Pub Date : 2024-07-17DOI: 10.1007/s10586-024-04679-x
Xiaoxiao Liu, Yan Zhao, Shigang Wang, Jian Wei
In medical imaging, the classification and segmentation of lesions have always been significant topics in clinical research. Different categories of lesions require different treatment strategies, and accurate segmentation helps to assist in improving the effect of the clinical treatment. The Segment anything model (SAM) is an image segmentation model trained on a large-scale dataset with strong prompt segmentation capability, but it cannot be directly applied to the classification and segmentation tasks of medical images due to insufficient training on medical image data. In this paper, we propose a deep learning method for the classification and segmentation of lesions, called GMM-based segment anything model (G-SAM). Prompt-tuning is utilized in the model with the LoRA strategy, and the lesion feature extraction (GFE) module based on the Gaussian mixture model (GMM), is designed to effectively improve the effect of lesion classification and segmentation on the basis of the SAM. Notably, G-SAM exhibits greater sensitivity to early stage of the lesions, aiding in tumor detection and prevention, which holds important clinical value. G-SAM overcomes the limitation that SAM is not suitable for the medical image classification and segmentation tasks due to insufficient training data with minimal cost. Moreover, it enhances classification accuracy and segmentation precision compared to traditional Gaussian model-based methods. The effectiveness of G-SAM in classifying and segmenting lesions is validated on the LIDC dataset, demonstrating advantages over state-of-the-art (SOTA) methods. The study further validates the applicability of G-SAM on large publicly available datasets across three different image modalities, achieving superior performance.
在医学影像领域,病变的分类和分割一直是临床研究的重要课题。不同类别的病变需要不同的治疗策略,准确的分割有助于辅助提高临床治疗效果。Segment anything model(SAM)是一种在大规模数据集上训练的图像分割模型,具有很强的及时分割能力,但由于对医学图像数据的训练不足,无法直接应用于医学图像的分类和分割任务。本文提出了一种用于病变分类和分割的深度学习方法,称为基于 GMM 的分割模型(G-SAM)。该模型利用 LoRA 策略进行提示调整,并设计了基于高斯混合模型(GMM)的病变特征提取(GFE)模块,从而在 SAM 的基础上有效提高了病变分类和分割的效果。值得注意的是,G-SAM 对早期病变表现出更高的灵敏度,有助于肿瘤的检测和预防,具有重要的临床价值。G-SAM 以最小的成本克服了 SAM 因训练数据不足而不适用于医学图像分类和分割任务的局限性。此外,与传统的基于高斯模型的方法相比,它还提高了分类准确率和分割精度。研究在 LIDC 数据集上验证了 G-SAM 在病变分类和分割方面的有效性,证明了它比最先进的(SOTA)方法更具优势。研究进一步验证了 G-SAM 在三种不同图像模式的大型公开数据集上的适用性,并取得了优异的性能。
{"title":"G-SAM: GMM-based segment anything model for medical image classification and segmentation","authors":"Xiaoxiao Liu, Yan Zhao, Shigang Wang, Jian Wei","doi":"10.1007/s10586-024-04679-x","DOIUrl":"https://doi.org/10.1007/s10586-024-04679-x","url":null,"abstract":"<p>In medical imaging, the classification and segmentation of lesions have always been significant topics in clinical research. Different categories of lesions require different treatment strategies, and accurate segmentation helps to assist in improving the effect of the clinical treatment. The Segment anything model (SAM) is an image segmentation model trained on a large-scale dataset with strong prompt segmentation capability, but it cannot be directly applied to the classification and segmentation tasks of medical images due to insufficient training on medical image data. In this paper, we propose a deep learning method for the classification and segmentation of lesions, called GMM-based segment anything model (G-SAM). Prompt-tuning is utilized in the model with the LoRA strategy, and the lesion feature extraction (GFE) module based on the Gaussian mixture model (GMM), is designed to effectively improve the effect of lesion classification and segmentation on the basis of the SAM. Notably, G-SAM exhibits greater sensitivity to early stage of the lesions, aiding in tumor detection and prevention, which holds important clinical value. G-SAM overcomes the limitation that SAM is not suitable for the medical image classification and segmentation tasks due to insufficient training data with minimal cost. Moreover, it enhances classification accuracy and segmentation precision compared to traditional Gaussian model-based methods. The effectiveness of G-SAM in classifying and segmenting lesions is validated on the LIDC dataset, demonstrating advantages over state-of-the-art (SOTA) methods. The study further validates the applicability of G-SAM on large publicly available datasets across three different image modalities, achieving superior performance.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141717442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-17DOI: 10.1007/s10586-024-04628-8
Boli Zheng, Yi Chen, Chaofan Wang, Ali Asghar Heidari, Lei Liu, Huiling Chen, Xiaowei Chen, Peirong Chen
Lupus nephritis (LN) is the most common symptom of systemic lupus erythematosus, emphasizing its importance in the field of medicine. The growing frequency of LN has increased the need for effective image segmentation algorithms. With the increasing prevalence of LN, the demand for efficient image segmentation techniques has grown. To enhance the efficiency of image segmentation of LN, many researchers employ a methodology that integrates multi-threshold image segmentation (MTIS) with metaheuristic algorithms (MAs). However, conventional MAs-based MTIS methods tend to converge towards local optima and have slow convergence rates, resulting in poor segmentation results within a limited iteration number. To address these challenges, this study proposes an advanced optimization algorithm termed Biogeography-based Learning Rime Optimization Algorithm (BLRIME) and integrates it with the MTIS approach for LN image segmentation. MTIS employs a non-local means 2D histogram to gather image information and uses 2D Renyi’s entropy as the fitness function. BLRIME builds upon the foundation of the RIME algorithm, incorporating two significant strategies. Firstly, the introduction of piecewise chaotic mapping (PCM) ameliorates the quality of the initial solution provided by the algorithm. Secondly, a stochastic biogeography-based learning strategy (SBLS) prevents the RIME algorithm from falling into the local optimum early. SBLS is proposed by this study based on the biogeography-based learning strategy. In order to assess the efficacy of the BLRIME, this paper devises a series of experiments to compare it with similar algorithms presented at IEEE CEC 2017. Experimental studies have been conducted to provide empirical evidence demonstrating the superior rates of convergence and precision achieved by BLRIME. Subsequently, the BLRIME-based MTIS algorithm is employed to segment the LN images compared to other peer algorithms. Furthermore, the peak signal-to-noise ratio, feature similarity index, and structural similarity index are utilized as evaluation metrics to assess the image segmentation outcomes. The experimental results prove that BLRIME demonstrates superior global search capabilities, resulting in remarkable outcomes in the segmentation of LN images.
{"title":"Stochastic biogeography-based learning improved RIME algorithm: application to image segmentation of lupus nephritis","authors":"Boli Zheng, Yi Chen, Chaofan Wang, Ali Asghar Heidari, Lei Liu, Huiling Chen, Xiaowei Chen, Peirong Chen","doi":"10.1007/s10586-024-04628-8","DOIUrl":"https://doi.org/10.1007/s10586-024-04628-8","url":null,"abstract":"<p>Lupus nephritis (LN) is the most common symptom of systemic lupus erythematosus, emphasizing its importance in the field of medicine. The growing frequency of LN has increased the need for effective image segmentation algorithms. With the increasing prevalence of LN, the demand for efficient image segmentation techniques has grown. To enhance the efficiency of image segmentation of LN, many researchers employ a methodology that integrates multi-threshold image segmentation (MTIS) with metaheuristic algorithms (MAs). However, conventional MAs-based MTIS methods tend to converge towards local optima and have slow convergence rates, resulting in poor segmentation results within a limited iteration number. To address these challenges, this study proposes an advanced optimization algorithm termed Biogeography-based Learning Rime Optimization Algorithm (BLRIME) and integrates it with the MTIS approach for LN image segmentation. MTIS employs a non-local means 2D histogram to gather image information and uses 2D Renyi’s entropy as the fitness function. BLRIME builds upon the foundation of the RIME algorithm, incorporating two significant strategies. Firstly, the introduction of piecewise chaotic mapping (PCM) ameliorates the quality of the initial solution provided by the algorithm. Secondly, a stochastic biogeography-based learning strategy (SBLS) prevents the RIME algorithm from falling into the local optimum early. SBLS is proposed by this study based on the biogeography-based learning strategy. In order to assess the efficacy of the BLRIME, this paper devises a series of experiments to compare it with similar algorithms presented at IEEE CEC 2017. Experimental studies have been conducted to provide empirical evidence demonstrating the superior rates of convergence and precision achieved by BLRIME. Subsequently, the BLRIME-based MTIS algorithm is employed to segment the LN images compared to other peer algorithms. Furthermore, the peak signal-to-noise ratio, feature similarity index, and structural similarity index are utilized as evaluation metrics to assess the image segmentation outcomes. The experimental results prove that BLRIME demonstrates superior global search capabilities, resulting in remarkable outcomes in the segmentation of LN images.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"167 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-16DOI: 10.1007/s10586-024-04669-z
Abhishek Srivastava, D. Das, Siseyiekuo Khatsu
{"title":"Optimal power scheduling of microgrid considering renewable sources and demand response management","authors":"Abhishek Srivastava, D. Das, Siseyiekuo Khatsu","doi":"10.1007/s10586-024-04669-z","DOIUrl":"https://doi.org/10.1007/s10586-024-04669-z","url":null,"abstract":"","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"22 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141641648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-14DOI: 10.1007/s10586-024-04645-7
Maher Alharby, Ali Alssaiari, Saad Alateef, Nigel Thomas, Aad van Moorsel
This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification process. The stale block rate is a crucial security metric that quantifies the proportion of rejected blocks in the blockchain network. The absence of a block verification process represents another critical security concern, as it permits the potential for invalid transactions within the network. In this article, we propose and implement a quantitative and analytical model to capture the primary operations of Proof-of-Work blockchains utilizing the Performance Evaluation Process Algebra. The proposed model can assist blockchain designers, architects, and analysts in achieving the ideal security level for blockchain systems by determining the proper network and consensus settings. We conduct extensive experiments to determine the sensitivity of security to four aspects: the number of active miners and their mining hash rates, the duration between blocks, the latency in block propagation, and the time required for block verification, all of which have been shown to influence the outcomes. We contribute to the findings of the existing research by conducting the first analysis of how the number of miners affects the frequency of stale block results, as well as how the delay in block propagation influences the incentives received by rational miners who choose to avoid the block verification process.
{"title":"A quantitative analysis of the security of PoW-based blockchains","authors":"Maher Alharby, Ali Alssaiari, Saad Alateef, Nigel Thomas, Aad van Moorsel","doi":"10.1007/s10586-024-04645-7","DOIUrl":"https://doi.org/10.1007/s10586-024-04645-7","url":null,"abstract":"<p>This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification process. The stale block rate is a crucial security metric that quantifies the proportion of rejected blocks in the blockchain network. The absence of a block verification process represents another critical security concern, as it permits the potential for invalid transactions within the network. In this article, we propose and implement a quantitative and analytical model to capture the primary operations of Proof-of-Work blockchains utilizing the Performance Evaluation Process Algebra. The proposed model can assist blockchain designers, architects, and analysts in achieving the ideal security level for blockchain systems by determining the proper network and consensus settings. We conduct extensive experiments to determine the sensitivity of security to four aspects: the number of active miners and their mining hash rates, the duration between blocks, the latency in block propagation, and the time required for block verification, all of which have been shown to influence the outcomes. We contribute to the findings of the existing research by conducting the first analysis of how the number of miners affects the frequency of stale block results, as well as how the delay in block propagation influences the incentives received by rational miners who choose to avoid the block verification process.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141611540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-13DOI: 10.1007/s10586-024-04658-2
Amir Moradi, Fatemeh Rezaei
Given the problems with a centralized cloud and the emergence of ultra-low latency applications, and the needs of the Internet of Things (IoT), it has been found that novel methods are needed to support centralized cloud technology. Mobile edge computing is one of the solutions to mitigate these challenges. In this paper, we study task caching at Device to Device (D2D)-assisted network edge. In the proposed scheme, we predict the possibility of re-requesting tasks in the future using convolutional neural networks (CNN). Based on this predicted possibility, the number of last requests, and the number of cached versions of this task type in the neighbors, in addition to the characteristics of a task itself, including the required cache volume and processing resources, we rank the tasks using the proposed Multi-Criteria Task Ranking using Predicted requests (MCTRP) scheme and select the best replacement option in the cache of each Mobile User Equipment (MUE). The proposed scheme has proved to be of considerable benefit in terms of reducing delay and energy consumption and improving the utility of MUEs.
{"title":"Intelligent and efficient task caching for mobile edge computing","authors":"Amir Moradi, Fatemeh Rezaei","doi":"10.1007/s10586-024-04658-2","DOIUrl":"https://doi.org/10.1007/s10586-024-04658-2","url":null,"abstract":"<p>Given the problems with a centralized cloud and the emergence of ultra-low latency applications, and the needs of the Internet of Things (IoT), it has been found that novel methods are needed to support centralized cloud technology. Mobile edge computing is one of the solutions to mitigate these challenges. In this paper, we study task caching at Device to Device (D2D)-assisted network edge. In the proposed scheme, we predict the possibility of re-requesting tasks in the future using convolutional neural networks (CNN). Based on this predicted possibility, the number of last requests, and the number of cached versions of this task type in the neighbors, in addition to the characteristics of a task itself, including the required cache volume and processing resources, we rank the tasks using the proposed Multi-Criteria Task Ranking using Predicted requests (MCTRP) scheme and select the best replacement option in the cache of each Mobile User Equipment (MUE). The proposed scheme has proved to be of considerable benefit in terms of reducing delay and energy consumption and improving the utility of MUEs.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141611546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Classification as an essential part of Machine Learning and Data Mining has significant roles in engineering, medicine, agriculture, military, etc. With the evolution of data collection tools and the unceasing efforts of researchers, new datasets with huge dimensions are obtained so that each data sample has multiple labels. This kind of classification is called Multi-Class Classification (MLC) and demands new techniques to predict the set of labels for a data instance. To date, a variety of methods have been proposed to solve MLC problems. However, new high-dimensional datasets with challenging patterns are being developed, making it necessary for new research to be conducted to develop more efficient methods. This paper presents a novel framework named QLHA to solve MLC problems more efficiently. In the QLHA, the Principal Label Space Transformation (PLST) and Ridge Regression (RR) are recruited to predict the labels of data. Next, an effective objective function is introduced. Also, a hybrid metaheuristic algorithm called QGTOJS is provided to optimize objective value and enhance the predicted labels by selecting the most relevant features. In the QGTOJS, the Gorilla Troops Optimization (GTO) and Jellyfish Search algorithm (JS) are binarized and hybridized through a modified variant of the Q-learning algorithm. Besides, an adjusted Hill Climbing strategy is adopted to balance the exploration and exploitation and improve local optima departure. Likewise, a local search mechanism is provided to enhance searchability as much as possible. Eventually, the QLHA is applied to ten multi-label datasets and the obtained results are compared with heuristic and metaheuristic-based MLC methods numerically and visually. The experimental results disclosed the effectiveness of the contributions and superiority of the QLHA over competitors.
{"title":"A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification","authors":"Seyed Hossein Seyed Ebrahimi, Kambiz Majidzadeh, Farhad Soleimanian Gharehchopogh","doi":"10.1007/s10586-024-04501-8","DOIUrl":"https://doi.org/10.1007/s10586-024-04501-8","url":null,"abstract":"<p>Classification as an essential part of Machine Learning and Data Mining has significant roles in engineering, medicine, agriculture, military, etc. With the evolution of data collection tools and the unceasing efforts of researchers, new datasets with huge dimensions are obtained so that each data sample has multiple labels. This kind of classification is called Multi-Class Classification (MLC) and demands new techniques to predict the set of labels for a data instance. To date, a variety of methods have been proposed to solve MLC problems. However, new high-dimensional datasets with challenging patterns are being developed, making it necessary for new research to be conducted to develop more efficient methods. This paper presents a novel framework named QLHA to solve MLC problems more efficiently. In the QLHA, the Principal Label Space Transformation (PLST) and Ridge Regression (RR) are recruited to predict the labels of data. Next, an effective objective function is introduced. Also, a hybrid metaheuristic algorithm called QGTOJS is provided to optimize objective value and enhance the predicted labels by selecting the most relevant features. In the QGTOJS, the Gorilla Troops Optimization (GTO) and Jellyfish Search algorithm (JS) are binarized and hybridized through a modified variant of the Q-learning algorithm. Besides, an adjusted Hill Climbing strategy is adopted to balance the exploration and exploitation and improve local optima departure. Likewise, a local search mechanism is provided to enhance searchability as much as possible. Eventually, the QLHA is applied to ten multi-label datasets and the obtained results are compared with heuristic and metaheuristic-based MLC methods numerically and visually. The experimental results disclosed the effectiveness of the contributions and superiority of the QLHA over competitors.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"81 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141575841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive. OT involves a sender having several pieces of information and a receiver having a choice bit. The choice bit represents the piece of information that the receiver wants to obtain as an output of OT. At the end of the protocol, sender remains oblivious about the choice bit and receiver remains oblivious to the contents of the information that were not chosen. It has applications ranging from secure multi-party computation, privacy-preserving protocols to cryptographic protocols for secure communication. Most of the classical OT protocols are based on number theoretic assumptions which are not quantum secure and existing quantum OT protocols are not so efficient and practical. Herein, we present the design and analysis of a simple yet efficient quantum OT protocol, namely qOT. qOT is designed by using the asymmetric key distribution proposed by Gao et al. (Opt Express 20(16):17411–17420, 2012) as a building block. The designed qOT requires only single photons as a source of a quantum state, and the measurements of the states are computed using single particle projective measurement. These make qOT efficient and practical. Our proposed design is secure against quantum attacks. Moreover, qOT also provides long-term security.
遗忘传输(OT)是一种重要的保护双方隐私的加密原语。OT 包括发送方和接收方,发送方有几条信息,接收方有一个选择位。选择位代表接收方希望作为 OT 输出获得的信息。协议结束时,发送方对选择位保持未知,接收方对未选择的信息内容保持未知。它的应用范围包括安全多方计算、隐私保护协议和安全通信加密协议。大多数经典加时协议都基于数论假设,不具备量子安全性,而且现有的量子加时协议并不高效实用。在此,我们介绍了一种简单而高效的量子 OT 协议(即 qOT)的设计和分析。qOT 是以 Gao 等人提出的非对称密钥分配(《光快报》20(16):17411-17420, 2012)为基础设计的。所设计的 qOT 只需要单光子作为量子态的来源,而量子态的测量是通过单粒子投射测量来计算的。这些都使得 qOT 高效而实用。我们提出的设计可以安全地抵御量子攻击。此外,qOT 还具有长期安全性。
{"title":"An efficient quantum oblivious transfer protocol","authors":"Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager","doi":"10.1007/s10586-024-04642-w","DOIUrl":"https://doi.org/10.1007/s10586-024-04642-w","url":null,"abstract":"<p>Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive. OT involves a sender having several pieces of information and a receiver having a choice bit. The choice bit represents the piece of information that the receiver wants to obtain as an output of OT. At the end of the protocol, sender remains oblivious about the choice bit and receiver remains oblivious to the contents of the information that were not chosen. It has applications ranging from secure multi-party computation, privacy-preserving protocols to cryptographic protocols for secure communication. Most of the classical OT protocols are based on number theoretic assumptions which are not quantum secure and existing quantum OT protocols are not so efficient and practical. Herein, we present the design and analysis of a simple yet efficient quantum OT protocol, namely <span>qOT</span>. <span>qOT</span> is designed by using the asymmetric key distribution proposed by Gao et al. (Opt Express 20(16):17411–17420, 2012) as a building block. The designed <span>qOT</span> requires only single photons as a source of a quantum state, and the measurements of the states are computed using single particle projective measurement. These make <span>qOT</span> efficient and practical. Our proposed design is secure against quantum attacks. Moreover, <span>qOT</span> also provides long-term security.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"2016 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141575842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}