IET BlockchainPub Date : 2024-08-25DOI: 10.1049/blc2.12085
Yang Liu, Jingwen Chen, Miaomiao Zhang, Shidong Shi, Feng Wang
{"title":"Serein: A parallel pipeline-based DAG schema for consensus in blockchain","authors":"Yang Liu, Jingwen Chen, Miaomiao Zhang, Shidong Shi, Feng Wang","doi":"10.1049/blc2.12085","DOIUrl":"https://doi.org/10.1049/blc2.12085","url":null,"abstract":"<p>As the core technology of blockchain, consensus mechanisms play a crucial role in ensuring the consistency and reliability of blockchain systems. In a decentralized and open system environment like blockchain, traditional consensus algorithms are often unsuitable due to their inability to tolerate arbitrary faults such as malicious node behaviour. Consequently, Byzantine fault tolerance consensus algorithms have become a focal point in blockchain systems. However, as Byzantine fault tolerance consensus algorithms have evolved, they still face significant challenges, particularly in addressing issues related to network latency and throughput. This paper proposes a parallel pipeline-based DAG schema for consensus in blockchain, Serein. Firstly, the Serein algorithm achieves functional partitioning of nodes, enhancing their scalability. Secondly, it employs a pipeline structure, allowing each block to proceed without waiting for the previous block's result, thereby reducing block generation latency. Lastly, the Serein algorithm leverages the advantages of the DAG block structure to achieve concurrent block ordering and submission, improving system throughput. Experimental results demonstrate that the proposed Serein algorithm maintains robust performance under conditions of high transaction volume with multiple nodes, effectively enhancing consensus efficiency while ensuring Byzantine fault-tolerant security.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"681-690"},"PeriodicalIF":0.0,"publicationDate":"2024-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-08-01DOI: 10.1049/blc2.12084
Sakib Al Jobaid, Upama Kabir, Mosarrat Jahan
{"title":"Scalable data management in global health crises: Leveraging blockchain technology","authors":"Sakib Al Jobaid, Upama Kabir, Mosarrat Jahan","doi":"10.1049/blc2.12084","DOIUrl":"https://doi.org/10.1049/blc2.12084","url":null,"abstract":"<p>Effective data management is crucial in navigating any health crisis. With proper data management protocols in place, stakeholders can swiftly adapt to evolving circumstances during challenging times. A recent event like the COVID-19 pandemic has unequivocally revealed its significance. It is essential to conduct disease surveillance, practice preventive measures, and devise policies to contain the situation. As the process involves massive data growth, it demands an acute level of oversight and control. Monitoring this vast sensitive data faces multifaceted limitations, namely data tampering, breach of privacy, and centralized data stewardship. In response to these challenges, we propose an innovative blockchain-enabled scalable data management scheme in light of the COVID-19 scenario. However, blockchain cannot scale in a large ecosystem due to storing all contents in every participating node. This work addresses this shortcoming by proposing a lightweight solution that groups nodes into clusters, resulting in less memory and processing overhead. Moreover, it adopts an off-chaining technique to reduce the memory load of every node and, thereby, the entire network. The experimental results demonstrate that it attains approximately 85% and 94% storage reduction per node and the whole network, respectively, and an 87% reduction in transaction processing time.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"596-615"},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12084","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143244221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-07-29DOI: 10.1049/blc2.12083
Jiajing Wu, Hong-Ning Dai, Qi Xuan, Radosław Michalski, Xi Chen
{"title":"Blockchain transaction data mining and its applications","authors":"Jiajing Wu, Hong-Ning Dai, Qi Xuan, Radosław Michalski, Xi Chen","doi":"10.1049/blc2.12083","DOIUrl":"https://doi.org/10.1049/blc2.12083","url":null,"abstract":"<p>Since the birth of blockchain as the underlying support technology for Bitcoin, blockchain technology has received widespread attention from academia and industry worldwide and is considered to have profound potential for disruptive change in areas such as finance, smart manufacturing, and the Internet of Things. As cryptocurrencies, smart contracts, decentralized applications and other derivatives continue to be generated on the blockchain, the volume of transaction data on the blockchain has been maintaining a high growth. With the help of this massive data, we can dig out the development rules of the blockchain, analyze the characteristics of different transactions, and then identify the abnormal behaviour on the blockchain to promote the green and sustainable development of the blockchain. Unfortunately, blockchain transaction data mining faces challenges, such as blockchain data heterogeneity, anonymity and decentralization as well as real-time and generality.</p><p>This special issue aims to provide an open venue for academic and industrial communities to present and discuss cutting-edge technologies and research results regarding blockchain transaction data mining and its applications. It solicits original high-quality papers with new transaction data acquisition tools, transaction network construction and mining methods, anomaly detection algorithms, etc.</p><p>In this Special Issue, we have received eight papers, all of which underwent peer review. Of the eight originally submitted papers, five have been accepted. The overall submissions were of high quality, which marks the success of this Special Issue. A brief presentation of each of the paper in this special issue follows.</p><p>Xiong et al. introduce a graph neural network-based phishing detection method for Ethereum, and conduct extensive experiments on the Ethereum dataset to verify the effectiveness of this scheme in identifying Ethereum phishing detection. The method introduces a feature learning algorithm named TransWalk and constructs an Ethereum phishing fraud detection framework utilizing a transaction-oriented biased sampling strategy for transaction networks and a multi-scale feature extraction method for Ethereum. Through more effective extraction of Ethereum transaction features, the framework aims to enhance phishing fraud detection performance. This work holds significant importance in the field of Ethereum ecosystem security. Access the full paper using the following link: https://doi.org/10.1049/blc2.12031.</p><p>Feng et al. propose a framework for detecting and repairing reentrancy vulnerabilities in smart contracts based on bytecode and vulnerability features. This framework aims to mitigate the losses incurred by reentrancy vulnerabilities in the digital currency economy and offers a more comprehensive solution for detecting and repairing such vulnerabilities. The proposed bytecode-level method overcomes challenges in detection and repair by integrating detecti","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"223-225"},"PeriodicalIF":0.0,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142160269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-07-19DOI: 10.1049/blc2.12080
JinCheng Ma, Fei Li
{"title":"Research on transaction privacy protection solutions for cross-border commerce","authors":"JinCheng Ma, Fei Li","doi":"10.1049/blc2.12080","DOIUrl":"10.1049/blc2.12080","url":null,"abstract":"<p>In response to the dual privacy protection challenges concerning the confidentiality of transaction amounts and identities in cross-border trade, a transaction scheme that combines <sup>+</sup>HomEIG Zero Knowledge Proof (<sup>+</sup>HomEIG-ZKProof) and the national encryption algorithm SM2 is proposed. While ensuring transaction traceability and verifiability, this scheme achieves privacy protection for both payers’ and recipients’ identities, specifically tailored for cross-border trade scenarios. Additionally, customs authorities play the role of supervisory nodes to verify the identities of transaction parties and the zero-knowledge proofs for transaction information. The RAFT consensus algorithm is employed to construct a secure authentication application, demonstrating how zero-knowledge proofs, combined with homomorphic encryption, can be verified through a consensus process. In this scenario, the legitimacy of transaction amounts is subject to zero-knowledge verification during consensus interactions. Merchant identity verification is accomplished using SM2 ring signatures. The analysis indicates that this scheme offers strong security features such as resistance to tampering attacks, public key replacement attacks, impersonation attacks, and anonymity. Testing results demonstrate that this scheme can effectively provide dual privacy protection for transaction amounts and identities in cross-border trade, meeting the practical requirements of privacy protection in cross-border trade transactions.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"586-595"},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12080","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141821278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-07-15DOI: 10.1049/blc2.12082
Yuzhou Chen, Gang Mao, Xue Yang, Mingqian Du, Hongqing Song
{"title":"Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain","authors":"Yuzhou Chen, Gang Mao, Xue Yang, Mingqian Du, Hongqing Song","doi":"10.1049/blc2.12082","DOIUrl":"10.1049/blc2.12082","url":null,"abstract":"<p>Airport checked luggage entails specific requirements for speed, stability, and reliability. The issue of abnormal retention of checked luggage presents a significant challenge to aviation safety and transportation efficiency. Traditional luggage monitoring systems exhibit limitations in terms of accuracy and timeliness. To address this challenge, this paper proposes a real-time detection and alerting of luggage anomaly retention based on the YOLOv5 object detection model, leveraging visual algorithms. By eliminating cloud servers and deploying multiple edge servers to establish a private chain, images of anomalously retained luggage are encrypted and stored on the chain. Data users can verify the authenticity of accessed images through anti-tampering algorithms, ensuring the security of data transmission and storage. The deployment of edge computing servers can significantly reduce algorithm latency and enhance real-time performance. This solution employs computer vision technology and an edge computing framework to address the speed and stability of checked luggage transportation. Furthermore, blockchain technology greatly enhances system security during operation. A model trained on a sample set of 4600 images achieved a luggage recognition rate of 96.9% and an anomaly detection rate of 95.8% in simulated test videos.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"393-406"},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12082","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141647467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-07-11DOI: 10.1049/blc2.12075
Bohan Kang, Ning Zhang, Jianming Zhu
{"title":"Data-sharing strategies in medical consortium based on master-slave multichain and federated learning","authors":"Bohan Kang, Ning Zhang, Jianming Zhu","doi":"10.1049/blc2.12075","DOIUrl":"10.1049/blc2.12075","url":null,"abstract":"<p>In order to encourage participants to actively join the data sharing and to meet the distributed structure and privacy requirement in the medical consortium, the data-sharing strategy based on the master-slave multichain is presented in this paper. According to the different computing resources and the responsibility of participants, the adaptive Proof of Liveness and Quality consensus and hierarchical federated learning algorithm for master-slave multichain are proposed. Meanwhile, by quantifying the utility function and the optimization constraint of participants, this paper designs the cooperative incentive mechanism of medical consortium in multi-leader Stackelberg game to solve the optimal decision and pricing selection of the master-slave multichain. The simulation experiments show that the proposed methods can decrease the training loss and improve the parameter accuracy by MedMINST datasets, as well as reach the optimal equilibrium in selection and pricing strategy in the system, guaranteeing the fairness of profit distribution for participants in master-slave multichain.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"470-481"},"PeriodicalIF":0.0,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12075","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141655460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-06-24DOI: 10.1049/blc2.12074
Yunwei Cao, Ting Yang, Yu Wang, Gang Mao
{"title":"MEchain—A novel mode to improve blockchain's real-time and throughput","authors":"Yunwei Cao, Ting Yang, Yu Wang, Gang Mao","doi":"10.1049/blc2.12074","DOIUrl":"https://doi.org/10.1049/blc2.12074","url":null,"abstract":"<p>Blockchain trilemma is a considerable obstacle for today's decentralized systems. It is hard to achieve a perfect balance among decentralization, security, and scalability. Many popular blockchain platforms sacrifice scalability to preserve decentralization and security, resulting in low speed, reduced throughput, and poor real-time performance (the time from transaction initiation to confirmation). Currently, there are several technologies, such as sharding, directed acyclic graph technology, sidechains, off-chain state channels etc., that aim to improve throughput and real-time performance. However, most of these solutions compromise the core feature of blockchain, which is decentralization, and introduce new security risks. In this paper, the authors propose a novel method, called MEchain, based on the Proof of Time Series Algorithm. MEchain consists of two models: the multi-chain model and the elastic-chain model. The authors’ experimental results show that these two models can enhance real-time performance and throughput to a higher level in the industry.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"355-364"},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12074","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142862101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-06-22DOI: 10.1049/blc2.12081
Muhammad Faheem, Basit Raza, Muhammad Shoaib Bhutta, Syed Hamid Hussain Madni
{"title":"A blockchain-based resilient and secure framework for events monitoring and control in distributed renewable energy systems","authors":"Muhammad Faheem, Basit Raza, Muhammad Shoaib Bhutta, Syed Hamid Hussain Madni","doi":"10.1049/blc2.12081","DOIUrl":"https://doi.org/10.1049/blc2.12081","url":null,"abstract":"<p>The rapid and green energy transition is essential to deal with the fast-growing energy needs in both public and industrial sectors. This has paved the way to integrate distributed renewable energy resources (<span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>D</mi>\u0000 <mi>E</mi>\u0000 <mi>R</mi>\u0000 <mi>s</mi>\u0000 </mrow>\u0000 <annotation>$mathbb{D}mathbb{E}mathbb{R}mathbb{s}$</annotation>\u0000 </semantics></math>) such as solar, hydro, wind, and geothermal into the power grid (<span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>P</mi>\u0000 <mi>G</mi>\u0000 </mrow>\u0000 <annotation>$mathbb{P}mathbb{G}$</annotation>\u0000 </semantics></math>). Wind and solar are free, zero-carbon emission, and everlasting power sources that contribute 5% and 7% of global electricity generation, respectively. Therefore, the fast, secure, and reliable integration of these green <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>D</mi>\u0000 <mi>E</mi>\u0000 <mi>R</mi>\u0000 <mi>s</mi>\u0000 </mrow>\u0000 <annotation>$mathbb{D}mathbb{E}mathbb{R}mathbb{s}$</annotation>\u0000 </semantics></math> is critical to achieve the instant energy demands. Smart grid <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>(</mo>\u0000 <mrow>\u0000 <mi>S</mi>\u0000 <mi>G</mi>\u0000 </mrow>\u0000 <mo>)</mo>\u0000 </mrow>\u0000 <annotation>$( {mathbb{S}mathbb{G}} )$</annotation>\u0000 </semantics></math> due to inherited characteristics such as intelligent sensing, computing, and communication technologies can effectively integrate the <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>D</mi>\u0000 <mi>E</mi>\u0000 <mi>R</mi>\u0000 <mi>s</mi>\u0000 </mrow>\u0000 <annotation>$mathbb{D}mathbb{E}mathbb{R}mathbb{s}$</annotation>\u0000 </semantics></math>. However, the existing smart grid communication architecture faces various cyberattacks, resulting in poor integration, monitoring, and control of <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>D</mi>\u0000 <mi>E</mi>\u0000 <mi>R</mi>\u0000 <mi>s</mi>\u0000 </mrow>\u0000 <annotation>$mathbb{D}mathbb{E}mathbb{R}mathbb{s}$</annotation>\u0000 </semantics></math>. In this respect, blockchain technology can provide fast, secure, and efficient end-to-end communication between <span></span><math","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"644-658"},"PeriodicalIF":0.0,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12081","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-06-10DOI: 10.1049/blc2.12078
Junjie Huang, Liang Tan, Jianmei Xiao
{"title":"RON-based cross-chain routing optimization strategy in metaverse","authors":"Junjie Huang, Liang Tan, Jianmei Xiao","doi":"10.1049/blc2.12078","DOIUrl":"10.1049/blc2.12078","url":null,"abstract":"<p>Metaverse is a new ecology that integrates the digital world with the physical world, generates a mirror image of the real world based on digital twin technology, and guarantees the fairness of the virtual world through the trusted mechanism of blockchain. Cross-chain communication technology is the key to realizing data circulation and collaborative processing between blockchains, which provides the communication foundation for the massive connection of blockchains in the metaverse. The current cross-chain communication mode is dominated by direct-connect routing, leading to network congestion and high propagation delay once the direct-connect link fails and cannot be recovered quickly. To optimize direct-connect routing, this paper proposed a cross-chain routing optimization strategy based on RON (Resilient Overlay Network), that is, Cross-Chain_RON, which firstly applies RON to reconstruct the direct-connect routing model, and then selects the optimal link through the shortest-path algorithm and policy routing, and combines with the RON performance database to improve the data transmission efficiency. Finally, the two communication modes were simulated by simulation tools. The experiments show that Cross-Chain_RON outperforms the direct-connect routing in terms of latency, rate of successful data transmission, and throughput in poor network environments, but at the expense of a certain amount of system overhead.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"379-392"},"PeriodicalIF":0.0,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12078","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141362481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-05-26DOI: 10.1049/blc2.12076
Xutian Wang, Yan Hong, Xiaoming He
{"title":"Exploring artificial intelligence generated content (AIGC) applications in the metaverse: Challenges, solutions, and future directions","authors":"Xutian Wang, Yan Hong, Xiaoming He","doi":"10.1049/blc2.12076","DOIUrl":"https://doi.org/10.1049/blc2.12076","url":null,"abstract":"<p>In recent years, the Metaverse has gained attention as a hub for technological revolution. However, its main platform suffers from issues like low-quality content and lackluster virtual environments, leading to subpar user experiences. Concerns arise from declining interest in NFTs and failed virtual real estate ventures, casting doubt on the Metaverse's future. Artificial intelligence generated content (AIGC) emerges as a key driver of Metaverse advancement, using AI to create digital content efficiently and affordably. AIGC also enables personalized content, enhancing the Metaverse. This paper examines the link between the Metaverse and AIGC, exploring AIGC's applications, underlying technologies, and future challenges. It reveals that while AIGC shows promise for improving the Metaverse, its technologies must better align with development needs to deliver immersive experiences.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"365-378"},"PeriodicalIF":0.0,"publicationDate":"2024-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142862248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}