Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content
BY 4.0 license Open Access Published by De Gruyter February 10, 2023

Optimization of information acquisition security of broadband carrier communication based on linear equation

  • Liye Peng , Qing Liu EMAIL logo and Xiaohua Lyu
From the journal Nonlinear Engineering

Abstract

In order to study the optimization of information acquisition security of broadband carrier communication and solve the problem of low baud rate of data acquisition in traditional communication operation data acquisition systems, this article reconstructs the required arrangement of communication operation data signals in the acquisition path by taking broadband carrier communication in the station area as an example through the linear equation method of genetic algorithm. The baud rate of the designed acquisition system is significantly higher than that of the control group, and the acquisition accuracy is 100% by using phase shift key modulation and high carrier frequency. It can solve the problem of low baud rate of data acquisition in traditional communication operation data acquisition systems and improve the security of information acquisition. The security (loss, anti-interference) of broadband carrier communication information collection based on the improved legacy algorithm is better than that of the traditional genetic algorithm, indicating that the security of broadband carrier communication information collection based on the improved legacy algorithm does not increase with the number of iterations and decrease.

1 Introduction

Low-voltage power line is not specially used to transmit communication data, its topology and physical characteristics are different from traditional communication transmission media, such as twisted pair, coaxial cable, and optical fiber. Power line communication transmits high-speed data information on the channel loaded with power frequency power signal, so it has the characteristics of harsh working environment, serious noise interference, and large time-varying. At the same time, the signal is prone to reflection, standing wave and resonance, which makes the attenuation characteristics of the signal extremely complex, resulting in a strong frequency selectivity of the power line communication channel. At present, broadband carrier communication has been widely used in station area smart meters. It has the characteristics of strong anti-crosstalk ability and real-time monitoring. However, the acquisition of a large number of broadband carrier communication information will produce redundant information and useless information, which will seriously reduce the efficiency of information acquisition and improve the error rate of information acquisition [1]. Taking the broadband carrier communication in the station area as an example, this article analyzes the optimization of information acquisition security by linear equation and genetic algorithm, so as to improve the information security level of meter reading and intelligent station area. Communication operation data refers to the data that needs to be transmitted in the communication process. Generally, it contains a lot of effective information [2]. A modulation technique is a process of converting a signal produced by a source into a form suitable for wireless transmission. After quantizing the analog signal samples, it modulates the optical carrier on and off with a binary digital signal “1” or “0,” and performs pulse coding (PCM). The advantage of digital modulation is that it has strong anti-interference ability, and the influence of noise and dispersion does not accumulate during relay, so long-distance transmission can be realized. Therefore, communication operation data acquisition is an effective way to obtain information. Based on this, the communication operation data acquisition system mainly realizes the unified acquisition of communication operation data through communication operation data processing. However, the traditional communication operation data acquisition system often has the defect of low acquisition baud rate in practical application. The main reason for this phenomenon is that the processing of communication operation data is not efficient enough, and it is difficult to meet the efficient acquisition of communication operation data with a large base and different types. The optimization design of the communication operation data acquisition system is of practical significance and can provide support for the development of communication operation data acquisition [3,4]. It can be seen that the previous communication operation data acquisition system has shortcomings and needs to be improved. As a composite function, the linear equation algorithm can obtain the conversion formula by setting intermediate variables, so as to improve the processing speed of communication operation data. In the linear equation algorithm, the derivative (FX) of the auxiliary function is known. In this case, the linear equation algorithm can transform the complex problem into a simple linear problem, then calculate, and solve it. After the transformation is completed, the acquisition success rate of the power consumption information acquisition system is guaranteed to reach more than 98%, realizing the functions of real-time acquisition, timing acquisition, and meter fee control of low-voltage power users, and further realizing the functions of comprehensive monitoring, resource management, alarm management and performance management of low-voltage power users, so as to realize the unified and comprehensive management of distribution and power communication network [5,6]. At present, broadband carrier communication is widely used in smart meters in the station area, which has the characteristics of strong anti-crosstalk ability and real-time monitoring. However, the collection of a large number of broadband carrier communication information will generate redundant information and useless information, which will seriously reduce the efficiency of information collection and improve the error rate of information collection. Taking broadband carrier communication in station areas as an example, this article analyzes the optimization of information collection security by genetic algorithm and promotes the improvement of information security level of meter reading and intelligent station area.

2 Literature review

It is necessary to further improve the energy consumption information collection system to meet the urgent needs of the company to meet the urgent needs of the company at all levels and disciplines. information [7]. Deya proposed comprehensive coverage of power users, comprehensive collection of power information, comprehensive prepayment management, and opinions on local communication networks, including narrowband power line carrier, broadband power line carrier, micro-power wireless communication, RS485 communication technology, low-voltage Centralized meter reading, and other construction schemes [8]. State Grid Corporation of China has installed a total of 180 million smart meters, with a total of 190 million users, a collection coverage rate of 56%, and an automatic meter reading accounting rate of over 97%. Ni et al. expect to have more than 40 million dual-function (detecting gas and electricity) smart meters [9]. Katz and Fridman also hope to encourage energy-efficient transitions, and detailed electricity consumption information will be helpful. Many European power companies want to use electricity meters to improve their relationship with customers. In Europe, as in the United States, few people have a favorable opinion of power companies [10]. For example, Li et al. wrote in the report, “The Danish power utility Sea-NVE is very concerned about the relationship with customers. They even train installers how to talk to customers in their homes. As a result, the power utility has experienced a substantial complaint rate Reduced, now users save an average of 16% on their electricity bills.” Although Europe is still reeling from the economic crisis, many countries have adopted measures to measure it [11]. Earlier this year, Fournaris and others announced plans to deploy 35 million smart meters, while the UK set an even bigger target for smart meters. They announced a smart grid communications contract worth $7.5 billion. As of February 2015, more than 50 million smart meters have been deployed in the United States, of which Southern California Edison (SCE) is the most typical, with about 5 million smart meters serving its power supply area [12]. With the help of smart meters, SCE has fully realized the billing function and is also exploring the next development strategy of smart meters. Batra et al. stated that SCE plans to use the rich data resources of smart meters for a wider range of purposes, and more utilities are brainstorming to unlock the great value of data applications! In addition, based on the interconnection model established by utility companies, engineers are also investigating the potential application of connection automation from the home side to the transformer side, which is currently highly manual [13]. SCE also hopes to use smart meter data for phase identification and data analysis to ensure a three-phase balance of the load.

Japan revised the basic energy plan in June 2010, and the policy is to “continue to fully consider the investment effect and allow all users who apply to install smart energy meters as soon as possible from 2020.” Ten large power companies are popularizing the next-generation power meter “smartmeter” with a communication function, which is expected to be set up in all households in the district by the end of 2024 [14]. According to the requirements of the government, the popularization progress will be accelerated, and companies will work overtime to meet the standard. It is estimated that around 2020, all households in Japan can use energy-saving and convenient smart meters. The utility model has the functions of fast communication between electric power companies and smart electricity meters. Every 30 minutes, the power company can grasp the power consumption of each family, and the power company can also make a variety of cost menus. In terms of users, users can save electricity according to the power-saving suggestions of the power company, and the electricity charge can also be reduced. To this end, the government rushed to introduce new meters to power companies [15,16]. The system structure diagram is shown in Figure 1.

Figure 1 
               Architecture of power consumption information acquisition system.
Figure 1

Architecture of power consumption information acquisition system.

3 Research methods

3.1 Security description of broadband carrier communication information acquisition

Description of security problems of broadband carrier communication information acquisition in the station area in order to better analyze the problems of broadband carrier communication information acquisition is necessary to mathematically describe the above-mentioned indicators and problems. The specific contents are as follows:

  1. It is assumed that m in the broadband carrier communication information acquisition in the station area is the information acquisition index set, and different information acquisition indexes correspond to different broadband carrier communication items. Moreover, the ID of the electricity meter in which each information acquisition index is located is different from that of other equipment in the station area (low-voltage circuit breaker and measurement and control device).

  2. If n is the broadband carrier communication item, i is the meter reading item number, j is the meter ID, k is a low-voltage circuit breaker, l is the monitoring device, and m is the intelligent terminal; the information acquisition item can be described as Ni, j, k, l, and m (i, j, k, l, m = 1,2,., n, n is a natural number).

  3. Taking security as a unit, customers with similar items, acquisition difficulties, and delay requirements in the same station area are classified into the security of broadband carrier communication information acquisition in one station area.

  4. The electricity meter and other equipment IDs of any broadband carrier communication item in the broadband carrier communication information acquisition of the station area are arranged by the information acquisition center of the station area. Due to the constraints of security and accuracy, the electricity meter and other equipment IDs of the station area are required to follow a certain order.

  5. Broadband carrier communication information collection in the station area of any broadband carrier communication item has time and security requirements, and the information collection time and security of the same broadband carrier communication item are the same.

  6. The interference is included in the acquisition security in the broadband carrier communication information acquisition in the station area, and the calculation formula is shown in formula (1):

    (1) P = x y z + ζ ,

    where P is the anti-interference capability; x is the degree of information encryption; y is the communication time; z is the communication distance; and ζ is the interference adjustment factor.

  7. It is assumed that all broadband carrier communication items n are set before the acquisition of broadband carrier communication information in the station area.

3.2 Linear equation algorithm

The core of the linear equation algorithm is matrix decomposition. Through matrix decomposition, the complex calculation method of a large matrix is simplified, and then, the solution speed is improved. In this article, the curve is divided into several intervals by using the linear equation algorithm. The integral function in the interval is approximated by the linear interpolation formula, and then, the calculus function is approximated (Naseem et al., 2021). Assuming that the equation solution of node m (x, y) exists in the range of [0, t], the curve isometric subdivision is made based on the linear equation algorithm, and formula (2) can be obtained.

(2) Δ : 0 = t 0 < t 1 < < t n = t , t [ 0 , T ] ,

where n refers to the number of approximate intervals of linear interpolation formula, which is a real number. After the equidistant partition of the curve based on the linear equation algorithm through formula (2), the approximate value of the solution of the equation at the calculus node M (x, y) is calculated. Based on the linear equation algorithm, the approximate value of calculus is linearly approximated, and the problem of calculus is transformed into separable variables. In the process of linear approximation of calculus approximation based on linear equation algorithm, the problem of implicit general solution must be considered [17,18,19]. At this time, the approximate value of calculus needs to be set to any complex number or any reply number by Euler’s common answer formula. Based on this, Eq. (3) can be obtained

(3) U = e ( k x + C ) = e ( C l ) e ( k x ) ,

The above refers to the definition domain of the calculus function. It refers to the separable variables existing in the implicit general solution of the calculus function. It refers to any constant of the tangent slope of node M(x, y) in the curve. Realize the linear approximation of calculus approximation based on linear equation algorithm, and solve the implicit general solution problem in calculus solution. Through the above-mentioned formula, the application process of the linear equation algorithm can be clarified. In this article, the linear equation algorithm is applied to the design of a communication operation data acquisition system. The specific design content of the communication operation data acquisition system based on a linear equation algorithm is described below [20,21].

3.3 Genetic algorithm design

To calculate the information acquisition security of broadband carrier communication in the station area with an improved genetic algorithm, we should first analyze the relationship between electric meters and construct the sequence of broadband carrier communication items. Assuming that each user has o broadband carrier communication items and r information acquisition indicators, the code of each broadband carrier communication item is Ni, j, k, l, m, and the mathematical description is: i = 1 0 , r N i , j , k , l , m o . Operation steps of improved genetic algorithm optimization steps of broadband carrier information communication security in station area are as follows:

  1. Set the number of initial broadband carrier communication items popsize, external interference Pc, internal interference Pm, broadband carrier communication item codes Ni, j, k, l, m, as well as the most accurate transmission scheme Sch and the scheme with the shortest transmission time.

  2. Judge the termination conditions of genetic algorithm iteration, and terminate the calculation if it meets the requirements.

  3. Set the probability of information loss and interference according to metropolis acceptance criteria, adjust the information acquisition scheme, and calculate the probability of interference and delay again. Find the best information collection scheme according to metropolis acceptance criteria.

  4. Store the accurate transmission scheme in Sch and the shortest transmission time scheme in total respectively.

  5. Go to step 3) and repeat the calculation.

  6. Output the optimal solution and end the operation.

4 Result analysis

4.1 Experimental preparation

After adjusting the communication time and signal strength of about 100yte segments, the specific time-consuming data of 100yte segments and typical operation areas are selected and analyzed. First, the system based on the linear equation algorithm is designed to collect the communication operation data, the acquisition port is connected to the computer, and the data acquisition baud rate is measured by MATALB software, which is recorded as the experimental group. Then, the traditional system is used to collect the communication operation data, also the acquisition port is connected to the computer, and the data acquisition baud rate are measured through MATALB software. The higher the baud rate of data acquisition, the higher the efficiency of data acquisition and the higher the system performance for communication operation in the same period. In this example analysis, the number of target communication operation data collection is 2,000, the set area range is (0,10,000), and the experimental data are recorded [22,23].

4.2 Analysis of experimental results

The experimental results are sorted out, as shown in Table 1.

Table 1

Baud rate comparison of data acquisition

Number of test Area Experimental group data acquisition Baud rate (Bt) Control group data acquisition Baud rate (Bt) Collect the number
1 (0, 10,000) 0.18 0.02 2,000
2 (0, 10,000) 0.19 0.04 2,000
3 (0, 10,000) 0.19 0.04 2,000
4 (0, 10,000) 0.17 0.01 2,000
5 (0, 10,000) 0.19 0.04 2,000
6 (0, 10,000) 0.17 0.03 2,000

It can be seen from Table 1 that the acquisition baud rate of the acquisition system designed in this article is significantly higher than that of the control group. In the same area, the data acquisition efficiency for communication operations is higher, which has practical application value and is worthy of being vigorously promoted [24].

4.3 Improved genetic algorithm results

In order to investigate the optimization degree of improved genetic algorithm on the security of broadband carrier communication information acquisition in the station area, Matlab calculation is carried out. Set the accuracy parameters such as information acquisition accuracy, loss and interference, and analyze the corresponding algorithm. The results are shown in Table 2.

Table 2

Results of improved genetic algorithm [Popsize (n = 50)]

Judgment item P1 Number of iterations T 0 Restrictionsa Improved genetic algorithm
Number of successful information collection 0.1 150 2 0.97
Reading delay 0.1 150 3 0.001
Number of successful calls of master station 0.1 150 2 0.001
Communication distance 0.1 150 2 1 km
Station area line loss 0.1 150 3 0.003
Table number reporting 0.1 150 3 0.01
Networking time 0.1 150 2 0.01
Network access time 0.1 150 3 0.01
Crosstalk coefficient 0.1 150 3 0.01
Relay level 0.2 150 2 15级

The security (loss and anti-interference) of the station-wide-band carrier communication information acquisition based on the improved heritage algorithm is better than the traditional genetic algorithm, which shows that the security of the station-wide-band carrier communication information acquisition based on the improved heritage algorithm does not decrease with the increase of the number of iterations.

4.4 Application of power carrier technology in power consumption information acquisition laboratory simulation test

Representative companies No. 1 and No. 2 were selected in this experiment. The main technical indicators of these two companies are shown in Table 3. Test method: implement + 50 dB attenuation test and test without attenuation and interference. The previous test methods are the same, mainly through 30 electric energy meters and a concentrator to establish a carrier communication platform, and implement meter reading through the system. Test results are listed Tables 4 and 5. According to the earlier test results, the PSK modulation mode and the means of higher carrier frequency can achieve relatively ideal performance through the effect.

Table 3

Main technical indicators of No. 1 and No. 2 companies

Manufacturer Carrier communication technology Center frequency (kHz)
1 FSK 421
2 PSK 120
Table 4

Copy success of No. 1 and No. 2 companies

Manufacturer Linear way Ground cable Mixed cabling mode Overhead line
1 1 30 30 30
2 30 30 30
2 1 30 30 0
2 30 30 0
Table 5

Reading accuracy of No. 1 and No. 2 companies

Manufacturer 1 2 3 4 5 6 7 8 9
1 100% 100% 100% 100% 100% 100% 100% 100% 100%
2 100% 100% 100% 100% 100% 100% 100% 100% 100%

Two-way real-time interactive query of abnormal power consumption records through smart meters, providing reliable real-time data for fault analysis, finding equipment or systems with excessive energy consumption or unreasonable operation, and giving suggestions for improving energy-saving operation management, and formulating more accurate energy-saving operation management: load forecasting, guiding energy optimization scheduling, and realizing energy allocation optimization and three-phase power balance.

The fitness function of broadband carrier information security in the station area is taken as 0.001 to meet the accuracy requirements of the intelligent centralized reading system and the low-voltage visualization system. The degree of agreement between the theoretical value of the broadband carrier communication term and the actual value is the result of the fitness function. Therefore, a penalty threshold should be set between the theoretical value and the actual value of the broadband carrier communication item.

5 Discuss

The most basic requirements of power customers for power supply enterprises are: to provide reliable and stable power supply and high-quality service levels. It is not only expected that the power supply equipment will not harm the human body, nor pollute the environment. In addition, we hope that the personal safety and property safety of customers can be guaranteed in the process of power supply. Therefore, the stability and security of power supply quality are the most important factors affecting customer satisfaction. At present, the narrow-band carrier wave and micro-power wireless collection scheme adopted in the electricity information collection system have a low success rate of charge control, which makes the stability and safety of the power supply not guaranteed. The resulting user complaints directly reduce the image of the power supply company in the eyes of the majority of power customers. Broadband carrier communication technology provides two-way, real-time, high-speed communication based on power lines. It effectively solves the problem of low real-time communication in other technical solutions, improves the timeliness of reading customer electricity consumption information and the accuracy of meter reading and calculation, and also greatly improves the sensitivity of control instruction execution.

6 Conclusion

As an important part of power information system, power carrier technology plays an important role in realizing system communication. On this basis, the necessity of the optimal design is proved by proving the applicability of the acquisition system in practical applications. Therefore, we have reason to believe that the design of this article can solve the disadvantage of low efficiency in data collection of traditional communication operations. At the same time, it is also necessary to conduct in-depth research on the optimal design of the communication operation data collection system based on the linear equation algorithm, so as to provide suggestions for improving the quality of communication operation data collection. The linear equation has a good optimization effect on the safety and accuracy of broadband carrier communication information collection, and can reduce the interference of redundant data and irrelevant data in the real-time collection process, laying a solid foundation for the normal operation of the intelligent centralized reading system and low-voltage visualization system base.

  1. Funding information: The authors state no funding involved.

  2. Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission.

  3. Conflict of interest: The authors state no conflict of interest.

References

[1] Yang Y, Wang BZ, Ding S. Performance comparison with different antenna properties in time reversal ultra-wideband communications for sensor system applications. Sensors. 2018;18(2):88.10.3390/s18010088Search in Google Scholar PubMed PubMed Central

[2] Bhattacharya A, Roy B, Chowdhury SK, Bhattacharjee AK. A compact fractal monopole antenna with defected ground structure for wideband communication. Appl Comput Electromagn Soc J. 2018;33(3):347–50.Search in Google Scholar

[3] Masui K, Ogino M. Research on the convergence of iterative method using mixed precision calculation solving complex symmetric linear equation. IEEE Trans Magn. 2020;56(1):1–4.10.1109/TMAG.2019.2951280Search in Google Scholar

[4] Wang X, Mou S, Anderson B. A discrete-time distributed algorithm for minimum l1-norm solution of an under-determined linear equation set. IFAC-PapersOnLine. 2020;53(2):3278–85.10.1016/j.ifacol.2020.12.1136Search in Google Scholar

[5] Manimegalai CT, Gauni S, Kalimuthu K, Bashkaran R. Design and analysis of turbo-coded DCM-OFDM ultra-wideband system with radio-over-fiber and wireless transmission in underwater communication. J Opt. 2020;49(1):140–46.10.1007/s12596-020-00603-9Search in Google Scholar

[6] Chung E, Efendiev Y, Li Y, Li Q. Generalized multiscale finite element method for the steady state linear Boltzmann equation. SIAM J Multiscale Model Simul. 2020;18(1):475–501.10.1137/19M1256282Search in Google Scholar

[7] Fernández-Cara E, Límaco J, Marín-Gayte I. Theoretical and numerical local null controllability of a quasi-linear parabolic equation in dimensions 2 and 3. J Frankl Inst. 2021;358(5):2846–71.10.1016/j.jfranklin.2021.01.031Search in Google Scholar

[8] Deya A. On a non-linear 2D fractional wave equation. Annales de L’institut Henri Poincare. 2020;56(1):477–501.10.1214/19-AIHP969Search in Google Scholar

[9] Ni Z, Zhang A, Yang K, Gao F, An J. Low-complexity subarray-based rf precoding for wideband multiuser millimeter wave systems. IEEE Trans Veh Technol. 2020;69(7):8028–33.10.1109/TVT.2020.2994965Search in Google Scholar

[10] Katz R, Fridman E. Finite-dimensional observer-based controller for linear 1-D heat equation: an LMI approach. IFAC-PapersOnLine. 2020;53(2):7611–16.10.1016/j.ifacol.2020.12.1360Search in Google Scholar

[11] Li W, Zeng X, Hong Y, Ji H. Distributed design for nuclear norm minimization of linear matrix equation with constraints. IEEE Trans Autom Control. 2020;66(2):745–52.10.1109/TAC.2020.2981930Search in Google Scholar

[12] Fournaris AP, Dimopoulos C, Lampropoulos K, Koufopavlou O. Anomaly detection trusted hardware sensors for critical infrastructure legacy devices. Sensors. 2020;20(11):3092–129.10.3390/s20113092Search in Google Scholar PubMed PubMed Central

[13] Batra I, Verma S, Kavita, Alazab M. A lightweight IoT-based security framework for inventory automation using wireless sensor network. Int J Commun Syst. 2020;33(4):e4228.10.1002/dac.4228Search in Google Scholar

[14] Ensan SS, Ghosh S. ReLOPE: resistive RAM-based linear first-order partial differential equation solver. IEEE Trans Very Large Scale Integr (VLSI) Syst. 2020;29(1):237–41.10.1109/TVLSI.2020.3035769Search in Google Scholar

[15] Lin L, Dekkers IA, Tao Q, Lamb HJ. Novel artificial neural network and linear regression based equation for estimating visceral adipose tissue volume. Clin Nutr. 2020;39(10):3182–8.10.1016/j.clnu.2020.02.013Search in Google Scholar PubMed

[16] Georgakis IP, Giannakopoulos II, Litsarev MS, Polimeridis AG. A fast volume integral equation solver with linear basis functions for the accurate computation of EM fields in MRI. IEEE Trans Antennas Propag. 2020;69(7):4020–32.10.1109/TAP.2020.3044685Search in Google Scholar

[17] Zhou J, Wang X, Mou S, Anderson B. Finite-time distributed linear equation solver for solutions with minimum l1-norm. IEEE Trans Autom Control. 2020;65(4):1691–6.10.1109/TAC.2019.2932031Search in Google Scholar

[18] Ferreira R, de Pablo A. Grow-up for a quasilinear heat equation with a localized reaction. J Differ Equ. 2020;268(10):6211–29.10.1016/j.jde.2019.11.033Search in Google Scholar

[19] Bennani L, Trontin P, Chauvin R, Villedieu P. A non-overlapping optimized Schwarz method for the heat equation with non linear boundary conditions and with applications to de-icing. Comput Math Appl. 2020;80(6):1500–22.10.1016/j.camwa.2020.07.017Search in Google Scholar

[20] Naseem A, Rehman MA, Abdeljawad T. Some new iterative algorithms for solving one-dimensional non-linear equations and their graphical representation. IEEE Access. 2021;9:8615–24.10.1109/ACCESS.2021.3049428Search in Google Scholar

[21] Pava JA, Cavalcante M. Linear instability criterion for the Korteweg–de Vries equation on metric star graphs. Nonlinearity. 2021;34(5):3373–410.10.1088/1361-6544/abea6bSearch in Google Scholar

[22] Houston P, Roggendorf S, van der Zee KG. Eliminating Gibbs phenomena: A non-linear Petrov–Galerkin method for the convection–diffusion–reaction equation. Comput Math Appl. 2020;80(5):851–73.10.1016/j.camwa.2020.03.025Search in Google Scholar

[23] Oliynyk TA. Future global stability for relativistic perfect fluids with linear equations of state p = Kρ where 1/3 < K < 1/2. SIAM J Math Anal. 2021;53(4):4118–41.10.1137/20M1361195Search in Google Scholar

[24] Naseem A, Rehman MA, Abdeljawad T, Chu YM. Novel iteration schemes for computing zeros of non-linear equations with engineering applications and their dynamics. IEEE Access. 2021;9:92246–62.10.1109/ACCESS.2021.3091473Search in Google Scholar

Received: 2022-03-26
Revised: 2022-07-27
Accepted: 2022-08-18
Published Online: 2023-02-10

© 2023 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Downloaded on 20.10.2024 from https://www.degruyter.com/document/doi/10.1515/nleng-2022-0249/html
Scroll to top button