Author of the publication

Influence of co-processing of coal and oil shale on combustion characteristics, kinetics and ash fusion behaviour

, , , , , , , , and . Energy, (2021)
DOI: 10.1016/j.energy.2020.119229

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finite element analysis of superplastic blow forming of fine-grained magnesium alloy sheet., , , and . EMEIT, page 1650-1653. IEEE, (2011)Multi-objective optimization integration of query interfaces for the Deep Web based on attribute constraints., , , and . Data Knowl. Eng., (2013)BIT at TREC 2010 Blog Track: Faceted Blog Distillation., , , and . TREC, Special Publication 500-294, National Institute of Standards and Technology (NIST), (2010)Reconstruct Logical Hierarchical Sitemap for Related Entity Finding., , , and . TREC, Special Publication 500-294, National Institute of Standards and Technology (NIST), (2010)An Intelligent Outlier Detection Method With One Class Support Tucker Machine and Genetic Algorithm Toward Big Sensor Data in Internet of Things., , , and . IEEE Trans. Industrial Electronics, 66 (6): 4672-4683 (2019)Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters., , , , , , , and . Inf. Sci., (2019)Exact Finite-Difference Schemes for d-Dimensional Linear Stochastic Systems with Constant Coefficients., , , and . J. Applied Mathematics, (2013)RF-DYMHC: detecting the yeast meiotic recombination hotspots and coldspots by random forest model using gapped dinucleotide composition features., , , , , and . Nucleic Acids Research, 35 (Web-Server-Issue): 47-51 (2007)Personalized Context-aware Re-ranking for E-commerce Recommender Systems., , , , , , , , , and . CoRR, (2019)Centralized keyword search on encrypted data for cloud applications., , , , and . Security and Communication Networks, 9 (18): 5064-5084 (2016)