Author:
Ruan Xiaofei,Jin Shaoyun,Wen Weigang,Cheng Weidong
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference26 articles.
1. Alsubari SN, Deshmukh SN, Alqarni AA, Alsharif NHT et al (2022) Data analytics for the identification of fake reviews using supervised learning. CMC-Comput Mater Continua 70(2):3189–3204
2. Bharany S, Sharma S, Badotra S, Khalaf OI, Alotaibi Y, Alghamdi S, Alassery F (2021) Energy-efficient clustering scheme for flying ad-hoc networks using an optimized LEACH protocol. Energies 14:6016. https://doi.org/10.3390/en14196016
3. Chen P, Yang Z, Li X et al (2014) Analysis on the varying of ZnO varistor’s residual voltage ratio during the process of impulse degradation[J]. Insul Surge Arrest 2:42–47
4. Eda K, Iga A, Matsuoka M (1980) Degradation mechanism of non-ohmic zinc-oxide ceramics [J]. J Appl Phys 51(5):2678–2684
5. Fu M (2014) Comprehensive lightning protection technology of high speed railway communication and signal. Science Press, Beijing, pp 12–16
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献