Abstract: Data-driven methods present a promising approach to extracting security boundaries in transient security-constrained optimal power flow (TSCOPF) for modern power systems. Nevertheless, with ...
Abstract: Emerging low-energy computing technologies, in particular approximate computing, are becoming increasingly relevant in key applications. A significant use case for these technologies is ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果