All Stories

  1. Coordinated electric vehicle scheduling using time-of-use scheme and priority charging
  2. Risk-ranking matrix for security patching of exploitable vulnerabilities
  3. Improvement of speed response in four-phase DC–DC converter switching using two shunt voltage-source