Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Incorporation of blockchain technology for different smart grid applications: Architecture, prospects, and challenges
Smart grid integrates computer, communication, and sensing technologies into existing
power grid networks to achieve significant informatization-related advantages. It will provide …
power grid networks to achieve significant informatization-related advantages. It will provide …
A comprehensive review on recent developments of hosting capacity estimation and optimization for active distribution networks
Recently, several types of distributed energy resources (DERs) have been developed to
reduce the environmental impact and support the global demand for electrical energy …
reduce the environmental impact and support the global demand for electrical energy …
[HTML][HTML] Blockchain-enabled smart grid applications: Architecture, challenges, and solutions
The conventional electrical grid is undergoing substantial growth for reliable grid operation
and for more efficient and sustainable energy use. The traditional grid is now …
and for more efficient and sustainable energy use. The traditional grid is now …
Emerging technologies and design aspects of next generation cyber physical system with a smart city application perspective
Abstract The Cyber Physical System (CPS) is a disruptive technology that has combined the
burgeoning technologies from various domains. The CPS is continuously evolving with the …
burgeoning technologies from various domains. The CPS is continuously evolving with the …
Deep reinforcement learning-based adaptive voltage control of active distribution networks with multi-terminal soft open point
The integration of highly penetrated distributed generators (DGs) aggravates the rise of
voltage violations in distribution networks. Connected by multi-terminal soft open points (M …
voltage violations in distribution networks. Connected by multi-terminal soft open points (M …
Real-time joint regulations of frequency and voltage for tso-dso coordination: A deep reinforcement learning-based approach
The increasing scale of distributed energy resources (DERs) in the active distribution
network (ADN) offers valuable opportunities for distribution system operators (DSOs) to …
network (ADN) offers valuable opportunities for distribution system operators (DSOs) to …
Boost distribution system restoration with emergency communication vehicles considering cyber-physical interdependence
Enhancing restoration capabilities of distribution systems is one of the main strategies for
resilient power systems to cope with extreme events. However, most of the existing studies …
resilient power systems to cope with extreme events. However, most of the existing studies …
Tunnel magnetoresistance-based noncontact current sensing and measurement method
J Li, H Liu, T Bi - IEEE Transactions on Instrumentation and …, 2022 - ieeexplore.ieee.org
The dynamic characteristics of power systems have become increasingly complex with the
growing application of power electronics equipment. A high level of real-time monitoring is …
growing application of power electronics equipment. A high level of real-time monitoring is …
Phase identification of low-voltage distribution network based on stepwise regression method
Y Yi, S Liu, Y Zhang, Y Xue, W Deng… - Journal of Modern …, 2023 - ieeexplore.ieee.org
Accurate information for consumer phase connectivity in a low-voltage distribution network
(LVDN) is critical for the management of line losses and the quality of customer service. The …
(LVDN) is critical for the management of line losses and the quality of customer service. The …
A secure forecasting-aided state estimation framework for power distribution systems against false data injection attacks
As a critical session of cyber-energy system operation, the state estimation (SE) is becoming
more vulnerable to various malicious cyber-attacks like false data injection attacks (FDIAs) …
more vulnerable to various malicious cyber-attacks like false data injection attacks (FDIAs) …