Computers & Electrical Engineering最新文献

筛选
英文 中文
LbPV: Lattice-based Privacy-preserving mutual authentication scheme for VANET LbPV:基于网格的 VANET 隐私保护相互认证方案
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-10-17 DOI: 10.1016/j.compeleceng.2024.109765
Himun Jyoti Nath, Hiten Choudhury
{"title":"LbPV: Lattice-based Privacy-preserving mutual authentication scheme for VANET","authors":"Himun Jyoti Nath,&nbsp;Hiten Choudhury","doi":"10.1016/j.compeleceng.2024.109765","DOIUrl":"10.1016/j.compeleceng.2024.109765","url":null,"abstract":"<div><div>This study addresses the critical challenge of achieving reliable message exchange among vehicles in Vehicular Ad-hoc Networks (VANETs). It is crucial to quickly share safety messages, traffic updates, available services, and road conditions among vehicles in VANETs. For security reasons, messages must originate exclusively from authenticated vehicles, ensuring secure message exchange and data privacy. Numerous schemes for privacy-preserving authentication have been proposed, yet they suffer from constant service provider involvement and the requirement for vehicles to generate parameters on the fly. To address these challenges, this paper introduces LbPV, a secure lattice-based privacy-preserving mutual authentication scheme emphasizing the reliability of messages, preventing spoofing and unauthorized access. LbPV eliminates service provider monitoring and allows vehicles to authenticate messages without generating parameters while on the move. This is achieved by exchanging a confidential token using lattice-based encryption and message signing. By verifying the signed message and using the shared token, receiving vehicles can confirm the authenticity of the messages. By using lattice-based cryptography, the proposed protocol is also designed with the potential to resist future attacks, including quantum attacks, enhancing its long-term security viability. The security analysis of LbPV includes formal and informal evaluations that demonstrate its robustness. Performance evaluations using the NTL library show that LbPV, with service provider parameters, outperforms existing approaches in the literature. Results of performance analysis indicate that when compared to the most efficient traditional non-lattice-based scheme discussed in this paper, the proposed protocol has increased computation cost, communication cost, and power consumption by 77.71%, 98.58%, and 77.71%, respectively. Conversely, when compared to the most efficient lattice-based scheme discussed in this paper, the proposed scheme demonstrates reductions in computation cost, communication cost, and power consumption by 71.95%, 2.16%, and 71.95%, respectively.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109765"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust secret data sharing through coverless video steganography based on average DC coefficient on bit plane segmentation 基于位平面分割的平均 DC 系数,通过无掩码视频隐写术实现稳健的秘密数据共享
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-10-17 DOI: 10.1016/j.compeleceng.2024.109766
Sourabh Debnath, Ramesh Kumar Mohapatra, Ratnakar Dash
{"title":"A robust secret data sharing through coverless video steganography based on average DC coefficient on bit plane segmentation","authors":"Sourabh Debnath,&nbsp;Ramesh Kumar Mohapatra,&nbsp;Ratnakar Dash","doi":"10.1016/j.compeleceng.2024.109766","DOIUrl":"10.1016/j.compeleceng.2024.109766","url":null,"abstract":"<div><div>Recently, coverless steganography has been gaining popularity in confidential information-hiding techniques due to its resistance to the detection of steganalysis. Whereas most coverless approaches are based on images as the transmission medium, few articles are based on video in coverless steganography. Whereas the hiding capacity per frame in the existing scheme is less, and to improve the capacity, a new secret data sharing through coverless video steganography is proposed based on the average Direct Current (DC) coefficient on the Bit plane. The bit planes are extracted from the video frame, generating multiple hash sequences from each bit plane. The bit plane is further partitioned into blocks. The average DC coefficient of consecutive subblocks within a block in a bit plane frame is compared to create the hash bit sequences. A video index database is created to store the generated hash sequences for easy retrieval. The receiver successfully recovered the secret information from the retrieval information and received videos. The observed findings show that the suggested method outperforms recent coverless video steganography techniques. The robustness is substantially stronger and superior to other existing schemes.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109766"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel DDoS detection method using multi-layer stacking in SDN environment 在 SDN 环境中使用多层堆叠的新型 DDoS 检测方法
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-10-17 DOI: 10.1016/j.compeleceng.2024.109769
Tasnim Alasali, Omar Dakkak
{"title":"A novel DDoS detection method using multi-layer stacking in SDN environment","authors":"Tasnim Alasali,&nbsp;Omar Dakkak","doi":"10.1016/j.compeleceng.2024.109769","DOIUrl":"10.1016/j.compeleceng.2024.109769","url":null,"abstract":"<div><div>Software Defined Network (SDN) offers virtualized services compatible with infrastructure hosted computing, presenting a flexible, adaptive, and economical network architecture. Switches used in SDN prioritize packet matching in flow tables above packet processing, leaving them open to Denial of Service (DoS) attacks. These attacks, exemplified by Distributed Denial of Service Attacks (DDoS), target a victim while using many infected workstations at once. Due to its scalability and programmability, SDN is being used more and more for network management. However, it has specific security concerns, such as the controller’s susceptibility to cyberattacks, which might result in a single point of failure and network-wide risks. This study proposes a novel DDoS prediction model by developing stacking classifier model consisting of multiple base classifiers for an SDN environment. The proposed model is built on stacking several classifiers at the base level and the Meta level, which mixes varied or heterogeneous learners to provide reliable model results. The findings demonstrate that the proposed stacking model outperforms other existing models with respect to accuracy, sensitivity, specificity, precision, and F1 score. Finally, the stacking classifier model is evaluated in terms of binary classification. The evaluation shows the highest AUC of 0.9537 whereas Random Forest, Decision Tree, and Logistic Regression achieve AUC values around 0.93–0.95.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109769"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-faceted sustainability improvement in low voltage power distribution network employing DG and capacitor bank 利用 DG 和电容器组多方面改善低压配电网络的可持续性
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-10-17 DOI: 10.1016/j.compeleceng.2024.109789
Pappu Kumar Saurav, Swapna Mansani, Partha Kayal
{"title":"Multi-faceted sustainability improvement in low voltage power distribution network employing DG and capacitor bank","authors":"Pappu Kumar Saurav,&nbsp;Swapna Mansani,&nbsp;Partha Kayal","doi":"10.1016/j.compeleceng.2024.109789","DOIUrl":"10.1016/j.compeleceng.2024.109789","url":null,"abstract":"<div><div>Efficient distribution of active and reactive power in distribution networks is crucial for ensuring that consumer demand is met and that electrical power quality is maintained. This requires careful planning, particularly in terms of optimally placing and sizing distributed generator (DG) and capacitor bank (CB) units. These units play a key role in minimizing power losses and voltage fluctuations within the network. However, implementing DG and CB units in unbalanced distribution networks presents unique challenges due to inherent system unbalances. To address these challenges, this article proposes a method for allocating and sizing DG and CB units in unbalanced distribution networks. The approach accounts for the network's unbalance and targets multiple objectives, such as reducing power losses, improving multi-phase voltage stability, and minimizing phase-to-phase voltage unbalance. The fast and flexible radial power flow (FFRPF) technique is employed to model complex interactions and constraints within the network, leading to a multi-objective optimization problem. This optimization problem is solved using the weight aggregated particle swarm optimization (WA-PSO) method, a variant of particle swarm optimization tailored for multi-objective functions. WA-PSO simplifies the process by combining multiple objectives into a single function using weighted aggregation. The efficacy of this approach is validated on 19, 34, and 123-node unbalanced radial distribution networks (URDNs). The results show significant improvements in power delivery efficiency across all tested networks, especially when DG and CB units are operated simultaneously. Specifically, DG and CB integration led to a reduction in system losses by 89.90 %, 88.42 %, and 86.87 %, and a decrease in three-phase voltage unbalance indices by 88.75 %, 81.68 %, and 39.05 %, for the 19, 34, and 123-node systems, respectively, while maintaining voltage stability within acceptable limits. Additionally, CO<sub>2</sub> emissions were reduced by 52 %, 62 %, and 53 % when microturbines were utilized instead of coal-based thermal power plants, further highlighting the environmental benefits of the proposed approach.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109789"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal automatic water purging system for machinery in high humidity environments controlled by an ECU 由 ECU 控制的用于高湿度环境中机械设备的自动水净化系统提案
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-10-16 DOI: 10.1016/j.compeleceng.2024.109775
Abdelkarim Zemmouri, Anass Barodi, Rachid Elgouri, Mohammed Benbrahim
{"title":"Proposal automatic water purging system for machinery in high humidity environments controlled by an ECU","authors":"Abdelkarim Zemmouri,&nbsp;Anass Barodi,&nbsp;Rachid Elgouri,&nbsp;Mohammed Benbrahim","doi":"10.1016/j.compeleceng.2024.109775","DOIUrl":"10.1016/j.compeleceng.2024.109775","url":null,"abstract":"<div><div>This paper presents an advanced automatic water discharge system tailored for diesel-powered machinery, particularly for vehicles operating in diverse climates, including humid coastal regions. The system is designed to protect fuel circuits in tanks and diesel engines of boats, offering either automatic or semi-automatic protection against oxidation and corrosion. This enhancement extends the lifespan of diesel components and pipelines while simultaneously reducing maintenance costs and intervention times. Additionally, the system improves fuel purity, resulting in increased engine power and efficiency. The proposed solution was experimentally validated using an Arduino board coupled with a water-sensitive detector in diesel fuel, suitable for installation in diesel filters or tanks. Experimental findings demonstrated a remarkably swift separation time of 150 microseconds for diesel and water at a pressure of 1 bar, achieving an impressive efficiency of 99.84%. The system's rapid and effective separation capability highlights its practical value, particularly in scenarios where efficient water removal is critical to sustaining engine performance and longevity.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109775"},"PeriodicalIF":4.0,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “Intelligent hybrid energy system and grid integration using microcontrollers” [Computers and Electrical Engineering, Volume 110, September 2023, 108873] 使用微控制器的智能混合能源系统和电网集成》更正[《计算机与电气工程》,第 110 卷,2023 年 9 月,108873]
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-10-15 DOI: 10.1016/j.compeleceng.2024.109772
Majid Ali , Mohsin Ali Koondhar , Jyotsna Ogale , Ahmed Ali , Baseem Khan
{"title":"Corrigendum to “Intelligent hybrid energy system and grid integration using microcontrollers” [Computers and Electrical Engineering, Volume 110, September 2023, 108873]","authors":"Majid Ali ,&nbsp;Mohsin Ali Koondhar ,&nbsp;Jyotsna Ogale ,&nbsp;Ahmed Ali ,&nbsp;Baseem Khan","doi":"10.1016/j.compeleceng.2024.109772","DOIUrl":"10.1016/j.compeleceng.2024.109772","url":null,"abstract":"","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109772"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Steering authority allocation strategy for human-machine shared control based on driver take-over feasibility 基于驾驶员接管可行性的人机共享控制转向权限分配策略
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-10-15 DOI: 10.1016/j.compeleceng.2024.109753
Chengrui Su , Haohan Yang , Jie Li , Xiaodong Wu
{"title":"Steering authority allocation strategy for human-machine shared control based on driver take-over feasibility","authors":"Chengrui Su ,&nbsp;Haohan Yang ,&nbsp;Jie Li ,&nbsp;Xiaodong Wu","doi":"10.1016/j.compeleceng.2024.109753","DOIUrl":"10.1016/j.compeleceng.2024.109753","url":null,"abstract":"<div><div>Misoperation when a driver is distracted, e.g., turning the steering wheel unconsciously, preventing the machine from turning the steering wheel, etc., can lead to a false take-over of the vehicle, which poses a danger to shared control. Therefore, it is essential to evaluate the feasibility of driver take-over in distraction status. This paper proposes a steering authority allocation strategy based on driver take-over feasibility to reduce the interference of distracted driver behavior on shared control. First, a driver take-over feasibility framework is established based on quantified driver distraction levels and take-over intention. Then the shared control system is established based on a linear parameter-varying vehicle model and non-cooperative game theory to suppress the interference of time-varying speed and parameter uncertainty on shared control. Subsequently, the steering authority allocation strategy is constructed in conjunction with driver take-over feasibility and environmental risk evaluation. The proposed sigmoid-based mapping function ensures fast and smooth authority allocation. Finally, a series of driver-in-the-loop experiments are conducted to validate the effectiveness of our proposed strategy across various driving scenarios, and the results demonstrate that our strategy has superior performance than other advanced shared control schemes in reducing steering burden, improving driving safety, and enhancing vehicle stability, etc.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109753"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “Maximum power point tracking for grid-connected photovoltaic system using Adaptive Fuzzy Logic Controller” [Computers and Electrical Engineering, Volume 110, September 2023, 108879] 利用自适应模糊逻辑控制器实现并网光伏系统的最大功率点跟踪"[《计算机与电气工程》,第 110 卷,2023 年 9 月,108879] 更正
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-10-15 DOI: 10.1016/j.compeleceng.2024.109773
Majid Ali , Mujtaba Ahmad , Mohsin Ali Koondhar , Muhammad Sarfraz Akram , Aanchal Verma , Baseem Khan
{"title":"Corrigendum to “Maximum power point tracking for grid-connected photovoltaic system using Adaptive Fuzzy Logic Controller” [Computers and Electrical Engineering, Volume 110, September 2023, 108879]","authors":"Majid Ali ,&nbsp;Mujtaba Ahmad ,&nbsp;Mohsin Ali Koondhar ,&nbsp;Muhammad Sarfraz Akram ,&nbsp;Aanchal Verma ,&nbsp;Baseem Khan","doi":"10.1016/j.compeleceng.2024.109773","DOIUrl":"10.1016/j.compeleceng.2024.109773","url":null,"abstract":"","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109773"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review 物联网入侵检测系统学习技术的前景:系统性文献综述
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-10-15 DOI: 10.1016/j.compeleceng.2024.109725
Amina Khacha , Zibouda Aliouat , Yasmine Harbi , Chirihane Gherbi , Rafika Saadouni , Saad Harous
{"title":"Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review","authors":"Amina Khacha ,&nbsp;Zibouda Aliouat ,&nbsp;Yasmine Harbi ,&nbsp;Chirihane Gherbi ,&nbsp;Rafika Saadouni ,&nbsp;Saad Harous","doi":"10.1016/j.compeleceng.2024.109725","DOIUrl":"10.1016/j.compeleceng.2024.109725","url":null,"abstract":"<div><div>The IoT has interconnected devices that collaborate via the Internet. Yet, its widespread connectivity and data generation pose cybersecurity risks. Integrating robust intrusion detection systems (IDSs) into the architecture has become crucial. IDSs safeguard data, detect attacks, and ensure network security and privacy. Constructing anomaly-based intrusion detection systems using artificial intelligence methods, often termed learning techniques, has gained significant traction lately. In this context, this study undertakes a systematic literature review to comprehensively analyze the current landscape of research concerning IoT security, explicitly employing learning techniques. These techniques fall under four primary categories: machine learning, deep learning, transfer learning, and federated learning. From a pool of 646 papers published between 2018 and 2023, we have selected 36 papers encompassing all these techniques based on the keywords of the study. These chosen studies were then categorized based on their respective learning techniques, with an additional hybrid classification that combines federated learning and transfer learning. Moreover, the paper provides a comparative analysis of the studied articles across different dimensions. The research outcomes demonstrate the effectiveness of each learning technique, shed light on the datasets and metrics employed, and conclude with a discussion on open challenges and future recommendations in this domain</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109725"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142438379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial neural network based decentralized current-sharing control for parallel connected DC-DC converters in DC microgrid application 直流微电网应用中基于人工神经网络的并联直流-直流转换器分散分流控制
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-10-14 DOI: 10.1016/j.compeleceng.2024.109731
Musharraf Ali Saddriwala, Mohd Alam
{"title":"Artificial neural network based decentralized current-sharing control for parallel connected DC-DC converters in DC microgrid application","authors":"Musharraf Ali Saddriwala,&nbsp;Mohd Alam","doi":"10.1016/j.compeleceng.2024.109731","DOIUrl":"10.1016/j.compeleceng.2024.109731","url":null,"abstract":"<div><div>To create a non-interrupted, economical and reliable direct current (DC) microgrid, multiple DC-DC converters can be connected in parallel. Current sharing among these multiple converters becomes essential for proper operation of the system. This study proposes an artificial neural network (ANN) based control technique for parallel connected DC-DC boost converters which ensures accurate current sharing according to the specified maximum limits. Levenberg-Marquardt algorithm-based ANN network is used to reduce the training time and, also to achieve near ≈ 100 % accuracy of the training data. ANN control provides better voltage regulation, accurate current sharing unlike the conventional proportional-integral (PI) based control which faces issues such as inaccurate current sharing, high transient, peak overshoots and steady state error during sudden change in the system. The efficient functioning of the proposed control method is verified by simulating two parallel connected DC-DC converters using MATLAB/Simulink. A hardware prototype of converters rating ≈ 250 W using TMS320F28379D Digital signal processor controller is also developed to verify the performance and effectiveness of the ANN based control in comparison to PI based technique. The ANN based technique is faster to achieve the reference voltage, and the peak overshoot is approximately 75 % lesser than the PI based control.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109731"},"PeriodicalIF":4.0,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142437854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信