Xiangning Lin
[1] A.G. Phadke & J.S. Thorp, Computer relaying for powersystems (New York: John Wiley & Sons Inc., 1988). [2] GEC-Alsthom Measurement Ltd., Protective relays applica-tion guide (London/Wisbech: Balding & Mansell, 1987). [3] W. Wang & B. Hou, The theoretical foundation of large-scale generator-transformer set relays (Beijing: China PowerPublisher, 1994). [4] J. Serra, Image analysis and mathematical morphology (Lon-don: Academic Press, 1982), ISBN: 0126372403. [5] H.J.A.M. Heijmans, Morphological image operators (NewYork: Academic Press, 1994). [6] F. Chen & P.A. Kelly, Algorithms for generating and seg-menting morphologically smooth binary images, Proc. 26thConf. Information Sciences and Systems, Princeton, NJ, 1992,902–906. [7] D.J. Zhang, Q. Li, J.F. Zhang, Q.H. Wu, & D.R. Turner, Im-proving the accuracy of single-ended transient fault locators12using mathematical morphology, IEEE International Confer-ence on Power System Technology, Kunming, China, 2002,241–245. [8] X. Lin, L. Zou, Q. Tian, H. Weng, & P. Liu, A series mul-tiresolution morphological gradient-based criterion to identifyCT saturation, IEEE Transactions on Power Delivery, 21(3),2006, 1169–1175. [9] AC machine models, Real-time digital simulator power systemuser’s manual, 2001, REV. 6.1–6.52. [10] Current transformers, Real-time digital simulator power sys-tem user’s manual, 2001, REV. 7.14–7.19.
Important Links:
Go Back