-
1
-
2
-
3
-
4
-
5
Cost Recovery for Variable-Speed Pumped Storage Power Plants in the Market Environment
Published 2025-01-01Get full text
Article -
6
Constructing Attention-LSTM-VAE Power Load Model Based on Multiple Features
Published 2024-01-01Get full text
Article -
7
Application of wireless LoRa in multi-service state grid e-ubiquitous power internet of things
Published 2020-09-01“…The “multi-service state grid e-ubiquitous power internet of things” proposed by the State Grid Corporation of China is the integration and evolution of the energy network and the internet of things,and is a key energy infrastructure serving the majority of users.With the rise of the power internet of things strategy,the online monitoring and acquisition nodes and monitoring scale of transmission lines will increase rapidly.What kind of technical system will be used to construct the on-site communication network? …”
Get full text
Article -
8
Performance Evaluation of FSO Communications under Sand-Dust Conditions
Published 2019-01-01Get full text
Article -
9
Target-Aware Deep Feature Compression for Power Intelligent Inspection Tracking
Published 2022-01-01Get full text
Article -
10
The Impact Mechanism and Scenario Simulation of Energy Internet on Transition
Published 2021-01-01Get full text
Article -
11
-
12
On the Step Type of Continuous Propagating Positive Leader in Laboratory‐Scale Long Spark Discharges
Published 2022-06-01Get full text
Article -
13
Intelligent adjustment for power system operation mode based on deep reinforcement learning
Published 2024-12-01Get full text
Article -
14
A Comprehensive Analysis of Supervised Learning Techniques for Electricity Theft Detection
Published 2021-01-01“…A public dataset from the State Grid Corporation of China (SGCC) was used for this study. …”
Get full text
Article -
15
Adversarial measurements for convolutional neural network-based energy theft detection model in smart grid
Published 2025-03-01“…Our proposed attack is validated with State Grid Corporation of China (SGCC) dataset.ADGM and FGSM attack models generate adversarial evasion attack samples by modifying the benign sample along with already available malicious data. …”
Get full text
Article