You are currently viewing a new version of our website. To view the old version click .

Electronics, Volume 11, Issue 16

August-2 2022 - 158 articles

Cover Story: The article presents a method for assessing the impact of radiated electromagnetic interference generated by a selected rail traction unit on the operational process of trackside video monitoring systems. Emissions of radiated electromagnetic interference generated in an unintended manner by traction vehicles within a railway line lead to interference in the VMS operating process. Based on knowledge of actual VMS operating process data, spectral characteristics, and values of individual components of disturbing signals occurring in the emissions of radiated electromagnetic interference, it is possible to determine the parameters of damage intensities for the devices and elements of this system. Using data enables determining the VMS reliability parameters within its operating system. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (158)

  • Article
  • Open Access
23 Citations
11,354 Views
17 Pages

22 August 2022

The COVID-19 pandemic related government interventions produced rapid decreases in worldwide economic and social activity, with multifaceted economic and social consequences. In particular, the disruption of key industries and significant lifestyle c...

  • Article
  • Open Access
8 Citations
2,792 Views
9 Pages

22 August 2022

The performance of a time difference of arrival (TDOA) localization system is severely affected by time synchronization errors, and making use of reference signals is a common solution for the problem. The traditional method has two steps, first to m...

  • Feature Paper
  • Article
  • Open Access
1 Citations
4,106 Views
12 Pages

Temple Recommendation Engine for Route Planning Based on TPS Clustering CNN Method

  • Dasarada Rajagopalan Thirupurasundari,
  • Annadurai Hemlathadhevi,
  • Amit Kumar Gupta,
  • Ruchi Rani Garg and
  • Mangal Sain

22 August 2022

There are no restrictions on religious or cultural practices in India. India’s temples are becoming an ideal platform for Hindu groups to express their ideals in a global context. For the sake of devotees, temples now require widespread accessi...

  • Article
  • Open Access
9 Citations
14,011 Views
23 Pages

Active Directory Attacks—Steps, Types, and Signatures

  • Basem Ibrahim Mokhtar,
  • Anca D. Jurcut,
  • Mahmoud Said ElSayed and
  • Marianne A. Azer

22 August 2022

Active Directory Domain is a Microsoft service that allows and facilitates the centralized administration of all workstations and servers in any environment. Due to the wide use and adoption of this service, it has become a target for many attackers....

  • Article
  • Open Access
4 Citations
4,946 Views
14 Pages

KHV: KVM-Based Heterogeneous Virtualization

  • Chunqiang Li,
  • Ren Guo,
  • Xianting Tian and
  • Huibin Wang

22 August 2022

A KVM (Kernel-based Virtual Machine) is subject to the complexity of the Linux kernel and the difficulty and cost of safety certification; thus, it is not popularized in embedded high-reliability scenarios. This paper proposes a KVM-based Heterogeneo...

  • Article
  • Open Access
27 Citations
3,744 Views
19 Pages

22 August 2022

High security has always been the ultimate goal of image encryption, and the closer the ciphertext image is to the true random number, the higher the security. Aiming at popular chaotic image encryption methods, particle swarm optimization (PSO) is s...

  • Article
  • Open Access
48 Citations
4,761 Views
16 Pages

A Hierarchical Federated Learning-Based Intrusion Detection System for 5G Smart Grids

  • Xin Sun,
  • Zhijun Tang,
  • Mengxuan Du,
  • Chaoping Deng,
  • Wenbin Lin,
  • Jinshan Chen,
  • Qi Qi and
  • Haifeng Zheng

22 August 2022

As the core component of smart grids, advanced metering infrastructure (AMI) provides the communication and control functions to implement critical services, which makes its security crucial to power companies and customers. An intrusion detection sy...

  • Feature Paper
  • Article
  • Open Access
3 Citations
2,499 Views
12 Pages

22 August 2022

Utilizing antenna diversity techniques has become a well-known approach to improve the performance of wireless communication systems. Multiple antenna arrays with half-length spacing, such as a uniform linear array (ULA), have been taken into conside...

  • Article
  • Open Access
3 Citations
2,091 Views
21 Pages

22 August 2022

With the development of network function virtualization (NFV), the resource management of service function chains (SFC) in the virtualized environment has gradually become a research hotspot. Usually, users hope that they can get the network services...

  • Article
  • Open Access
1,829 Views
16 Pages

Addressing a New Class of Multi-Objective Passive Device Optimization for Radiofrequency Circuit Design

  • Fabio Passos,
  • Elisenda Roca,
  • Rafael Castro-López and
  • Francisco V. Fernández

22 August 2022

The design of radiofrequency circuits and systems lends itself to multi-objective optimization and the bottom-up composition of Pareto-optimal fronts. Conventional multi-objective optimization algorithms can effectively attain these fronts, which max...

of 16

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Electronics - ISSN 2079-9292