共 25 条
- [11] Mirzaei H.R., Akbari A., Gockenbach E., Miralikhani K., Advancing new techniques for UHF PDdetection and localization in the power transformers in the factory tests, IEEE Trans. Dielectr. Electr. Insul., 22, 1, pp. 448-455, (2015)
- [12] Bharadwaj R., Swaisaenyakorn S., Parini C., Batchelor J.C., Koul S.K., Alomainy A., UWB channel characterization for compact L-shape configurations for body-centric positioning applications, IEEE Antennas Wireless Propag. Lett., 19, 1, pp. 29-33, (2020)
- [13] Maglogiannis I., Doukas C.N., Overview of advanced computer vision systems for skin lesions characterization, IEEE Trans. Inf. Technol. Biomed., 13, 5, pp. 721-733, (2009)
- [14] Naik M., Singh A.P., Pradhan N.R., Kumar N., Nayak A., Guizani M., TokenGreen: A versatile NFT framework for peer-to-peer energy trading and asset ownership of electric vehicles, IEEE Internet Things J, 11, 8, pp. 13636-13646, (2024)
- [15] Tang Y., Application method of computer VR technology in digital media system design, Digit. Technol. Appl., 40, 3, pp. 207-209, (2022)
- [16] Gordon L.A., Loeb M.P., Lucyshyn W., Sharing information on computer systems security: An economic analysis, J. Accounting Public Policy, 22, 6, pp. 461-485, (2003)
- [17] Cox J., Information systems user security: A structured model of the knowing–doing gap, Comput. Hum. Behav., 28, 5, pp. 1849-1858, (2012)
- [18] Jiang R., Wang L., Tsai S.B., An empirical study on digital media technology in film and television animation design, Math. Problems Eng., 2022, 1
- [19] Kavousi-Fard A., Dabbaghjamanesh M., Jin T., Su W., Roustaei M., An evolutionary deep learning-based anomaly detection model for securing vehicles, IEEE Trans. Intell. Transp. Syst., 22, 7, pp. 4478-4486
- [20] Shu Z.Y., Application of virtual reality technology in digital media system design, Inf. Comput., 34, 15, pp. 201-203