IEEE Access最新文献

筛选
英文 中文
An Attention-Based Residual U-Net for Tumour Segmentation Using Multi-Modal MRI Brain Images 基于注意力的残差U-Net多模态MRI脑图像肿瘤分割
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-01-13 DOI: 10.1109/ACCESS.2025.3528654
Najme Zehra Naqvi;K. R. Seeja
{"title":"An Attention-Based Residual U-Net for Tumour Segmentation Using Multi-Modal MRI Brain Images","authors":"Najme Zehra Naqvi;K. R. Seeja","doi":"10.1109/ACCESS.2025.3528654","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3528654","url":null,"abstract":"Detecting brain tumours is challenging due to the complex brain anatomy and wide range of tumour sizes, shapes, and locations. A crucial stage in diagnosing and treating brain tumours is automatically segmenting the tumour area from brain MRI. It involves the precise delineation of tumour boundaries within MRI scans, which helps to understand the tumour’s extent, monitor its growth, plan treatment strategies, and assess treatment response over time. Hence, this research proposes a novel automated deep-learning approach based on U-Net for segmenting Glioma tumours. The basic U-Net model is enhanced with several components to improve its performance in the proposed model. The U-Net’s encoder has an improved MCA (Multi-scale Context Attention) module designed to extract and collect rich spatial contextual information from the input image. The proposed U-Net’s decoder uses a Squeeze and Excitation module and residual blocks. The residual blocks help reduce network degradation and gradient disappearance, enabling the model to retain important information during decoding. The Squeeze and Excitation module allows the model to retrieve high-level semantic properties and a high level of spatial context, which have been collected from the encoder module and IMCA-Block. The performance of proposed model is evaluated on two datasets BraTS 2020 and BraTS 2018. The experiments on both datasets demonstrate that the proposed framework enhances multi-modal MRI brain tumour segmentation performance on all metrics evaluated. For BraTS 2020 it achieved Dice Coefficient of 0.9978, 0.9378 and 0.9478 for WT (Whole tumour), TC (Tumour core), and ET (Enhancing Tumour) respectively and for BraTS 2018 it achieved Dice Coefficient 98.32, 93.32 and 92.32 for WT (Whole tumour), TC (Tumour core), and ET (Enhancing Tumour) respectively.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"10240-10251"},"PeriodicalIF":3.4,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10838527","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Auxiliary Vector Synthesis for Expanding Linear Modulation Range With the Ability to Eliminate CMV Spikes in the SVM Three-Phase Inverters 扩大线性调制范围的新型辅助矢量合成,消除支持向量机三相逆变器中的CMV尖峰
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-01-13 DOI: 10.1109/ACCESS.2025.3528514
Jin Huang;Kaicheng Li
{"title":"New Auxiliary Vector Synthesis for Expanding Linear Modulation Range With the Ability to Eliminate CMV Spikes in the SVM Three-Phase Inverters","authors":"Jin Huang;Kaicheng Li","doi":"10.1109/ACCESS.2025.3528514","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3528514","url":null,"abstract":"Some strategies are used to reduce the high output common-mode voltage (CMV) in three-phase inverters with the space-vector modulation (SVM). However, these reduced CMV (RCMV) strategies may still lead to high spikes in some cases. The traditional auxiliary vectors are used to eliminate the CMV spikes in some RCMV strategies, which have the lower total harmonic distortion (THD) in RCMV SVMs. This paper proposes a new auxiliary vector synthesis SVM (NAVSSVM) strategy. In the NAVSSVM, the new auxiliary vectors are a set of vectors with variable angles. Compared to the use of traditional auxiliary vectors, the new auxiliary vector synthesis expands the linear modulation range of the inverter to the maximum when the modulation index <inline-formula> <tex-math>$M_{a}~gt 1$ </tex-math></inline-formula>. Through optimization, the optimal NAVSSVM is found to expand the modulation region without the CMV spikes in the low <inline-formula> <tex-math>$M_{a}$ </tex-math></inline-formula>. In addition, the NAVSSVM strategy maintains the low THD characteristic of the auxiliary vector synthesis method. The feasibility and effectiveness of the NAVSSVM are verified by the simulations and experiments in a three-phase inverter.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"10265-10276"},"PeriodicalIF":3.4,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10838499","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effects of Multipath on the Performance of High Rate Digital QAM and OFDM Wireless Link Operating in Tunnels 隧道中多径对高速数字QAM和OFDM无线链路运行性能的影响
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-01-13 DOI: 10.1109/ACCESS.2025.3528645
Yehuda Taragin;Niv Elkayam;Gad A. Pinhasi;Yosef Pinhasi
{"title":"The Effects of Multipath on the Performance of High Rate Digital QAM and OFDM Wireless Link Operating in Tunnels","authors":"Yehuda Taragin;Niv Elkayam;Gad A. Pinhasi;Yosef Pinhasi","doi":"10.1109/ACCESS.2025.3528645","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3528645","url":null,"abstract":"Wide-band wireless communication in tunnels and long corridors faces challenges due to multipath interferences and delay spread. Wall reflections induce dispersion, causing amplitude and phase distortions in the received signal, with the extent of distortion determined by multiple factors. Accurate modeling of space-frequency effects is essential for designing reliable indoor wireless links. This study presents an experimentally validated, precise, and versatile model for the propagation of modulated wireless signals in tunnels. Quasi-optical, multi-ray model is employed to derive the transfer function, describing the indoor propagation in the frequency domain. The model enables analysis of the impact of changes among other in modulations, frequencies, and different bandwidths. The results include a comprehensive comparison of various cases for Bit Error Rate (BER), Error Vector Magnitude (EVM), constellations, and facilitating a thorough examination of the tunnel effects in each scenario. Several representative results are presented in the paper. Notably, a significant correlation is observed between the bandwidth used and an increase in BER. Furthermore, the comparison between Orthogonal Frequency Division Multiplexing (OFDM) and Quadrature Amplitude Modulation (QAM) reveals a distinct preference for OFDM due to its ability to overcome the frequency-selective fading nature of the tunnel.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"9995-10008"},"PeriodicalIF":3.4,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10838561","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Bayesian Optimization in Gripper Design for Effective Grasping 贝叶斯优化在有效抓取夹具设计中的应用
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-01-13 DOI: 10.1109/ACCESS.2025.3528643
Marco Todescato;Dominik T. Matt;Andrea Giusti
{"title":"Application of Bayesian Optimization in Gripper Design for Effective Grasping","authors":"Marco Todescato;Dominik T. Matt;Andrea Giusti","doi":"10.1109/ACCESS.2025.3528643","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3528643","url":null,"abstract":"Despite many recent technological advancements, grasping remains a challenging open problem in robotic manipulation. In contrast with most research which focuses equipping grippers with varying degree of intelligence, we approach grasping from a gripper design perspective, aiming to find the best tool for grasping a specific set of objects. Building on our previous work, this paper reviews a suitable parametrization for the geometry of two common families of industrial grippers and presents a grasp score beneficial for gripper design. We then formally cast the problem of finding the best gripper parametrization within a probabilistic framework, addressing it using Bayesian Optimization tools. Numerical results on a set of industrial objects demonstrate the effectiveness of the approach showing up to <inline-formula> <tex-math>$approx 300 %$ </tex-math></inline-formula> improvement compared to the performance obtained using a fixed set of grippers.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"10215-10226"},"PeriodicalIF":3.4,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10838536","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hypergraph-Based Organizers’ Behavior Scheduling Optimization: High-Order Relationships Discovery 基于超图的组织者行为调度优化:高阶关系发现
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-01-13 DOI: 10.1109/ACCESS.2025.3528651
Ziqi Xu;Huiqi Zhang
{"title":"Hypergraph-Based Organizers’ Behavior Scheduling Optimization: High-Order Relationships Discovery","authors":"Ziqi Xu;Huiqi Zhang","doi":"10.1109/ACCESS.2025.3528651","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3528651","url":null,"abstract":"In the context of organizers’ behavior scheduling optimization, accurately assessing and optimizing scheduling programs is essential. This paper introduces HyperFusion, a framework designed to enhance scheduling efficiency through hypergraph learning techniques and an adaptive feature fusion model tailored to organizers’ behavioral patterns. The model categorizes and evaluates scheduling methods by identifying peer groups of organizers who share similar behavioral and operational attributes. Addressing challenges such as variability in scheduling approaches across different environments and the availability of diverse behavioral data, HyperFusion utilizes hypergraph-based feature fusion to identify high-quality scheduling and behavioral features that reflect each organizer’s unique scheduling style and operational impact. Employing a probabilistic model, the framework represents each organizer’s attributes in a latent space, enabling a nuanced understanding of their contributions. A large-scale hypergraph is constructed to map relationships and similarities among organizers, identifying dense subgraphs or “circles” of organizers with shared attributes. By mining these high-order relationships within these “organizer circles”, HyperFusion enhances scheduling quality and provides adaptive fusion of behavioral features, optimizing the scheduling process to meet the objectives of high-order relationship discovery. Experiments conducted on a dataset of organizers from 36 prominent institutions (our complied data set) demonstrate the model’s effectiveness in improving scheduling programs, underscoring its capability to align scheduling practices with adaptive, data-driven optimization and fostering a responsive and efficient scheduling system.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"10277-10288"},"PeriodicalIF":3.4,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10838518","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Post-Quantum Cryptography Migration in Vehicles 后量子密码在车辆中的迁移研究
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-01-13 DOI: 10.1109/ACCESS.2025.3528562
Nils Lohmiller;Sabrina Kaniewski;Michael Menth;Tobias Heer
{"title":"A Survey of Post-Quantum Cryptography Migration in Vehicles","authors":"Nils Lohmiller;Sabrina Kaniewski;Michael Menth;Tobias Heer","doi":"10.1109/ACCESS.2025.3528562","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3528562","url":null,"abstract":"The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. The adoption of quantum-safe algorithms takes place at a vastly different pace in different industries. In some industries, adoption processes are slow due to the required adaptation of regulations and standards. At the same time, long-lived products with non-PQC algorithms are more likely to become insecure during their lifetime. Vehicles are a prime example of long-lived products where the adoption of PQC proceeds slowly. When quantum computers are able to break relevant key lengths of asymmetric cryptography and, thus, render current vehicle systems insecure, vehicles that are developed and produced today will most likely remain in use. In this work, we provide a structured and comprehensive overview of the current migration state of PQC algorithms in the automotive area. We address use cases involving asymmetric cryptography in the automotive context that face the challenge of adapting PQC, such as internal vehicle networks, manufacturer-specific communication, and vehicle-to-everything communication. In addition, we review the standards concerning vehicle security and their relevance to PQC. Finally, we identify and discuss open research challenges regarding the adoption of PQC in the automotive domain and further steps towards quantum-safe vehicles.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"10160-10176"},"PeriodicalIF":3.4,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10838531","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inducing and Assessing Acute Mental Stress in Controlled Conditions: Topical Review and Guidelines for Effective Experimental Protocols 在控制条件下诱导和评估急性精神应激:局部回顾和有效实验方案指南
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-01-13 DOI: 10.1109/ACCESS.2025.3528518
Matteo Raggi;Lee J. Moore;Luca Mesin
{"title":"Inducing and Assessing Acute Mental Stress in Controlled Conditions: Topical Review and Guidelines for Effective Experimental Protocols","authors":"Matteo Raggi;Lee J. Moore;Luca Mesin","doi":"10.1109/ACCESS.2025.3528518","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3528518","url":null,"abstract":"Mental health is influenced by the fast-paced nature of life. In this scenario, stressful events play an important role. Extensive research has been carried out to develop non-invasive devices for stress detection, which primarily use physiological data and, more recently, artificial intelligence algorithms. When developing either a new device or algorithm, tests in controlled environments are preferred, because of the supervision of possible confounding factors while running the experiments. However, because of the extremely subjective perception of stress, the characteristics of the investigated samples, and the conditions under which the experiment is conducted, the data may not be representative of a perceived stressful condition, leading to biases. Given the importance of reliable experimental protocols for stress induction, especially if cortisol level is not monitored, this work aims to present approaches for inducing and assessing acute mental stress in controlled conditions, analyzing the problem from engineering and psychological perspectives. All the phases of the experimental protocol are discussed, examining both the factors that could induce stress and the assessment tools, like questionnaires and physiological signals. The analysis of the latter will be focused on the exogenous factors that may compromise the measures, providing solutions for their mitigation. With this work, researchers with different backgrounds can improve the efficacy of their studies, limiting biases and misleading results.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"10022-10042"},"PeriodicalIF":3.4,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10838533","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rotation-Invariant Convolution With Point Sort and Curvature Radius for Point Cloud Classification and Segmentation 基于点排序和曲率半径的旋转不变卷积在点云分类和分割中的应用
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-01-13 DOI: 10.1109/ACCESS.2025.3528435
Zhao Shen;Xin Jia;Jinglei Zhang
{"title":"Rotation-Invariant Convolution With Point Sort and Curvature Radius for Point Cloud Classification and Segmentation","authors":"Zhao Shen;Xin Jia;Jinglei Zhang","doi":"10.1109/ACCESS.2025.3528435","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3528435","url":null,"abstract":"Recently, the distance-based and angle-based geometric descriptors and local reference axes have been used widely to explore the rotation invariance of point clouds. However, they tend to encounter with two challenges. (i) Similar distances and angles among different points would lead to ambiguous descriptions of local regions. (ii) Establishing a local reference axis may reduce the number of neighbor points, resulting in information loss in local regions. To this end, a Rotation-invariant Convolution with Point Sorting and Curvature Radius <inline-formula> <tex-math>$text {(RCPC)}$ </tex-math></inline-formula> is proposed. Firstly, to solve the challenge (i), a neighbor point sorting module <inline-formula> <tex-math>$text {(NPS)}$ </tex-math></inline-formula> is introduced. Neighbor points on the local tangent disk are sorted according to the local reference axis at the first step. When neighbor points occlude each other along the local reference axis direction, NPS calculates the Euclidean distances from the sampling point to each neighbor point. With these distances, neighbor points in the local region are reorganized to establish multiple triangles to retain as much information. To solve the challenge (ii), a curvature-based geometric descriptor <inline-formula> <tex-math>$text {(CGD)}$ </tex-math></inline-formula> is developed. It calculates the Euclidean distance and angle between the points within established triangles. Further, the CGD constructs a curvature circle for each triangle and calculate the curvature radius which is highly sensitive to small local shape changes. Even Euclidean distances and angles are similar, the CGD can maintain high uniqueness for local regions. Experiments on ModelNet40, ScanObjectNN, and ShapeNet have proved that the proposed approach outperforms other state-of-the-art methods.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"10432-10446"},"PeriodicalIF":3.4,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10838555","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Behaviors and Multienergy Coupling Through Distributed Energy Storage in the Peer-to-Peer Market Mechanism 点对点市场机制下分布式储能的合作行为与多能耦合
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-01-13 DOI: 10.1109/ACCESS.2025.3529205
Zeynep Tanis;Ali Durusu
{"title":"Cooperative Behaviors and Multienergy Coupling Through Distributed Energy Storage in the Peer-to-Peer Market Mechanism","authors":"Zeynep Tanis;Ali Durusu","doi":"10.1109/ACCESS.2025.3529205","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3529205","url":null,"abstract":"The integration of distributed energy storage systems into multienergy systems has garnered significant attention due to the increased use of renewable energy sources and the demand for improved energy management. This study explores the concept of multienergy coupling by facilitating energy storage through a peer-to-peer marketplace. An innovative peer-to-peer market structure is proposed, supported by advanced algorithms, to enable direct energy trading among prosumers. Key challenges are addressed through a systematic methodology, encompassing user registration, multienergy systems involving electricity, heat, and gas, storage cost optimization, multienergy trading, and blockchain-based transactions. A consortium blockchain-based framework ensures secure and private registration. A peer-to-peer network facilitates multienergy trading, enabling efficient energy generation and storage. A storage virtualization model is developed to minimize storage costs, and a nonlinear programming multiobjective model optimizes battery energy storage. For multienergy trading, Nash bargaining under uncertainty is introduced, allowing participants to negotiate based on their contributions. The proposed model’s performance is benchmarked against conventional peer-to-peer energy trading and the Q-learning algorithm. Transactions are secured using blockchain-based payment systems. The implementation is carried out using Matlab-R2023b Network Simulator, and the results are evaluated using various performance metrics.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"12081-12102"},"PeriodicalIF":3.4,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10839421","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrections to “A Novel Approach Based on Machine Learning, Blockchain and Decision Process for Securing Smart Grid” 对“一种基于机器学习、区块链和决策过程的智能电网安全新方法”的更正
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-01-13 DOI: 10.1109/ACCESS.2025.3525876
Nabil Tazi Chibi;Omar Ait Oualhaj;Wassim Fassi Fihri;Hassan El Ghazi
{"title":"Corrections to “A Novel Approach Based on Machine Learning, Blockchain and Decision Process for Securing Smart Grid”","authors":"Nabil Tazi Chibi;Omar Ait Oualhaj;Wassim Fassi Fihri;Hassan El Ghazi","doi":"10.1109/ACCESS.2025.3525876","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3525876","url":null,"abstract":"Presents corrections to the paper, (Corrections to “A Novel Approach Based on Machine Learning, Blockchain and Decision Process for Securing Smart Grid”).","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"6154-6154"},"PeriodicalIF":3.4,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10839210","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142975794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信