The single chip microcomputer has many applications in the research and development of intelligent products and scientific and innovative products. How to improve the efficiency of development and design application effect in the design of single chip microcomputer is worth in-depth study. This paper takes the development of scientific and technological innovation products as the starting point, analyzes and studies how to effectively improve the development efficiency of MCU developers by using Proteus, and gives the specific design ideas and methods. Through the design and analysis of four actual MCU cases, the design efficiency and design effect of developers are verified. Through the statistics and analysis of the actual developer's development data, the design ideas and methods constructed in this paper can effectively improve the time and efficiency of single chip development, and have certain advantages and effects in innovative products, which can be widely used in single chip learning and education.
{"title":"Design and research of MCU innovation simulation based on the perspective of technological innovation product development","authors":"Qingquan Cui, Yanqiong Li, Ning Wang","doi":"10.1117/12.3032017","DOIUrl":"https://doi.org/10.1117/12.3032017","url":null,"abstract":"The single chip microcomputer has many applications in the research and development of intelligent products and scientific and innovative products. How to improve the efficiency of development and design application effect in the design of single chip microcomputer is worth in-depth study. This paper takes the development of scientific and technological innovation products as the starting point, analyzes and studies how to effectively improve the development efficiency of MCU developers by using Proteus, and gives the specific design ideas and methods. Through the design and analysis of four actual MCU cases, the design efficiency and design effect of developers are verified. Through the statistics and analysis of the actual developer's development data, the design ideas and methods constructed in this paper can effectively improve the time and efficiency of single chip development, and have certain advantages and effects in innovative products, which can be widely used in single chip learning and education.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siyuan Huang, Minqing Zhang, Xiong Zhang, Chao Jiang, Yongjun Kong, Fuqiang Di, Yan Ke
Deep learning technology has developed rapidly in recent years, and deep learning-based steganography and steganalysis techniques have also achieved fruitful results. In the past few years, the over-expanded structure of steganalyzers based on deep learning has led to huge computational and storage costs. In this article, we propose image steganalysis based on model compression, and apply the model compression method to image steganalysis to reduce the network infrastructure of the existing large-scale over-parameter steganalyzer based on deep learning. We conducted extensive experiments on the BOSSBase+BOWS2 dataset. As can be seen from the experiment, compared with the original steganalysis model, the model structure we proposed can achieve performance with fewer parameters and floating-point operations. This model has better portability and scalability.
{"title":"Image steganalysis based on model compression","authors":"Siyuan Huang, Minqing Zhang, Xiong Zhang, Chao Jiang, Yongjun Kong, Fuqiang Di, Yan Ke","doi":"10.1117/12.3031915","DOIUrl":"https://doi.org/10.1117/12.3031915","url":null,"abstract":"Deep learning technology has developed rapidly in recent years, and deep learning-based steganography and steganalysis techniques have also achieved fruitful results. In the past few years, the over-expanded structure of steganalyzers based on deep learning has led to huge computational and storage costs. In this article, we propose image steganalysis based on model compression, and apply the model compression method to image steganalysis to reduce the network infrastructure of the existing large-scale over-parameter steganalyzer based on deep learning. We conducted extensive experiments on the BOSSBase+BOWS2 dataset. As can be seen from the experiment, compared with the original steganalysis model, the model structure we proposed can achieve performance with fewer parameters and floating-point operations. This model has better portability and scalability.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As Internet technology is developed and applied, the problems of large amounts of real-time traffic data and many unknown attacks are becoming increasingly serious, and intrusion detection systems have increased in efficiency and effectiveness. In this paper, a real-time traffic intrusion detection method based on Inception-LSTM deep neural network combining CNN and LSTM is proposed for improving label-based intrusion detection performance. Network traffic records are converted into 2D gray scale graphs. It extracts network traffic features using image processing techniques with high generalization ability. Experimental validation is performed on the publicly available CIC-IDS-2017 dataset, and the results show that the proposed Inception-LSTM neural network improves the detection accuracy and F1-score by 0.5% and 0.7%, respectively; the results of the comparison between the detection done on real-time captured traffic data and the network security devices show that the method is effective and feasible.
{"title":"Real-time traffic intrusion detection based on CNN-LSTM deep neural networks","authors":"Runjie Liu, Yinpu Ma, Xu Gao, Lianji Zhang","doi":"10.1117/12.3031914","DOIUrl":"https://doi.org/10.1117/12.3031914","url":null,"abstract":"As Internet technology is developed and applied, the problems of large amounts of real-time traffic data and many unknown attacks are becoming increasingly serious, and intrusion detection systems have increased in efficiency and effectiveness. In this paper, a real-time traffic intrusion detection method based on Inception-LSTM deep neural network combining CNN and LSTM is proposed for improving label-based intrusion detection performance. Network traffic records are converted into 2D gray scale graphs. It extracts network traffic features using image processing techniques with high generalization ability. Experimental validation is performed on the publicly available CIC-IDS-2017 dataset, and the results show that the proposed Inception-LSTM neural network improves the detection accuracy and F1-score by 0.5% and 0.7%, respectively; the results of the comparison between the detection done on real-time captured traffic data and the network security devices show that the method is effective and feasible.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to meet the maintenance requirements of harsh environment and unattended equipment sites, it is proposed to use an embedded Web server as the core in the embedded target turntable system and use HTML web pages to design the human-computer interaction interface to facilitate cross-platform control. Deliver equipment software upgrades and equipment status monitoring, complete human-computer interaction, and achieve remote unmanned control. The article gives the key code for the server implementation. Through experiments, it is verified that the design scheme has little dependence on the control terminal platform and is reliable in operation. It is very suitable for promotion and application in monitoring and control and can improve equipment maintenance efficiency.
为满足恶劣环境和无人值守设备现场的维护要求,建议在嵌入式目标转台系统中以嵌入式 Web 服务器为核心,采用 HTML 网页设计人机交互界面,方便跨平台控制。提供设备软件升级和设备状态监控,完成人机交互,实现远程无人控制。文章给出了服务器实现的关键代码。通过实验验证,该设计方案对控制终端平台依赖性小,运行可靠。非常适合在监控领域推广应用,并能提高设备维护效率。
{"title":"Design of embedded target turntable system based on BS mode","authors":"Xiaojuan Chen, Shuai Lian","doi":"10.1117/12.3031923","DOIUrl":"https://doi.org/10.1117/12.3031923","url":null,"abstract":"In order to meet the maintenance requirements of harsh environment and unattended equipment sites, it is proposed to use an embedded Web server as the core in the embedded target turntable system and use HTML web pages to design the human-computer interaction interface to facilitate cross-platform control. Deliver equipment software upgrades and equipment status monitoring, complete human-computer interaction, and achieve remote unmanned control. The article gives the key code for the server implementation. Through experiments, it is verified that the design scheme has little dependence on the control terminal platform and is reliable in operation. It is very suitable for promotion and application in monitoring and control and can improve equipment maintenance efficiency.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fuqiang Di, Tianxue Li, Pan Yang, Siyuan Huang, Yongjun Kong
Reversible data hiding in images has become one of the research hotspots in the field of information hiding. JPEG images are widely used on social networks, and the research on reversible information hiding technology for JPEG images is of great significance. The existing reversible information hiding algorithms for JPEG images generally lack robustness, which affects the practical application of the algorithms. Inspired by the robust reversible algorithm for spatial domain images, this paper introduces a two-stage embedding method into JPEG images and proposes a new reversible data hiding algorithm for JPEG images based on two-stage embedding. First, apply robust watermarking technology to embed watermark information in the image to achieve robustness, and then apply reversible watermarking technology to embed distortion information to realize reversibility. Experiments have shown that, even if the carrier image is attacked, robust watermarks can still be extracted correctly. Although image restoration cannot be completed due to the destruction of reversible watermarks, the visual quality of the restored image can meet the requirements.
{"title":"Reversible data hiding in JPEG images based on two-stage embedding","authors":"Fuqiang Di, Tianxue Li, Pan Yang, Siyuan Huang, Yongjun Kong","doi":"10.1117/12.3032095","DOIUrl":"https://doi.org/10.1117/12.3032095","url":null,"abstract":"Reversible data hiding in images has become one of the research hotspots in the field of information hiding. JPEG images are widely used on social networks, and the research on reversible information hiding technology for JPEG images is of great significance. The existing reversible information hiding algorithms for JPEG images generally lack robustness, which affects the practical application of the algorithms. Inspired by the robust reversible algorithm for spatial domain images, this paper introduces a two-stage embedding method into JPEG images and proposes a new reversible data hiding algorithm for JPEG images based on two-stage embedding. First, apply robust watermarking technology to embed watermark information in the image to achieve robustness, and then apply reversible watermarking technology to embed distortion information to realize reversibility. Experiments have shown that, even if the carrier image is attacked, robust watermarks can still be extracted correctly. Although image restoration cannot be completed due to the destruction of reversible watermarks, the visual quality of the restored image can meet the requirements.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet has provided great convenience for people, but at the same time, there have also been some problems that infringe on people's interests. How to effectively protect intellectual property rights and prevent works from being tampered with without permission is one of the issues that the Internet is concerned about. Information hiding is a method of hiding secret information into a general carrier of information, in order to prevent others from discovering it during transmission. Therefore, this article proposes a method for hiding encrypted images based on the random LSB matching algorithm. The experimental results show that this method can achieve better hiding effects.
{"title":"Method and design of encrypted image hiding based on random LSB matching","authors":"Feng Yun","doi":"10.1117/12.3032037","DOIUrl":"https://doi.org/10.1117/12.3032037","url":null,"abstract":"The Internet has provided great convenience for people, but at the same time, there have also been some problems that infringe on people's interests. How to effectively protect intellectual property rights and prevent works from being tampered with without permission is one of the issues that the Internet is concerned about. Information hiding is a method of hiding secret information into a general carrier of information, in order to prevent others from discovering it during transmission. Therefore, this article proposes a method for hiding encrypted images based on the random LSB matching algorithm. The experimental results show that this method can achieve better hiding effects.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Trusted Execution Environment (TEE) find extensive applications in various scenarios such as secure cloud services, databases, big data computing, and blockchain. They establish a secure operational zone, often referred to as an Enclave, for applications. The Keystone Trusted Execution Environment offers a range of security primitives, including memory isolation, secure boot, and remote authentication. It stands out as the first open-source framework under the RISC-V architecture designed for constructing customized TEEs and is currently the mainstream TEE in the RISC-V architecture. However, Keystone itself does not provide protection for Enclaves or security monitors against Cache timing attacks. Recent research has demonstrated that malicious actors, leveraging Spectre attacks, can use Cache timing attack techniques to detect Enclave data through shared caches. This paper proposes a Keystone extension design, calling the extended framework Keyson-LLCI (Last Leavel Cache Isolation). Through security analysis, we prove that it can isolate enclaves and operating systems into different cache paths at the LLC level, thus eliminating the influence of cache side channels and increasing the isolation and security of enclaves. We implemented this hardware extension on an FPGA development board and conducted performance testing and IOZone testing. The test results indicate that Keystone-LLCI can effectively defend against Cache timing attacks, with a performance loss of approximately 14%. The latency of read and write operations increased by 12.4% and 14.1%, respectively. It represents an extension design with relatively low performance loss.
{"title":"A keystone extension to defend against cache timing attacks","authors":"Kai Nie, Rongcai Zhao, Xiao Zhang, Haoyang Chai","doi":"10.1117/12.3032012","DOIUrl":"https://doi.org/10.1117/12.3032012","url":null,"abstract":"Trusted Execution Environment (TEE) find extensive applications in various scenarios such as secure cloud services, databases, big data computing, and blockchain. They establish a secure operational zone, often referred to as an Enclave, for applications. The Keystone Trusted Execution Environment offers a range of security primitives, including memory isolation, secure boot, and remote authentication. It stands out as the first open-source framework under the RISC-V architecture designed for constructing customized TEEs and is currently the mainstream TEE in the RISC-V architecture. However, Keystone itself does not provide protection for Enclaves or security monitors against Cache timing attacks. Recent research has demonstrated that malicious actors, leveraging Spectre attacks, can use Cache timing attack techniques to detect Enclave data through shared caches. This paper proposes a Keystone extension design, calling the extended framework Keyson-LLCI (Last Leavel Cache Isolation). Through security analysis, we prove that it can isolate enclaves and operating systems into different cache paths at the LLC level, thus eliminating the influence of cache side channels and increasing the isolation and security of enclaves. We implemented this hardware extension on an FPGA development board and conducted performance testing and IOZone testing. The test results indicate that Keystone-LLCI can effectively defend against Cache timing attacks, with a performance loss of approximately 14%. The latency of read and write operations increased by 12.4% and 14.1%, respectively. It represents an extension design with relatively low performance loss.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiajian Li, Chenlin Huang, Jun Luo, Jinzhu Kong, Yiwen Ji, Yongpeng Liu, Kaikai Sun, Shuyang Deng
Traditional Trusted Computing is mainly implemented in the form of boards, chips, etc., and the requirements of hardware modification have greatly limited the widely use of trusted computing. To cope with the dilemma, the idea of designing “Trusted Computing on Chips” becomes a trend with the development of the build-in security module in CPUs. The main challenge lies on how to make full use of processor security features and design a dual-computing security system that meets the requirements of Trusted Computing 3.0. At present, the built-in secure and cryptographic units on processors, such as Phytium and Loongson, and the supported Trust Execution Environment have already provided the foundation for endogenous trusted computing. In this paper, we propose TeTPCM: a TEE Based Endogenous Trusted Platform Control Module (TPCM), which builds an endogenous trusted computing architecture by the collaboration of the TEE and the SoC on phytium processor. Experimental analysis shows that compared with the general-purpose trusted computing chip, endogenous trusted TPCM does not need additional hardware, and is characterized by strong capability, high performance, good scalability, and has better application prospects.
传统的可信计算主要以板卡、芯片等形式实现,对硬件改造的要求极大地限制了可信计算的广泛应用。为应对这一困境,随着 CPU 内置安全模块的发展,设计 "芯片上的可信计算 "成为一种趋势。主要的挑战在于如何充分利用处理器的安全特性,设计出符合可信计算 3.0 要求的双计算安全系统。目前,Phytium 和 Loongson 等处理器的内置安全和加密单元以及支持的可信执行环境已经为内生可信计算奠定了基础。本文提出了 TeTPCM:基于 TEE 的内生可信平台控制模块 (TPCM),通过 TEE 与 phytium 处理器上的 SoC 协同工作,构建内生可信计算架构。实验分析表明,与通用可信计算芯片相比,内生可信TPCM无需额外硬件,具有能力强、性能高、可扩展性好等特点,具有更好的应用前景。
{"title":"TeTPCM: building endogenous trusted computing on trusted execution environment","authors":"Jiajian Li, Chenlin Huang, Jun Luo, Jinzhu Kong, Yiwen Ji, Yongpeng Liu, Kaikai Sun, Shuyang Deng","doi":"10.1117/12.3031944","DOIUrl":"https://doi.org/10.1117/12.3031944","url":null,"abstract":"Traditional Trusted Computing is mainly implemented in the form of boards, chips, etc., and the requirements of hardware modification have greatly limited the widely use of trusted computing. To cope with the dilemma, the idea of designing “Trusted Computing on Chips” becomes a trend with the development of the build-in security module in CPUs. The main challenge lies on how to make full use of processor security features and design a dual-computing security system that meets the requirements of Trusted Computing 3.0. At present, the built-in secure and cryptographic units on processors, such as Phytium and Loongson, and the supported Trust Execution Environment have already provided the foundation for endogenous trusted computing. In this paper, we propose TeTPCM: a TEE Based Endogenous Trusted Platform Control Module (TPCM), which builds an endogenous trusted computing architecture by the collaboration of the TEE and the SoC on phytium processor. Experimental analysis shows that compared with the general-purpose trusted computing chip, endogenous trusted TPCM does not need additional hardware, and is characterized by strong capability, high performance, good scalability, and has better application prospects.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During teleoperation tasks such as disinfection and cleaning inside the space station, the operator on the ground controls the robotic arm within the experimental cabinet to maintain continuous contact with areas of different texture properties by operating the handle of a haptic device. Therefore, real-time and stable haptic feedback can help operators distinguish between different contact areas and assist in completing various teleoperation tasks. This article constructs a 2.5D virtual model integrating shape and texture using curved texture images based on a visual approach. It proposes a textured haptic rendering algorithm, which includes two steps of collision detection and collision response, to achieve virtual force computation integrating contact force and texture force. Finally, the real-time performance and stability of the algorithm are evaluated through subjective and objective experiments.
{"title":"Haptic texture rendering based on vision","authors":"Meiqi Zhao, Ge Yu, Yu He","doi":"10.1117/12.3032085","DOIUrl":"https://doi.org/10.1117/12.3032085","url":null,"abstract":"During teleoperation tasks such as disinfection and cleaning inside the space station, the operator on the ground controls the robotic arm within the experimental cabinet to maintain continuous contact with areas of different texture properties by operating the handle of a haptic device. Therefore, real-time and stable haptic feedback can help operators distinguish between different contact areas and assist in completing various teleoperation tasks. This article constructs a 2.5D virtual model integrating shape and texture using curved texture images based on a visual approach. It proposes a textured haptic rendering algorithm, which includes two steps of collision detection and collision response, to achieve virtual force computation integrating contact force and texture force. Finally, the real-time performance and stability of the algorithm are evaluated through subjective and objective experiments.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a joint angle selection method basedIn this paper, a joint angle selection method based on Conformal Geometric Algebra (CGA) is proposed for the inverse kinematics model of robot. Then a CGA library is developed and used to construct various kinematic models of 6R serial manipulators. The software of spatial 6R serial manipulator kinematic simulation is developed by Qt and OpenGL technology. This software includes the above-mentioned CGA library and kinematic models. It can display the STL format robot model in three dimensions and modify the size of the model and plan its trajectory.
{"title":"Design of kinematics simulation software for 6R series robot","authors":"WenBin Wu, Zheng Zhang","doi":"10.1117/12.3031917","DOIUrl":"https://doi.org/10.1117/12.3031917","url":null,"abstract":"In this paper, a joint angle selection method basedIn this paper, a joint angle selection method based on Conformal Geometric Algebra (CGA) is proposed for the inverse kinematics model of robot. Then a CGA library is developed and used to construct various kinematic models of 6R serial manipulators. The software of spatial 6R serial manipulator kinematic simulation is developed by Qt and OpenGL technology. This software includes the above-mentioned CGA library and kinematic models. It can display the STL format robot model in three dimensions and modify the size of the model and plan its trajectory.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}