The atmospheric coherence length instrument, as one of the effective means for assessing atmospheric turbulence, plays a crucial role in the fields of optics and astronomical observations. Existing atmospheric coherence length measurement systems require on-site measurements, posing various inconveniences. In response to this issue, a method for network remote control of the atmospheric coherence length instrument is proposed, accompanied by the development of a corresponding remote control network software system. The introduced system incorporates a remote-control method for the atmospheric coherence length instrument based on the 4G network. The device connects to the Internet via a 4G network, facilitating bidirectional communication between the mobile platform and the atmospheric coherence length instrument through a network server. This paper initially elucidates the communication principles and implementation methods of the remote-control system, followed by the design and development of software system modules for both the device and the Android control side. Rigorous testing demonstrates the method's enhanced instrument versatility and adaptability, enabling data measurements even in extreme and challenging environments. Leveraging IoT technology, the system efficiently allows users to remotely control the atmospheric coherence length instrument, significantly reducing manual management costs.
{"title":"Atmospheric coherence length instrument remote control network software system design","authors":"Lijun Chen, Feng He, Zhigang Huang, Zaihong Hou","doi":"10.1117/12.3032075","DOIUrl":"https://doi.org/10.1117/12.3032075","url":null,"abstract":"The atmospheric coherence length instrument, as one of the effective means for assessing atmospheric turbulence, plays a crucial role in the fields of optics and astronomical observations. Existing atmospheric coherence length measurement systems require on-site measurements, posing various inconveniences. In response to this issue, a method for network remote control of the atmospheric coherence length instrument is proposed, accompanied by the development of a corresponding remote control network software system. The introduced system incorporates a remote-control method for the atmospheric coherence length instrument based on the 4G network. The device connects to the Internet via a 4G network, facilitating bidirectional communication between the mobile platform and the atmospheric coherence length instrument through a network server. This paper initially elucidates the communication principles and implementation methods of the remote-control system, followed by the design and development of software system modules for both the device and the Android control side. Rigorous testing demonstrates the method's enhanced instrument versatility and adaptability, enabling data measurements even in extreme and challenging environments. Leveraging IoT technology, the system efficiently allows users to remotely control the atmospheric coherence length instrument, significantly reducing manual management costs.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"6 1","pages":"131751O - 131751O-7"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiang Gao, Ryan A. Ebardo, Mengvi P. Gatpandan, Maryli F. Rosas, Paulino H. Gatpandan
With the implementation of graded diagnosis and treatment medical reform, the outpatient service volume of community health service centers has increased significantly, which has brought opportunities and challenges to community health service centers. Outpatient service is the first key link for health institutions to receive patients and the first portal for patients to get to know health institutions. The quality of patients' medical service in outpatient service is directly related to the first impression of community health service centers in patients' minds. In order to better serve patients, improve the medical environment, improve patients' trust in primary care, enhance the internal strength and competitiveness of hospitals, optimize the medical treatment process, change the management mode, and carry out standardized management is a step that community health service centers must take now. Therefore, developing an electronic medical record management information system suitable for the needs of community health service centers can serve medical staff and patients, and reduce the workload of relevant personnel to provide more quality services for patients.
{"title":"Design and implementation of electronic medical record information management system of community health service center","authors":"Xiang Gao, Ryan A. Ebardo, Mengvi P. Gatpandan, Maryli F. Rosas, Paulino H. Gatpandan","doi":"10.1117/12.3031936","DOIUrl":"https://doi.org/10.1117/12.3031936","url":null,"abstract":"With the implementation of graded diagnosis and treatment medical reform, the outpatient service volume of community health service centers has increased significantly, which has brought opportunities and challenges to community health service centers. Outpatient service is the first key link for health institutions to receive patients and the first portal for patients to get to know health institutions. The quality of patients' medical service in outpatient service is directly related to the first impression of community health service centers in patients' minds. In order to better serve patients, improve the medical environment, improve patients' trust in primary care, enhance the internal strength and competitiveness of hospitals, optimize the medical treatment process, change the management mode, and carry out standardized management is a step that community health service centers must take now. Therefore, developing an electronic medical record management information system suitable for the needs of community health service centers can serve medical staff and patients, and reduce the workload of relevant personnel to provide more quality services for patients.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"25 s58","pages":"131751J - 131751J-7"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The load balancing strategy in the traditional network architecture system is limited to the limitations of the closed operating system of the network device and cannot effectively meet various communication environments. In SDN, a new network architecture with open programming, the load balancing system architecture of the SDN data center is designed. The traffic classification module is used to distinguish large and small flows. A load balancing mechanism based on the improved ant colony optimization is proposed for the forwarding of large flows. A weighted ECMP load balancing mechanism is used for the forwarding of small flows. The improved ant colony optimization considers the difference in link load status and optimizes the parameters of the ant colony optimization. Through experimental simulation and comparison with traditional load balancing algorithms ECMP and DLB algorithms, the advantages of the optimized ant colony optimization in terms of delay jitter, average link utilization and other indicators are verified.
传统网络架构系统中的负载均衡策略受限于网络设备封闭操作系统的限制,无法有效满足各种通信环境。在 SDN 这种开放式编程的新型网络架构中,设计了 SDN 数据中心的负载均衡系统架构。流量分类模块用于区分大流量和小流量。针对大流量的转发,提出了一种基于改进蚁群优化的负载平衡机制。小流量转发采用加权 ECMP 负载平衡机制。改进的蚁群优化考虑了链路负载状态的差异,并优化了蚁群优化的参数。通过实验仿真以及与传统负载均衡算法 ECMP 和 DLB 算法的比较,验证了优化后的蚁群优化在时延抖动、平均链路利用率等指标上的优势。
{"title":"Load-balancing system for SDN data center based on improved ant colony optimization","authors":"Yue Zhou, Wenlong Wu","doi":"10.1117/12.3031927","DOIUrl":"https://doi.org/10.1117/12.3031927","url":null,"abstract":"The load balancing strategy in the traditional network architecture system is limited to the limitations of the closed operating system of the network device and cannot effectively meet various communication environments. In SDN, a new network architecture with open programming, the load balancing system architecture of the SDN data center is designed. The traffic classification module is used to distinguish large and small flows. A load balancing mechanism based on the improved ant colony optimization is proposed for the forwarding of large flows. A weighted ECMP load balancing mechanism is used for the forwarding of small flows. The improved ant colony optimization considers the difference in link load status and optimizes the parameters of the ant colony optimization. Through experimental simulation and comparison with traditional load balancing algorithms ECMP and DLB algorithms, the advantages of the optimized ant colony optimization in terms of delay jitter, average link utilization and other indicators are verified.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"9 1","pages":"1317514 - 1317514-7"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Federal learning is an effective distributed learning technology that allows machine learning model training while protecting data privacy. However, with the increase of the number of user -side devices, the calculation burden of users in federal learning will increase. Researchers explore the use of dimension reduction technology to reduce the calculation burden required for model training, but this triggers a problem with low accuracy. This article extracts the dimensions of gradient data by improving the main component analysis method to extract the dimensions of gradient data and reduce communication and calculation burden while protecting the privacy of the client. The experimental results of this article show that under large -scale data sets, the method of this article increases the speed of 50%training and reaches 96% accuracy.
{"title":"Privacy federation learning framework based on principal component analysis","authors":"Jiaheng Yang, Xia Feng, Yueming Liu","doi":"10.1117/12.3031919","DOIUrl":"https://doi.org/10.1117/12.3031919","url":null,"abstract":"Federal learning is an effective distributed learning technology that allows machine learning model training while protecting data privacy. However, with the increase of the number of user -side devices, the calculation burden of users in federal learning will increase. Researchers explore the use of dimension reduction technology to reduce the calculation burden required for model training, but this triggers a problem with low accuracy. This article extracts the dimensions of gradient data by improving the main component analysis method to extract the dimensions of gradient data and reduce communication and calculation burden while protecting the privacy of the client. The experimental results of this article show that under large -scale data sets, the method of this article increases the speed of 50%training and reaches 96% accuracy.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"3 10","pages":"131750E - 131750E-9"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of digital media technology, the security and copyright protection of media files have become particularly important. This article proposes an encrypted digital watermark technology based on HTML5 Canvas and JavaScript, which can embed and extract digital watermarks from images in the field of front-end development. In addition, this article discusses the necessity of combining encryption technology with digital watermark technology to provide a security protection mechanism for data security. The paper then introduces in detail the process of using HTML5 Canvas and JavaScript to operate image pixels to implement encrypted digital watermark embedding and extraction and achieve covert embedding of data by modifying the Least Significant Bit (LSB) of image pixels. Finally, by comparing the visual differences of the images before and after the experiment and measuring the PSNR value of each group of experimental images, it can be concluded that the encrypted digital watermark technology can effectively hide and transmit encrypted information while maintaining the visual quality of the image and is suitable for copyright protection of images. and covert communication, etc., which have high practical application value in the field of Web front-end.
{"title":"Securing digital media: embedding and extracting encrypted digital watermarks using HTML5 Canvas","authors":"Tianbao Xue, Quanxiang Lan","doi":"10.1117/12.3031888","DOIUrl":"https://doi.org/10.1117/12.3031888","url":null,"abstract":"With the development of digital media technology, the security and copyright protection of media files have become particularly important. This article proposes an encrypted digital watermark technology based on HTML5 Canvas and JavaScript, which can embed and extract digital watermarks from images in the field of front-end development. In addition, this article discusses the necessity of combining encryption technology with digital watermark technology to provide a security protection mechanism for data security. The paper then introduces in detail the process of using HTML5 Canvas and JavaScript to operate image pixels to implement encrypted digital watermark embedding and extraction and achieve covert embedding of data by modifying the Least Significant Bit (LSB) of image pixels. Finally, by comparing the visual differences of the images before and after the experiment and measuring the PSNR value of each group of experimental images, it can be concluded that the encrypted digital watermark technology can effectively hide and transmit encrypted information while maintaining the visual quality of the image and is suitable for copyright protection of images. and covert communication, etc., which have high practical application value in the field of Web front-end.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"116 3","pages":"1317516 - 1317516-8"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Accompanied by the rapid development of the intelligent automobile industry, unmanned driving has also become one of the important research fields of intelligent automobiles. As the future direction of automobile development, its advantage not only lies in the fact that it can enhance the traffic flow per unit time, but also can track and optimize the vehicle driving route and road safety, so as to reduce the development of traffic accidents and safety hazards. Based on this, this paper discusses the unmanned path tracking optimization control system based on MPC algorithm, and illustrates the superiority of this method through simulation, so as to provide certain reference for unmanned path tracking optimization.
{"title":"Construction of unmanned path tracking optimization control system based on MPC algorithm","authors":"Zihao Wen, Xinhong Liu","doi":"10.1117/12.3031970","DOIUrl":"https://doi.org/10.1117/12.3031970","url":null,"abstract":"Accompanied by the rapid development of the intelligent automobile industry, unmanned driving has also become one of the important research fields of intelligent automobiles. As the future direction of automobile development, its advantage not only lies in the fact that it can enhance the traffic flow per unit time, but also can track and optimize the vehicle driving route and road safety, so as to reduce the development of traffic accidents and safety hazards. Based on this, this paper discusses the unmanned path tracking optimization control system based on MPC algorithm, and illustrates the superiority of this method through simulation, so as to provide certain reference for unmanned path tracking optimization.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"362 6","pages":"131751M - 131751M-6"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yueyang Shang, Fuwei Wang, Yunfei Zhang, Dong Li, Wenbin Tan
Malicious code can reflect its malicious behavior through dynamic API sequences and static PE header information, and deep learning algorithms have made progress in such malicious code detection. The article designs a 1D-CNN-BiGRU network model based on one-dimensional convolutional neural networks and bidirectional gated recurrent neural networks. The model takes API call sequences and PE header information as feature inputs and undergoes convolutional computation and recurrent neural network learning training to further learn the features of malicious code. Through the analysis of experimental results, the correctness of the malicious code verification of this model is demonstrated. The detection accuracy of normal samples on dynamic API call sequences is over 97%, and the accuracy on static PE structures is 95.64%. It has good performance in malicious code detection.
恶意代码可以通过动态 API 序列和静态 PE 头信息反映其恶意行为,深度学习算法在此类恶意代码检测方面取得了进展。文章设计了一种基于一维卷积神经网络和双向门控递归神经网络的 1D-CNN-BiGRU 网络模型。该模型以 API 调用序列和 PE 头信息为特征输入,经过卷积计算和递归神经网络学习训练,进一步学习恶意代码的特征。通过对实验结果的分析,证明了该模型对恶意代码验证的正确性。对动态 API 调用序列正常样本的检测准确率超过 97%,对静态 PE 结构的检测准确率为 95.64%。该模型在恶意代码检测方面具有良好的性能。
{"title":"Research on malicious code detection and classification based on dynamic and static features","authors":"Yueyang Shang, Fuwei Wang, Yunfei Zhang, Dong Li, Wenbin Tan","doi":"10.1117/12.3031906","DOIUrl":"https://doi.org/10.1117/12.3031906","url":null,"abstract":"Malicious code can reflect its malicious behavior through dynamic API sequences and static PE header information, and deep learning algorithms have made progress in such malicious code detection. The article designs a 1D-CNN-BiGRU network model based on one-dimensional convolutional neural networks and bidirectional gated recurrent neural networks. The model takes API call sequences and PE header information as feature inputs and undergoes convolutional computation and recurrent neural network learning training to further learn the features of malicious code. Through the analysis of experimental results, the correctness of the malicious code verification of this model is demonstrated. The detection accuracy of normal samples on dynamic API call sequences is over 97%, and the accuracy on static PE structures is 95.64%. It has good performance in malicious code detection.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"12 2","pages":"131750C - 131750C-6"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Power supply rejection ratio (PSRR) and noise are important parameters of low voltage difference linear regulators (LDO), which are widely used in audio circuits. In order to achieve high PSRR and low noise, PSRR enhancement circuit and filter circuit are introduced in the LDO circuit designed in this paper. The LDO circuit designed in this paper is realized by MGN 0.35um process. The simulation analysis of the circuit by Cadence tool shows that the PSRR of the LDO circuit is -79dB at low frequency, which is better than -60dB at high frequency. The output noise is 0.395 uv/ √Hz at 1KHz, and the noise in the frequency range of 10Hz~100 KHz is as low as 32.5uVRMS.
{"title":"Design of LDO circuit with low noise and high PSRR","authors":"Xiao Li, Shengming Huang, Yingying Yao","doi":"10.1117/12.3030321","DOIUrl":"https://doi.org/10.1117/12.3030321","url":null,"abstract":"Power supply rejection ratio (PSRR) and noise are important parameters of low voltage difference linear regulators (LDO), which are widely used in audio circuits. In order to achieve high PSRR and low noise, PSRR enhancement circuit and filter circuit are introduced in the LDO circuit designed in this paper. The LDO circuit designed in this paper is realized by MGN 0.35um process. The simulation analysis of the circuit by Cadence tool shows that the PSRR of the LDO circuit is -79dB at low frequency, which is better than -60dB at high frequency. The output noise is 0.395 uv/ √Hz at 1KHz, and the noise in the frequency range of 10Hz~100 KHz is as low as 32.5uVRMS.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"38 5","pages":"131633H - 131633H-6"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141384597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The issues of low temperature control accuracy and poor stability in industrial water temperature control systems are addressed in this article. A PID-based temperature control system that combines Model Predictive Control (MPC) with PID control is proposed. A simulation system for water temperature control is designed using Simulink, and adaptive tuning of PID parameters is implemented. In the process of constructing the experimental platform, temperature changes are controlled by driving the hot and cold valves with a temperature control board. It is demonstrated that high temperature control accuracy, fast heating rate, and good stability are achieved by the proposed system, thus meeting the temperature control requirements of the system. The physical model and linearized model of an industrial boiler are introduced, and the discretization of the model and its improvements are discussed. Additionally, the working principles of the PID control algorithm and MPC module are outlined, and experimental results and analysis are presented.
{"title":"Design and validation of industrial equipment based on MPC-PID control","authors":"zhiyuan zhou, Yi Bao, ruoxiao qin","doi":"10.1117/12.3030647","DOIUrl":"https://doi.org/10.1117/12.3030647","url":null,"abstract":"The issues of low temperature control accuracy and poor stability in industrial water temperature control systems are addressed in this article. A PID-based temperature control system that combines Model Predictive Control (MPC) with PID control is proposed. A simulation system for water temperature control is designed using Simulink, and adaptive tuning of PID parameters is implemented. In the process of constructing the experimental platform, temperature changes are controlled by driving the hot and cold valves with a temperature control board. It is demonstrated that high temperature control accuracy, fast heating rate, and good stability are achieved by the proposed system, thus meeting the temperature control requirements of the system. The physical model and linearized model of an industrial boiler are introduced, and the discretization of the model and its improvements are discussed. Additionally, the working principles of the PID control algorithm and MPC module are outlined, and experimental results and analysis are presented.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"42 1","pages":"1316309 - 1316309-6"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141385743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zihao Shi, Changqing Gao, Hangxin Tang, Ruinian Zhang, Shengfeng Ren, Bo Yang
To address the accuracy and cost of indoor localization technology, ZigBee technology is used and proposed to design location fingerprinting localization combined with filter algorithm. Considering that the indoor environment is more complex, buildings and obstacles and other factors lead to unstable RSSI, therefore, the ZigBee technology firstly establishes a location fingerprint database in the localization area, and then receives the RSSI value by using the mobile node, and then the received RSSI is processed by the filter algorithm, and then matches with the data of the established fingerprint database to calculate and get the location coordinates, and finally analyzes the localization results of the several filters processed. The localization results of several filters are lastly analyzed. Through the experiment, it is concluded that the localization accuracy obtained by using Kalman filter is high.
{"title":"Analysis of the application of filter algorithm in indoor fingerprinting localization","authors":"Zihao Shi, Changqing Gao, Hangxin Tang, Ruinian Zhang, Shengfeng Ren, Bo Yang","doi":"10.1117/12.3030260","DOIUrl":"https://doi.org/10.1117/12.3030260","url":null,"abstract":"To address the accuracy and cost of indoor localization technology, ZigBee technology is used and proposed to design location fingerprinting localization combined with filter algorithm. Considering that the indoor environment is more complex, buildings and obstacles and other factors lead to unstable RSSI, therefore, the ZigBee technology firstly establishes a location fingerprint database in the localization area, and then receives the RSSI value by using the mobile node, and then the received RSSI is processed by the filter algorithm, and then matches with the data of the established fingerprint database to calculate and get the location coordinates, and finally analyzes the localization results of the several filters processed. The localization results of several filters are lastly analyzed. Through the experiment, it is concluded that the localization accuracy obtained by using Kalman filter is high.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"45 5","pages":"131634U - 131634U-5"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141383043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}