Pub Date : 2023-01-01DOI: 10.22247/ijcna/2023/218517
Trifa S. Othman, Saman M. Abdullah
– The Internet of Things (IoT) and its connected objects have resource limitations, which lead to weak security concerns over the IoT infrastructures. Therefore, the IoT networks should always be attached with security solutions. One of the promising security solutions is intrusion detection system (IDS). Machine Learning (ML) algorithms become one of the most significant techniques for building an intelligent IDS based model for attack classification and/or identification. To keep the validation of the ML based IDS, it is essential to train the utilized ML algorithms with a dataset that cover most recent behaviors of IoT based attacks. This work employed an up-to-date dataset known as IoT23, which contains most recent network flows of the IoT objects as benign and other flows as attacks. This work utilized different data preprocessing theories such data cleansing, data coding, and SMOT theory for imbalanced data, and investigating their impact on the accuracy rate. The study's findings show that the intelligent IDS can effectively detect attacks using binary classification and identify attacks using multiclass classification.
{"title":"Intrusion Detection Systems for IoT Attack Detection and Identification Using Intelligent Techniques","authors":"Trifa S. Othman, Saman M. Abdullah","doi":"10.22247/ijcna/2023/218517","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218517","url":null,"abstract":"– The Internet of Things (IoT) and its connected objects have resource limitations, which lead to weak security concerns over the IoT infrastructures. Therefore, the IoT networks should always be attached with security solutions. One of the promising security solutions is intrusion detection system (IDS). Machine Learning (ML) algorithms become one of the most significant techniques for building an intelligent IDS based model for attack classification and/or identification. To keep the validation of the ML based IDS, it is essential to train the utilized ML algorithms with a dataset that cover most recent behaviors of IoT based attacks. This work employed an up-to-date dataset known as IoT23, which contains most recent network flows of the IoT objects as benign and other flows as attacks. This work utilized different data preprocessing theories such data cleansing, data coding, and SMOT theory for imbalanced data, and investigating their impact on the accuracy rate. The study's findings show that the intelligent IDS can effectively detect attacks using binary classification and identify attacks using multiclass classification.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45700968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.22247/ijcna/2023/218516
D. Jayaraj, J. Ramkumar, M. Lingaraj, B. Sureshkumar
– Advances in information and communication technology and electronics have led to a surge in interest in mobility-enabled wireless sensor networks (MEWSN). These minuscule sensor nodes collect data, process it, and then transmit it via a radio frequency channel to a central station or sink. Most of the time, MEWSNs are placed in hazardous or difficult-to-access locations. To increase the lifespan of a network, available resources must be utilized as efficiently as possible. The whole network connection collapses if even one node loses power, rendering the deployment's goals moot. Therefore, much MEWSN research has focused on energy efficiency, with energy-efficient routing protocols being a key component. This paper proposes an Adaptive Fish Swarm Optimization-based Routing Protocol (AFSORP) for identifying the best route in MEWSN. AFSORP functions based on the natural characteristics of fish. The two most important steps in AFSORP are chasing and blocking, which respectively seek the optimal route and choose the appropriate route to send data from the source node to the destination node. Standard network performance measurements are used to assess AFSORP with the help of the GNS3 simulator. The results show that AFSORP performs better than the existing routing methods.
{"title":"AFSORP: Adaptive Fish Swarm Optimization-Based Routing Protocol for Mobility Enabled Wireless Sensor Network","authors":"D. Jayaraj, J. Ramkumar, M. Lingaraj, B. Sureshkumar","doi":"10.22247/ijcna/2023/218516","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218516","url":null,"abstract":"– Advances in information and communication technology and electronics have led to a surge in interest in mobility-enabled wireless sensor networks (MEWSN). These minuscule sensor nodes collect data, process it, and then transmit it via a radio frequency channel to a central station or sink. Most of the time, MEWSNs are placed in hazardous or difficult-to-access locations. To increase the lifespan of a network, available resources must be utilized as efficiently as possible. The whole network connection collapses if even one node loses power, rendering the deployment's goals moot. Therefore, much MEWSN research has focused on energy efficiency, with energy-efficient routing protocols being a key component. This paper proposes an Adaptive Fish Swarm Optimization-based Routing Protocol (AFSORP) for identifying the best route in MEWSN. AFSORP functions based on the natural characteristics of fish. The two most important steps in AFSORP are chasing and blocking, which respectively seek the optimal route and choose the appropriate route to send data from the source node to the destination node. Standard network performance measurements are used to assess AFSORP with the help of the GNS3 simulator. The results show that AFSORP performs better than the existing routing methods.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48340444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.22247/ijcna/2022/217703
Rashmi K H, Rekha Patil
– In recent years, wireless communication networks have been developing rapidly, which causes many challenges to be faced in vehicular ad hoc networks (VANETs). Congestion is a degradation of the quality of service in which messages begin to be delivered less often to the recipient. So, in this paper, to optimize the energy efficiency of network cross layer based clustering protocol is presented. For clustering, Reputation based Weighted Clustering Protocol (RBWCP) is presented. To enhance the clustering performance of RBWCP, clustering parameters of the protocol are optimally chosen using Mexican Axolotl Algorithm (MAA). In this work, cluster head is selected in every cluster using the weight vehicle’s reputation such as speed, direction and position. After the formation of cluster, mean value of vehicle density (MVVD) threshold is estimated depend on the received signal strength of the vehicles. This threshold value is compared with the density of each vehicle inside the cluster. If the density of the vehicle is greater than the threshold, then the cluster is divided into sub-clusters. It leads to control the congestion in the network. The execution of the proposed model is calculated in terms of cluster lifetime, delivery ratio, delay, overhead and throughput.
{"title":"Energy Aware Cross Layer Based Clustering and Congestion Control Using Mexican Axolotl Algorithm in VANET","authors":"Rashmi K H, Rekha Patil","doi":"10.22247/ijcna/2022/217703","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217703","url":null,"abstract":"– In recent years, wireless communication networks have been developing rapidly, which causes many challenges to be faced in vehicular ad hoc networks (VANETs). Congestion is a degradation of the quality of service in which messages begin to be delivered less often to the recipient. So, in this paper, to optimize the energy efficiency of network cross layer based clustering protocol is presented. For clustering, Reputation based Weighted Clustering Protocol (RBWCP) is presented. To enhance the clustering performance of RBWCP, clustering parameters of the protocol are optimally chosen using Mexican Axolotl Algorithm (MAA). In this work, cluster head is selected in every cluster using the weight vehicle’s reputation such as speed, direction and position. After the formation of cluster, mean value of vehicle density (MVVD) threshold is estimated depend on the received signal strength of the vehicles. This threshold value is compared with the density of each vehicle inside the cluster. If the density of the vehicle is greater than the threshold, then the cluster is divided into sub-clusters. It leads to control the congestion in the network. The execution of the proposed model is calculated in terms of cluster lifetime, delivery ratio, delay, overhead and throughput.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45147929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.22247/ijcna/2022/217701
T. M. Alshammari, Faeiz Alserhani
– Due to the rapid development of smart devices with reduced costs and advanced sensing capabilities, the adoption of the internet of things has recently gained a lot of traction. However, such IoT devices are more vulnerable to being attacked or compromised. Moreover, traditional security mechanisms based on signatures and rules are no longer capable of detecting sophisticated intrusions. In the IoT context, the deployment of intelligent techniques in the control plane of the system architecture plays a vital role in identifying various attacks, including unknown ones. In this study, a software defined network (SDN)-based IoT anomaly intrusion detection system is proposed to detect abnormal behaviors and attacks. Five different machine learning techniques are investigated, including support vector machines, k-nearest neighbor, logistic regression, random forest, and decision trees. A scalable and robust intrusion detection system is designed based on machine learning models and placed at the SDN controller to observe and classify the behavior of IoT devices. A benchmark dataset, ToN-IoT, has been selected to test and evaluate the ML models by conducting several experiments. The obtained results have demonstrated that ML-based IDS can provide a reliable security system. Particularly, the random forest technique outperformed the other studied ML algorithms.
{"title":"Scalable and Robust Intrusion Detection System to Secure the IoT Environments using Software Defined Networks (SDN) Enabled Architecture","authors":"T. M. Alshammari, Faeiz Alserhani","doi":"10.22247/ijcna/2022/217701","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217701","url":null,"abstract":"– Due to the rapid development of smart devices with reduced costs and advanced sensing capabilities, the adoption of the internet of things has recently gained a lot of traction. However, such IoT devices are more vulnerable to being attacked or compromised. Moreover, traditional security mechanisms based on signatures and rules are no longer capable of detecting sophisticated intrusions. In the IoT context, the deployment of intelligent techniques in the control plane of the system architecture plays a vital role in identifying various attacks, including unknown ones. In this study, a software defined network (SDN)-based IoT anomaly intrusion detection system is proposed to detect abnormal behaviors and attacks. Five different machine learning techniques are investigated, including support vector machines, k-nearest neighbor, logistic regression, random forest, and decision trees. A scalable and robust intrusion detection system is designed based on machine learning models and placed at the SDN controller to observe and classify the behavior of IoT devices. A benchmark dataset, ToN-IoT, has been selected to test and evaluate the ML models by conducting several experiments. The obtained results have demonstrated that ML-based IDS can provide a reliable security system. Particularly, the random forest technique outperformed the other studied ML algorithms.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48010084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.22247/ijcna/2022/217708
Pooja Goyal, Sukhvinder Singh Deora
– Cloud computing is a way to handle tasks like development, production, and maintenance done on the web. This domain is evolving. It uses a pay-per-use system like an electric bill and can be used to run virtual machines. Customers are rapidly adopting and shifting the companies that provide such services due to the presence of numerous service providers. It is also customizable as per users’ requirements but poses several security risks. It is dynamic and can be updated to meet the needs of both the client and the service provider. It is a significant feature of such distributed computing platforms. However, this undermines trust and credibility and generates security, protection, individuality, and authenticity problems. Consequently, selecting an appropriate service provider is the most critical test in the cloud environment. The Trust system is an essential part of how QoS and feedback ratings are judged to evaluate the service. Even so, the executive's plan for observing and evaluating QoS still needs to get past several tests. This paper examines the current impediments to trust in the existing trust framework. This report includes a systematic review of various high-quality articles published on trust management between 2010 and July 2022. To do this, some strategies for managing trust are put into four groups: SLA, suggestion, feedback, and prediction. This article also compares the pros and cons, evaluation methods, tools, and simulation settings of different management models.
{"title":"Trust Management Techniques and their Challenges in Cloud Computing: A Review","authors":"Pooja Goyal, Sukhvinder Singh Deora","doi":"10.22247/ijcna/2022/217708","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217708","url":null,"abstract":"– Cloud computing is a way to handle tasks like development, production, and maintenance done on the web. This domain is evolving. It uses a pay-per-use system like an electric bill and can be used to run virtual machines. Customers are rapidly adopting and shifting the companies that provide such services due to the presence of numerous service providers. It is also customizable as per users’ requirements but poses several security risks. It is dynamic and can be updated to meet the needs of both the client and the service provider. It is a significant feature of such distributed computing platforms. However, this undermines trust and credibility and generates security, protection, individuality, and authenticity problems. Consequently, selecting an appropriate service provider is the most critical test in the cloud environment. The Trust system is an essential part of how QoS and feedback ratings are judged to evaluate the service. Even so, the executive's plan for observing and evaluating QoS still needs to get past several tests. This paper examines the current impediments to trust in the existing trust framework. This report includes a systematic review of various high-quality articles published on trust management between 2010 and July 2022. To do this, some strategies for managing trust are put into four groups: SLA, suggestion, feedback, and prediction. This article also compares the pros and cons, evaluation methods, tools, and simulation settings of different management models.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45229081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.22247/ijcna/2022/217705
S. Venkatasubramanian, A. Suhasini, S. Hariprasath
– The newest example of wireless networks, known as mobile ad hoc networks (MANETs), offers some qualities, including a topology that can change dynamically, a baseless network, a range of transmission, a routing procedure, and reliability. In a black hole attack on a computer network, packets are deleted as opposed to being forwarded through a router. This often happens when a router has been corrupted by several circumstances. A routing attack called a "black hole" has the power to bring down an entire network. One of the most common types of assaults on MANETs is the Grey Hole Attack, in which a hostile node allows routing but prevents data transmission. MANET security is a top priority because they are far more susceptible to assaults than wired infrastructure. This study focused on detecting black and grey-hole attacks in MANET by using deep learning techniques. The forwarding ratio metric is used in the individual attack detection phase to distinguish between the defective and normal nodes. The encounter records are manipulated by malicious nodes in the collusion attack detection phase for escaping the detection process. The attacks are detected by using different deep learning techniques like Convolutional Neural Network (CNN) and a Long Short-Term Memory (LSTM) network. The parameter tuning operation is carried out by using the Hybrid Cat-Particle Swarm Optimization (HCPSO). The simulation results shown in our proposed system detect with better accuracy.
{"title":"Detection of Black and Grey Hole Attacks Using Hybrid Cat with PSO-Based Deep Learning Algorithm in MANET","authors":"S. Venkatasubramanian, A. Suhasini, S. Hariprasath","doi":"10.22247/ijcna/2022/217705","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217705","url":null,"abstract":"– The newest example of wireless networks, known as mobile ad hoc networks (MANETs), offers some qualities, including a topology that can change dynamically, a baseless network, a range of transmission, a routing procedure, and reliability. In a black hole attack on a computer network, packets are deleted as opposed to being forwarded through a router. This often happens when a router has been corrupted by several circumstances. A routing attack called a \"black hole\" has the power to bring down an entire network. One of the most common types of assaults on MANETs is the Grey Hole Attack, in which a hostile node allows routing but prevents data transmission. MANET security is a top priority because they are far more susceptible to assaults than wired infrastructure. This study focused on detecting black and grey-hole attacks in MANET by using deep learning techniques. The forwarding ratio metric is used in the individual attack detection phase to distinguish between the defective and normal nodes. The encounter records are manipulated by malicious nodes in the collusion attack detection phase for escaping the detection process. The attacks are detected by using different deep learning techniques like Convolutional Neural Network (CNN) and a Long Short-Term Memory (LSTM) network. The parameter tuning operation is carried out by using the Hybrid Cat-Particle Swarm Optimization (HCPSO). The simulation results shown in our proposed system detect with better accuracy.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49581978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.22247/ijcna/2022/217710
Jayachandran J, Vimala Devi K
– Border Surveillance system is a major security issue in all nations. In border surveillance systems, wireless sensor networks are one of the most important technologies which are going to play a vital role in future research. Researchers address the variety of challenges and spread the deployment in large areas in real time. In this paper, an overview of the border surveillance system their applied technologies, and the challenges faced during the deployment are discussed. An architectural framework for the border surveillance system is developed and presented. A comprehensive review is conducted with different routing protocols based on the node’s mobility, node’s localization, routing metrics, delay, throughput, energy efficiency, and their network lifetime. Simulation results of various protocols are conducted and presented. This work is intended to identify and focus on recent protocol developments and also opens research issues that need to be investigated in the future.
{"title":"A Survey on Clustering Algorithms and Proposed Architectural Framework for Border Surveillance System in Wireless Sensor Networks","authors":"Jayachandran J, Vimala Devi K","doi":"10.22247/ijcna/2022/217710","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217710","url":null,"abstract":"– Border Surveillance system is a major security issue in all nations. In border surveillance systems, wireless sensor networks are one of the most important technologies which are going to play a vital role in future research. Researchers address the variety of challenges and spread the deployment in large areas in real time. In this paper, an overview of the border surveillance system their applied technologies, and the challenges faced during the deployment are discussed. An architectural framework for the border surveillance system is developed and presented. A comprehensive review is conducted with different routing protocols based on the node’s mobility, node’s localization, routing metrics, delay, throughput, energy efficiency, and their network lifetime. Simulation results of various protocols are conducted and presented. This work is intended to identify and focus on recent protocol developments and also opens research issues that need to be investigated in the future.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49168232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.22247/ijcna/2022/217709
M. Vala, V. Vora
– In vehicular ad hoc networks (VANETs), safety-related applications require fast and reliable message broadcasting techniques for efficient performance. Reducing redundancy and increasing the reliability of message broadcasts are key challenges amid high mobility, rapidly changing topologies, and shorter communication ranges. The broadcasting protocol needs to be scalable for large variations in vehicle densities and road topologies. This paper presents a new broadcast protocol for safety applications in vehicular networks. The discussed scheme is adaptive to current network loads and channel conditions. Compared with other state-of-the-art protocols in its category, it offers better robustness, coverage, and scalability. It achieves these gains by selecting the next relay node adaptively and effectively suppressing redundant transmission of safety messages. Compared to existing work, the presented protocol offers performance improvements in terms of coverage and delay. It offers a 21% improvement in delay compared to the farthest distance-based protocol.
{"title":"Reliable and Scalable Broadcast Scheme for Safety Applications in Vehicular Ad Hoc Network","authors":"M. Vala, V. Vora","doi":"10.22247/ijcna/2022/217709","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217709","url":null,"abstract":"– In vehicular ad hoc networks (VANETs), safety-related applications require fast and reliable message broadcasting techniques for efficient performance. Reducing redundancy and increasing the reliability of message broadcasts are key challenges amid high mobility, rapidly changing topologies, and shorter communication ranges. The broadcasting protocol needs to be scalable for large variations in vehicle densities and road topologies. This paper presents a new broadcast protocol for safety applications in vehicular networks. The discussed scheme is adaptive to current network loads and channel conditions. Compared with other state-of-the-art protocols in its category, it offers better robustness, coverage, and scalability. It achieves these gains by selecting the next relay node adaptively and effectively suppressing redundant transmission of safety messages. Compared to existing work, the presented protocol offers performance improvements in terms of coverage and delay. It offers a 21% improvement in delay compared to the farthest distance-based protocol.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45025722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.22247/ijcna/2022/217706
K. Vijay Anand, G. Abel Thangaraja
{"title":"A Competent Intelligence Modeling for Trust-Based Security Scheme in Mobile Ad Hoc Network","authors":"K. Vijay Anand, G. Abel Thangaraja","doi":"10.22247/ijcna/2022/217706","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217706","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43113289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}