References
- C. Song et al., Application and development of ground source heat pump technology in China, Prot. Control Mod. Power Syst. 6 (1), 17 (2021). DOI: https://doi.org/10.1186/s41601-021-00195-x.
- M. Hamidnia, Y. Luo, and X. D. Wang, Application of micro nano technology for thermal management of high power LED packaging: A review, Appl. Therm. Eng. 145 (21), 637 (2018). DOI: https://doi.org/10.1016/j.applthermaleng.2018.09.078.
- B. Gert-Peter, Technology in sports and exercise: Advantage for performance and athlete's protection or increased risk for injury? ISBS Proc. Arch. 35 (1), 294 (2017).
- Z. Zhao, Mobile social networks: Emerging power for environmental protection practices, Environ. Sci. Technol. 51 (4), 26 (2017).
- D. Inoyatov, Methods of protection of the exterior walls of the exploited buildings from moistening with grunt moisture, Intern. J. Sci. Tech. Res. 9 (9), 301 (2020).
- C. A. Lefebvre, M. J. Luis, and L. Rubio, Implementation of a fast relative digital temperature sensor to achieve thermal protection in Zynq SoC technology, Microelectron. Reliab. 79 (Dec), 433 (2017). DOI: https://doi.org/10.1016/j.microrel.2017.05.029.
- S. Lazem, and S. Dray, Baraza! human-computer interaction education in africa, interactions. 25 (2), 74 (2018). DOI: https://doi.org/10.1145/3178562.
- J. Evans, and G. Rolan, Beyond findings: Conversations with experts, Preserv. Digital Tech. Cul. 47 (2), 60 (2018). DOI: https://doi.org/10.1515/pdtc-2018-0017.
- D. Kusumawardhani, and D. C. Masyithah, Security and privacy cloud storage as a personal digital archive storage media, RLJ. 4 (2), 167 (2019). DOI: https://doi.org/10.20473/rlj.V4-I2.2018.167-173.
- M. Baykara, and S. R. Da, A novel hybrid approach for detection of web- based attacks in intrusion detection systems, IJCNA 4 (2), 62 (2017). DOI: https://doi.org/10.22247/ijcna/2017/48968.
- K. Y. Tsai, Android app copy protection mechanism with semi-trusted loader, J. Internet Tech. 19 (1), 65 (2018).
- Z. P. Emily, Mitigating excessive idling of transit buses, Transp. Res. Rec. 2143 (1), 142 (2018).
- F. Carbone, F. Nemore, and G. Villani, Public and private: The archive of vincenzo federici and the archives of Sapienza university of Rome. Protection Access Valorization, A 28 (1), 187 (2018). DOI: https://doi.org/10.33700/2670-451X.28.1.187-194(2018).
- K. S. Raju, P. Sonali, and D. N. Kumar, Ranking of CMIP5-based global climate models for India using compromise programming, Theor. Appl. Climatol. 128 (3-4), 563 (2017). DOI: https://doi.org/10.1007/s00704-015-1721-6.
- R. Standfield, Archives of protection: Language, dispossession, and resistance in 1840s port phillip district and new zealand, Pacific Historical Rev. 87 (1), 54 (2018). DOI: https://doi.org/10.1525/phr.2018.87.1.54.
- J. Y. Choi, Structure optimization of esd diodes for input protection of cmos rf ics, J. Semiconduct.Tech. Sci. 17 (3), 401 (2017).
- C. Jian, Z. H. Lv, and H. B. Song, Design of personnel big data management system based on blockchain, Future Gener. Comput. Syst. 101, 1122 (2019).
- S.-B. Tsai et al., Using the fuzzy dematel to determine environmental performance: A case of printed circuit board industry in Taiwan, PLoS One. 10 (6), e0129153 (2015). DOI: https://doi.org/10.1371/journal.pone.0129153.
- B. Assefa et al., Review on blockchain technology and its application to the simple analysis of intellectual property protection, IJCSE. 22 (4), 437 (2020). DOI: https://doi.org/10.1504/IJCSE.2020.10031602.
- N. Made, A. Wiryasa, and N. Ketut, Innovative products of artificial natural stone: Alternative solutions for building material needs and environmental protection, Solid State Tech. 63 (6), 859 (2020).
- L. Dariz et al., A joint safety and security analysis of message protection for can bus protocol, Adv. Sci. Technol. Eng. Syst. J. 3 (1), 384 (2018). DOI: https://doi.org/10.25046/aj030147.
- S. A. Kulyukhin et al., Some technical solutions for environmental protection system during accidents at nuclear power plants, WJET. 05 (04), 1 (2017). DOI: https://doi.org/10.4236/wjet.2017.54B001.
- Z. Feng, J. Zhao, and L. Chen, Maintenance technology research of power switch based on static multicast search, Dianli Xitong Baohu yu Kongzhi Power System Protection and Control 47 (2), 182 (2019).
- W. Harmata, and M. Witczak, Defence against weapons of mass destruction. technical and functional solutions in personal protection for territorial defence forces, Biuletyn. WAT. 67 (2), 145 (2018). DOI: https://doi.org/10.5604/01.3001.0012.0984.
- K. Sobczyk, R. Chmielewski, and K. Duda, The concept of a prefabricated structure for protection of critical infrastructure facilities, Biuletyn. WAT. 67 (2), 133 (2018). DOI: https://doi.org/10.5604/01.3001.0012.0979.
- N. A. Vysotskaya, and E. V. Piskun, The main factors of adverse environmental impact of potash production and methods of environmental protection, Gorn. Nauki. Tehnol. 4 (3), 172 (2020). DOI: https://doi.org/10.17073/2500-0632-2019-3-172-180.
- V. I. Antonov et al., Recognition of weak harmonic signal components in generator protection against single-phase earth fault, Power Technol. Eng. 52 (2), 231 (2018). DOI: https://doi.org/10.1007/s10749-018-0937-x.
- S.-B. Tsai et al., Using a mixed model to evaluate job satisfaction in high-tech industries, PLoS One. 11 (5), e0154071 (2016). DOI: https://doi.org/10.1371/journal