Personensuche
X
?
2024 9th International Conference on Electronic Technology and Information Science (ICETIS) ,
1
A New DC Decoupling-Based DC Bus Voltage Optimisation Strat..:
, In:
?
2024 9th International Conference on Electronic Technology and Information Science (ICETIS) ,
2
Voltage Control Strategy for Energy Router Storage Ports Ba..:
, In:
?
2024 3rd Conference on Fully Actuated System Theory and Applications (FASTA) ,
3
Operational Flexibility Enhancement with Aggregated Electri..:
, In:
?
2024 3rd Conference on Fully Actuated System Theory and Applications (FASTA) ,
4
PMSM Speed Control Based on Fully Actuated Systems Theory:
, In:
?
2024 36th Chinese Control and Decision Conference (CCDC) ,
5
Parameterized Design of Impact-Angle-Constraints Guidance L..:
, In:
?
2024 6th International Conference on Energy Systems and Electrical Power (ICESEP) ,
6
Fault Diagnosis of DC Charging Pile Based on Convolutional ..:
, In:
?
2023 8th International Conference on Power and Renewable Energy (ICPRE) ,
7
Harmonic Compensation Analysis of Grid-Connected System Hav..:
, In:
?
2023 8th International Conference on Power and Renewable Energy (ICPRE) ,
8
Power Oscillation Suppression Method for Multi-Parallel Syn..:
, In:
?
2023 8th International Conference on Power and Renewable Energy (ICPRE) ,
9
Current Harmonic Suppression Method Based on SVHC and Impro..:
, In:
?
2022 10th International Symposium on Next-Generation Electronics (ISNE) ,
10
A real scene interactive augmented reality glasses based on..:
, In:
?
2023 8th International Conference on Power and Renewable Energy (ICPRE) ,
11
Coordinated Control Method of Power Oscillation Suppression..:
, In:
?
2023 8th International Conference on Power and Renewable Energy (ICPRE) ,
12
Control Strategy of Voltage Compensation with Harmonics for..:
, In:
?
2022 China Automation Congress (CAC) ,
13
Terminal Impact-angle-constrained Guidance Law of Miniature..:
, In:
?
2022 41st Chinese Control Conference (CCC) ,
14
Three-stage Trajectory Planning and Control of Miniature Mu..:
, In:
?
Lecture Notes in Computer Science; Information and Communications Security ,
15