical changes expected in …
technologies have become essential to handling the radical changes expected in …
Segdensenet: Iris segmentation for pre-and-post cataract surgery
Cataract is one of the major ophthalmic diseases worldwide which can potentially affect the
performance of iris-based biometric systems. While existing research has shown that …
performance of iris-based biometric systems. While existing research has shown that …
Using honeypots for ICS threats evaluation
Abstract Industrial Control System (ICS) is an integration of hardware and software with a
sophisticated network connection that supports instrumentation in industry. These systems …
sophisticated network connection that supports instrumentation in industry. These systems …