Sign in

Event-Triggered Vulnerable Relay Identification and Supervision to Prevent Zone-3 Mal-Operations.

Manas Kumar JenaBijaya Ketan Panigrahi
Published in: IEEE Syst. J. (2019)
Keyphrases
  • event detection
  • real time
  • person identification
  • active learning
  • event recognition
  • data sets
  • information retrieval
  • search engine
  • computer vision
  • information systems
  • e learning
  • news stories
  • event sequences