-
1
-
2by Sekaran, Kamini Kousalya, 1981-“... estimation are used for realtime security analysis, optimal power flow, etc. These are also used...”
Published 2008
Get access
Thesis -
3by Yan, Junjie, 1982-“..., further architectural optimizations are certainly possible. --Security analysis is an important concern...”
Published 2007
Get access
Text